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", 0x1000, 0x200008d0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000240)={{0x2, 0x0, 0x0, 0x2, 0x8}, 0xff, 0x0, 'id1\x00', 'timer0\x00', 0x0, 0x8967, 0x40, 0xa1, 0x1}) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80900, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:24 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0xc0045878, &(0x7f00000001c0)) 13:13:24 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:24 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0xc0c0583b, &(0x7f00000001c0)) 13:13:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000001c0)) 13:13:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)={0x2268, 0x15, 0x200, 0x70bd28, 0x25dfdbfd, {0x3, 0x4f}, [@INET_DIAG_REQ_BYTECODE={0x87, 0x1, "082393de1a26a9feb69a5da904d02e1506839abdb49e0561c46901eaa087f06f96f295769a581c6e7769d2282c96196cb28b7692f1968b83269669ed808cfaad0a801559d1f15fbcce417a319d8f801f0391b577347715b641d8a76ede0064335519540f60ac7c7a6bc454f8d7ddfb99e217da8031527765f99d9a54b48316f7df07df"}, @INET_DIAG_REQ_BYTECODE={0x18, 0x1, "fb2af8a3b31eb09aceaebc22d439b9f3ccfd1df6"}, @INET_DIAG_REQ_BYTECODE={0xba, 0x1, "87ec9e401343e05f12c7c4f0adf0dfc97de081b0dbea2e8a385edbea4003caf8aafe790107597dc6cffb8017e47539b1ac80fec4e83582c287168700e14eac5581b07dae860aed1a94e73284844c8cdc8e346b496c524ab86107fbb626a32799bd56092afb24419193e05d26698ad9bb2f51121c6ae83bcdae23851ca26e5934743b8f0e225fd73d5f1e4ba8ce2e473955f87ecac8df502849648602d3abd8ed8c0b518c6d01cea09e62365fa7dbc82eb7b527857a7e"}, @INET_DIAG_REQ_BYTECODE={0x2c, 0x1, "560c12afb2acffc5b87757ef13051f547f6ae3b8f2e43f525ce51ab601b02f3bbeb721dc948378b1"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "8aacea78fe6ddc0d384d26dd35337cd45d637eceaee70966abcf9fab61583983db3f0a366d1e72e7fb5e0076f227db005c63b8d5e1b2096e0b4d465293fe9d32e72a46a86efa5b968cdd603d30b60a7d9f910c2eaf6cfa1b98447c5204cc0b7dbbf2f8bea4f9af01546d4c681351d1653a01de61fe47c2cb3f487e13234a62acbda998b850329692126faa69d5bba6099c9e2abd87ac364070fb8165ccaae1bbeed695a3587f7d545ce54c5d60aadb23edd9e2b0a7b2f73f66a140cb83efd99af0ef5d015861b343a5974b9b7826d5de946fc665b6ec07d9997b9a8e7c0d9cf366d728097f7e7b466fca7d5b8804709dbda0e5bf4ad95fe0a4d82b0d1e3cbdb6935d9678666c4f7b14164a14090b74b7e540dacc9d14e347e769da78fb9020461c20f238c493143ed432a11cba2eb7a6dad77acd0f52ccfce2a85f2aede232a34808f5dcb7a4c13c3e67361845ab896c857f5cefd6992e135d27f45b615c44107bae379035fa08aaf8ea7b254a7a49763f4c6147d73512ecd900b5d67ab915bb345f826d5e97c7d3da4e32e5022b75758186e2f0d85fc5dbdb0a502ae7d83a3832fdc91f7a718c9ab0d143e558bb664197f024351a3a36e1c940ad98e29021ffb6b2fbd253ac4d46fddffd6abe637accc7abda450084ecee544d66d97863f39c3e3f2ac57d729325600ee93e488c53c1738e838f5bebc689c2d6d1d7611868ea63166127a5ce2654d55c474b6464a4992654f0142383fdefc99b47c2ebdd99ee4ba614f950e8a1323eb7b37614c9db68f2946cf2f9548b3f0a71fc01b665eefc0e6f64d268efb5da6a4d6c4459c72cd6abe0695fb1b86cc49ab0bbd5572adc141970f75a5db2a666618404298fdd31a173f97de6773e61b4799895dc7d83fd25b64a82ce654a1d0e4bda76a7fd56ba721fec3564206806d32121a0c5e4a05d5ca0c82f51eb33f552b93c4780e0f255d9c93f2c788b748d24df2d2347b2643921338faec82fca3c8a4e16a9c0e9b4f55b019413fa1915788c8f7cf321b5200f387660632a789717ff5dfeb63c941e6c903b69fcb171b3b30321e174b6e8294742980931dc0fd940236e0f3432813c3c55c345c709d99d0d8df51628ca3b3eff958884564876d6c7a3861537c0e8c1bc2e5d120ccbe658c13aadd9452f83b1bc41401b9eec71759afb0a88cd85062602ab9cf42fafacc8d059b3955a8b80177dc0344159d0cc013381dae4c5c5e1cce2c155f43d956e41f98dd03bfd00baaf234ec2663241798b7d35e61bb54f0b352ad7fc301792203146ffb6aa04648a30fa027b15c9ec08e1a4443b573ae6706e0de2dbfcb705ea1947537aad98a9dd2502d18800cf6173941e860f5a526ec1fcda796e95d685fe42b7158b03ec247aff7029bb83027192e1e953dac162f64c2a9690be59513c893d73f309ae289e14ce569e8d05887723fe4e64d564c7cc724f6ade33bc3f4c1746ba09641ca716c2a33cf307bf181ab626e40a6cf280e62db60ac74062ca57cd62c41bf0edeeb023dc5efb6d87d7893e797d224996178dbbd77230d0c3aaf9d738fe5dd1db5f2e9e6e1166c2fe1bd57dd21ca5b6fae0bfef25b0a31524567c54c9f0fd1c22a7b1a27aba2e686aed8d7e1073384583b111c9951816e32e592b9605ca88a7e31c6bb5f931384760038081d60cb04d22ef5e2bb707a5e3e4747ba574a63ff5f62d92114c822652d35715b79180a8d87fd728860fc776ca05e746a0d448981fa437cff1bf2190c4f0633ccf1b5002f001abe97a35719016f0e722d998b40a747b874696a9873658eeaa3c707f902c2f512f09906aa720ddb97d14ebb1232d91f9ac7a31ab719e6de1846e1753d0081f0edd91cbb8fe3d881bba31302eb27486601436073dee8128a48d42efe462221aa62982ce906d99646a39493cf17d9e04bd4d00b703190a3a01a0bad3185b6c6d060ee16bdac4d4ab8a08f5728a6011bbdec51bfdefba38286b6dcd521b6c761254e38f725ea818407435d3e5404a20118ab334c386d75831821acaa13100d41074682392b8a5ce2d7610af485230bf45a7ae7075a8783be73cb5407cd8f58024bbbc0e5ef30ed81a8f69c656b11f50e3d67f91d8aa5d89dcfc4660d11d092fb3d4f442051b971dc1db83846e161b06adf466361a7537eda5e0ddef047edcef62af61f7b4a38c633310f39555b7d30adac8fa0c2f933b3021ad1bf1a80a373288e3676e760b25df33446782b1ce695c0c0c3258913be1b9c08a8d4c1219818d36e85661609dceadda79e0168062d76bd142443d51252efa9fece15c478b555203cc8abf4f22e14cc67a4eb7008d21bf89141dd084a7cecc94c4a5be1b5795cd043cc4f3d208b6fb9bf2c33b3017375c640105066cd05a169f18fd734d636294b729186f0c35b7a71bdc7cf2029f8fd2af70a20691a41e68cc494b8d8264f7e7ba26669d95254c8d603db8090a6dd612a3cb6c5e8919217642081de8d6c9e964d495e84927f0c141b73628dc669ba5b013d040a93b3654de7ec45b055b7ac768299c5391ed211b1bd1195b8264aabed2e68f41734437cade368a26ab26d55fac89b1f0811bf609063508f3bbc5f1a356d6c0b2582e979ce9d09781379e01d1595eb7f6ad8d03cbf8aaa7ad67e4c723f608bd2fec0be7d3269b84b55096108f07bd004cd5a7f9460cb41d00cd0e6ab9e64bb046bb6bc1c04f2e4be8650bd09541cd66a6e88983e456e84ef5d5edcecb1b2d1972cb30c089de9f2834b220923a51038d84d396d96abe80d9613965ca026751042ad0732540f2a9bc964f0a5e0cfcd8be520de15578caf2d43ebe18e376b3c57f42648d505e74f9cd0b0a2576e4e867865bdebd323162ea78dc032820eafbef87caabd0fe48f3c3d200c90d666fb6247cf3d262e10482548f74a4578b3a0d0fd80dc83a655c0257875ad85b5a2be28da29ea0665310e46ea0507c5c452543820943c82c797fe6037c69c4d8cf21562acb02b774c5b55dc5531bef4db9087e4ec4ed1023c5f070d88797b1e6c1b785a66ab5e48f974a06378f190a08691b69d0b80d7b68e32967b9d00ea9d8459c41c9b21fbcc791a0f49495ce9a34752da14d00bf37236a3da5e1759b08ef6f5b0104837ad369fe6d6457803eb415f8fe0b9448cad5f9c5d409aa6236a9c5ba1c0633dcc479f25472076cf77496dc2c1e9510f68fd7b4b0220d8e97935915adb07aef8a72146d434cf966bc093b225dd348ea6c8dc7af1748d07ae7eb29678bb5a12508f7d6e187a664cf3fc503699c391f26c78385768049d1cb9f1df7084e72f4337675a2ee86f3bc400f906445316dceadf90128b988c952ed8c88264646aaf9d96a526ab9edbb371c2c59cf607d7f34276a743eeec9a33422215876691421321ba155db313ee0c18a340afb5ba4949e15e7ddfa1c597681915d3b40e06715a41bc03a287171e95f6fac8bd49a7b9c73027c0b4d54637a718b15cc6c9b05ce8b5943ae4c3aef62e74c8edd80d0126664be346f85ba3c2509e80dd1d4c5a4ffbb0ce11d72ce3fd28926ab3044147ea167b679972f3bb3a4a053555d7f67726decfcb7de185a99070a5c846d8028e0c9dd936256a3d5f722eb219b6e29cd5cafd6d56e4024a11ad5c9a9dc2150f369f207a64fd86afc21794f20668fd062759812dd79d565dbef4a3ca6095d35da7e02387476db03f34dfbec8a4b1ab6da2a1ad45408d8bf5aeaeab4cac98fb04731419981a316226901e17e0a1df66736cf33a4b11b3dd620f34bf7c396c5b002a321310a286a90418e403749e40d665687872140b488444d2c3ee521e1da988605ab98ad5e8966a2f158ecdcd87163a3bbd2c73e05347f1209c140c4a7051a25a4841d4f4653d1112a5f3b6fe43fc34187980ccf7418ff1d05435c990217d93ee00ecf73195c8555f7a68b593555088ab1c06b1ad5355ec0dca7393621ef91f59414bbecbbee0282983ee880f88d5cf083e2ce600e35bfa1435b7a6c604f8321cb68441ea0433ae97524802ce085e60b106f25e36ac9cbbf6f29e64795fc6bfc800ba9086c508915fdfdd9d43a6373e38af9f1c3e78a49463f4662a993863c14ae720441e2d088d7a3ba659cb6f3f73cfcd267a2797af7aa0f66b0becf215f046fef5a6b34a0b45769c51696e08dceff759855a880cb5816344a8146da495397c355341b42dc41cc177f2b71aa0821de30ff840200c942545d29741936a7d1e123f0fa32b3432349b53de3611d1e6e2f46d6a0bea522850ff2ecea707ae09b68d626aef4ac6e35599387d4bad442f74154842990ad42cef73f571638e409ef842624c2e725238ac23b4d324e038d8b97c41f6dff9b0829f1e57f8b765d785d6f56e8a102d093f0fcc64c44873e351428218674253c12117abcfe4a2c5c249964ac78269e7b99047e64107c3ba41564de6a6d0860e684ab231c075a5d41ba8b53ac678c53198a5f40692b68fd17bd5399c3844772820671a2ac6d6442bd07e7602e0479b67ae37719235e87174d9f83d59d81cdd441997ba4a1a66b1ff416674d01ae0ccb8383bfa61220d5cc6190247db298aa3df401362bb7cb4af5015b505220ca81281822324435dc33920f9ddea115c7a115708a641794ad017a27cd20125078e1c929356313502935cf7de03622eff766627cf1bb619879a9b6956cc8fdecec32881a14e4c0502c33eeaa48acab57ed63c71ca53593847b11d9531db22f1ce16fb4536c1a535121ef6fb621bae50862b7151bd0b1f64023e5479f1774f436f1fa8d82c16809204858808165ae4b251892fcd4da5ae0259d469d2b350af8f3265ac34fe9074361048752ea9eaa0f367bc79b89d92ba29ce398c94d9bdf1f0207a3e7b5bcf0e7c62d9944c7a413f8d053e7e37f46a3e6420aa61c13b99c04e0478a3a25caaf78a27a7aa58367f9f246f371f356cccaffec74c969539ea4d2efb6da8c0d7cd8dae61d6700e9f8974d25876cfaa210cc41aae69b03b36ea24d917033d6b525e1cedcab43e108f5cc96aaa6206294814c975ed1700f18d078fa782413a93ebdbed2e0c4ea53bfb74bf9fd70ef32515d6942e9c44569967b29cf9c511f170b40eeebd167dd2ff7c24cf906bca014d6d87b0c403b91694f528a900bb65764835029457d15deba899759c8796082a8cf51b9a76037813c8971e9d46fe700b71f5e9c952d57eb492bb6cdce186125f5cc78daedc3ec7be5ca480e01f7d77d982f79d6f2efe16ad6ff62c400a5762cdffac736ace51159f6696109c070f7f1637d83c407f6bf454a3178980771e8a871bfd0eecb80fcd8bc600ebba659d3468b7eb60d332a5572e127a637685636285c937f1e85484b5f2508d159c5519f3ee7de1a29f0a031fde9a337443fcf5e44746f31c9837448cb38f87043cd45b771a3e554285eb8349dd1a03c4e2a92236207ab75e9769d2abaecaf0f096bc37e98085583a29f1f1d575407741d3f973d6790a16f578398d2e204fc18d49d71e885c9493aeccb35750a0e4a86757a877218d3553fb1c2be26cb7326529445b5ace99cbdb41109d394252b84361d41c2d3ae1c5c54f220103f313f67dee6e9af88157861e6cc2c0eb25c3206842d1663aeec9868e06f1616d52809ee7357fbf1a004afa162d057f43d91db5b17ac2ed802f3c63dd764e9a43d5d70803b718b2dcbacf75ac6144fd0084ec25b0b1df121216ed064a958aa16c21fbf7d06c53a70fa1ede198366e5b3e19027c91bc929183882bd2d81006cfa464d11a3403b24875998693f1faa6cfeefee"}, @INET_DIAG_REQ_BYTECODE={0xc4, 0x1, "b6aac870af5314d3829df16f450e3de16daf7084834fcf93052ba3e5465c2ff32f793b1822c54c86bb210ac3a9c2aeafcb141db5833d332edbb4ebfac9af7f43914a1a4b95d14a9ca68523dfc280ee9e9b1b569113119286a97a8b2a714b92b6a4de3afa26f7fbce18fdbca7ae06b993e2eaba5d4a3fc388ed6e2802b3d7eca54f9cec50dcf20c689f1cac85911439ccba1270e89225ed2bf48fb1a0473cd05b7349d4005b09308e757a1b4c45ec1c15d8b91224da6d9141908788264d098aec"}]}, 0x2268}, 0x1, 0x0, 0x0, 0x2000}, 0x129e220af0d2f3ab) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000180)={{0x3b, @local, 0x4e23, 0x0, 'none\x00', 0x0, 0x40, 0x1c}, {@dev={0xac, 0x14, 0x14, 0x3b}, 0x4e21, 0x10000, 0x6, 0x2, 0x80000000}}, 0x44) [ 278.188998][T12383] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 278.205339][T12383] EXT4-fs (loop2): group descriptors corrupted! [ 278.303417][T12398] overlayfs: failed to resolve './file1': -2 13:13:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:25 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0xc0046686, &(0x7f00000001c0)) 13:13:25 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)={0xffffffff00000000}) [ 278.359003][T12393] FAT-fs (loop0): invalid media value (0x00) [ 278.366912][T12393] FAT-fs (loop0): Can't find a valid FAT filesystem 13:13:25 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) [ 278.425478][T12411] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 278.435052][T12411] EXT4-fs (loop2): group descriptors corrupted! 13:13:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000001c0)) 13:13:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x4, 0x69, 0x2, 0x6, 0x2d, @dev={0xfe, 0x80, [], 0x15}, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x7, 0x7, 0x7fff}}) sendmmsg(r1, &(0x7f0000006280)=[{{&(0x7f0000000280)=@can={0x1d, r2}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000300)="8df17c451006891165dcc5b4a1ff516a87afefc4f5156716fb7dd172cfee660d36b91202ca225f3c61c289997ff49d387f70c3b637", 0x35}, {&(0x7f00000003c0)="51b21eb38b8691793df80cb54c7b7a76a8248a88e834113501b43b14d1d9d7a5da2d3588b011bafbc77479ba27251f4e7ebb33b799065a7a4db9ddcbd7a7d2d728fa408905e1cb5ee11d5f92e8e3c65588bc79ab1af34f3e6824e651ee44d956ae0daccc9548057d2c70eba55d80a3f8eb05a16a48b49ebec658abe17da6dfc288c70c1c2be76b6d6acd80c171264a1b4a1db4e9e47a70f664d13f898ac55783e94cd23a3031aff3739d690b18270f67e7fcb34956ec35f056", 0xb9}], 0x2}}, {{&(0x7f0000000480)=@in6={0xa, 0x4e20, 0x7fffffff, @private2, 0xcd6}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000500)="800d33f5c37148ad58241a91da7e5260a7da836b409bd2a23ef9dc08afef1bff5148c961a6450485b1714b2bd5", 0x2d}, {&(0x7f0000000540)="a3a67da6ad652ccece49996c558a4cd784a6379a04a4357afd52168cf427f5b345371cbdbc11d75fc485b4c73a33985ad325bb0821d0a470678f1659976921e26f1fb47cd9a82723d1c992ba3aab8e34f7a27fc952a5a4c62b77892f82513035624eda4e3d4b1f844c2b3aa0b6fe97ae8e2354dc4db9a60f367a245fed0afc24c340f20d70e1c38f18d3dfd74a0460c954b36511df1d58b97ba4330256e1e0076ae968d077ff713898868090aa8f66a6161a64f6c8", 0xb5}, {&(0x7f0000000600)="cce48d4a114eb5d67083077f462df5ba15c6faabda8e079b0570ea1b22b81dc70660d89243903ea7f3", 0x29}, {&(0x7f0000000640)="63c8a20d9bf61b150466a8062e7f6fef5eacdda9f387ce0821951659a77aca3d0f0c78ff914d1d30b93dd5bb0a87ba750e646a615bbfc6de7d5b135e3c616cec3b03f69f01ad42db820a8f0caec3098f8dab77e4967d97b792", 0x59}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)="2e8ec30c15a40dff8c6912ab19b88d46d661df1e82de328f98ae348c11e2229e15f7293cfd6bbde7bd123e3f31845ca5af43dfdcd5536d35abd0ebb1cb1782e9cd0547da2c73f78eb1e20d4827edd228e3cd42edc408cb31f508b12805409ee06ada51aff3a54717a2225cdc0639b91c587be2695355c3c1d534ab88970b02c19a7b91f8e0e7ce786a7f43e1df05bc741084", 0x92}], 0x6, &(0x7f0000001800)=[{0x68, 0x10d, 0x4, "8be56456a95bd11f2faf691d51db543993fafd2a2cc66fe5d7ee19c9a7c8ae1633bc5223dd549bfe3a67d8b52c65e0d3f9483a233e63c837db95efa2690dead8596f4340a7277ea7467ff3531ca0ed1cc9b5c8"}, {0x10, 0x109, 0x6}, {0x60, 0x111, 0x9, "4af3a3de3e5606e3e6abf3e8f88f9457fb535143281e4d4246c77fcdbeada08c841ee028a1c16436daa050dceba6d4560b68f4f66ff969f4a13d58f81d9b1849affd5e0959ffdd7a4bd3"}], 0xd8}}, {{&(0x7f0000001900)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000002e00)=[{&(0x7f0000001980)="cb1872b21ffb35f861a45ab211cb5f317fce1d22f121408d65d64d2477ab3ea5ba3ed0f7afc43f05d361d251d04424ebce7a9ca138f5ac1363f30fa76140459a761c6e11454cba1f932b497280804f9d64c0ca109b6fd3c84bb5a26c0ced54f84f2df4e8382f1b88dc248d1dd943d103e8ad1c9e59637121bd60fb07dd9f0100e941c8", 0x83}, {&(0x7f0000001a40)}, {&(0x7f0000001a80)="bdd142c9909d1c17e3c3ac16e4a4e5210a619326dd86542dd64fefb0e1893f033685006e917eb975ecf16f7ac92eb8e6c6f34531a18011abe3ad34c19b16398ae9f47b9adf50e33625e0032526152b24deb8b85ec0958d96eeb23850a4bdce6cec8e5d524735f13f538d3ec2bd797731c9b623ec2d6b3e58e966ac6fb2ee28885aec69f73c451fa24ef6a542b8a9698573867d5027c3896e7d39da0aaf347ecc965ba9ca26ef1e818f913d2c5b942ab79e78553b9d4a6cc5faed932fe9d8b95b8be0e2d0440e87873b243a423a546b47996ce852ea5aa14c586511283e912fa451ee5b8965683661a383b8aa0e64c711732f90df74bf62fbc995eb16c4e3b5039c66b87ced24214dacdee2b50dd83395102f24cdaff5f3c672b5e3dbc54ec237fc5e9a2720dbb181f44635c79ffb52e7cce59b332be3a196ca87f0aae1a1e4e54ca6c63f7adba4500fabe40f568ab8a298d4cdd50923908a5ea4884aa4196947c5cbd4811488a96e1866eb987619e79036323988197244e4a4016ffa0c086d1a10080c2acf14173140e2f641c6ae4179cc820bb73a830d9e6f0ca345ce3dc849ad1548e2870163d94a69e0af61ba9d72c3065413bfc82c767aad2c55760a9289c1f87733b5e81e2e656a131845c619ee383b47c610c7da9ffaee44357733b610a14b7eb3b11cda6f697a573368cbf606f2756606c80a2275319b337de9133728e4c500d504608edc976acde0c3d746a81243c7f9c1889a3dbbbd242e6f2d6c5fdf82b0a41d4c59b490825052af8e9977d9696b877b182ade75dc7e65e328d77775eabedf052ecc4fb368e1531c035e44e1548466417ac5e51969d2f5b594cc7673da9d5d73263a744d0aba6cee893b73a959f1b20768b680be0817cd21b51d1e1536a1cb07d2e830d5147c3829c5ef330e5539adabe1bffade75a3915700382b6e481deb071dba327f7331c95bfa62a602657408771497528b82b9846c30278a0120589c48b0078004b96feacfed3c5b3fe4e4a49ff441079512dac6066d4f73dba132830c2f6928959f30fcdfe1b82a961e9ca5773a8a58a944840667e6988d629b3f8cf6e68cb2066fc88e1213cbd6a039009d1f712689ca2b9ab6b97c33d288f5130c08490fd562f6005f83db7405cbc7d49bffbe99b21aa2ab8ee3de32ea6634f2d1f0b27ace622e868cc9aa394ba706ca339e682a96e49e7fa536d106fbaa9ad0718a62c871c4fb1fe0cee829dca698a84c5366ecac2930e67fbbb1c038d24480128db8e9aac6f3cfb6c8749dea04b16accafa969b2b7c5bf5eda0dab3cd9d495b3894f31cfa6c384fa1c10a2d1ff3b1d270e98a818d607bdd6e3c4412872d7e788902083b0b8771b2f9e54c05dbc3aa9720e8c94ac8274b37cf33c074c634b0fb4b8b62582e98b53a07448e71bf6e6596c0719ced93539e5ff3aa72b663fde0023a6db13d5c189f3e5c104585b94b6affe55225d075f33c53e98a49c8cce186cb6863d9f8bf3de43df7dd26b6b0dcfbb24d4e2e80ac3a62b77923aeb15514a7b86b7da2d032c71d5135adae5245fcc3bbadc1327ac6995ab70a000d21d11a7dbce942c45c200b27f427c7d7a193e729392f924a0842ee9298e0d3a47095e563dc599ad1b7c2f7a83950e542899a13ecbfb2bb7975f874459b3dfa0eb12d4c2916ffb7bf91c1b9819db6139528c905d3ad62e4e354a3979b93a8ee88616ab9c99914d480cf6239174ac5f1e37eb816389eef047a141b8d0443ce5bb73d6945d05b144f7bd6ac0ffacdd41e26f16a29df9ba9578b104f78d1daaa1ad73556313d16189c24c4d4c670340f99c4e2dcbb4e678383e2d9f577b0e6015e88e5a7cec53f8ae5ca361c0ce1e942bd500db71b3bd0baac745349ecea4494dcc46460d4053c8533e0b7ea9f4a30b594b648134edeff3c14232d747b1783cf9f26747c09f5931a069c62d1b3123bd836bd673571144fb3fbab60fed9b6938bfaf4f030e527e9cdb09fa027a2e48ad69813f13d033f13c83325f361eda086673403f8fce940fbcada685f98d0ed1235e18eb92199ff630d72511debb9a3e50ad6834fd2661cfc539f6bffa4558598722b8c42caf53e9ecf839f5362709112f5d20570a2f017616a7daf2673588870cb183a67787ff2ab55aadaa742f805d87eaec1f49ea3751830ac74857c87c8739bb447e7391813ae0f932da2354093de6043bc5c004b23c7799bbeee61673abacb5d6464b94255e6285420825d5744b12d033226327806776c2d04a2ec0f16f199135e83c2d66ac5be2211740b88ef3ddb284b1a460351196ced417f4613b963a41524dfcfd709dae54fe702561e170bc6120f7a58cc4c8cb39df46a9ed307be70a2a1a5dd3ca76537ec413bda9a6a6dbe75597905d4cb9a917b1368ba8f3ee634059659e5b0a4eecd0d452ef8e397e71233036fc3af46d8b5d1ce812903addbacd2781726fbaf3c9e9d97aeee36fe767c169c12383ec18829913b625b0aa9e1f8386baf848fbfda1ce3f3a79ac8e3b66ac9d967a3a186f253053cac50d495cbfc03d79b0a7250e7fd13f1181d081b61621425a2a0f2b1388280628feb4c8b69c053c2646248da12dbf3afca6b65aaf916729acdba89ad7a35942acc92482518df53f4ac401213bfdee73d542bcdd9c10c7058b4c50ffc7361d2e6f64a7bbcfed7a01b27c5847ae4ad4fb746f6f6f9bac22cfaccae851684b0af76030f480759c9161fc685849d073937e14e478927ac8b35071279d2692c9918a42bdb24db1ff264cd7cc7e4c3f7bec49887d3c2030e755a8a0263eb53bef5596026e21b2f602ddfaa48e0e7eefad45132cd5adfa739c6a1d2a8fc5ee56cfd2e4dcf51d2b1d50e9017c925675299cb5f949d4ffb9101260c315898c58b8ab485439c8887db1997f9830af1a3148474b423286604b990927f43aa01176ea4775913957d92909d8cee66e097ef9180bc21e3c4f07c6f813bd5c4656489aa44908b1a1312f3d6761140da033dbd34f315103b6dc4982093b7a148934fb52a445c437ca9ebe4317575446781cce8bdfc069f852c36ee4a1d3283fc1b72f95bf4705c2e18ae21a1b5082691a41ef47b3ed8e131d36a43f9245d0b3c524e9c0bf9243ddadd4d6e7ab0cfe9c8d9f8e4a8275eba8cafa4ca52a6484d7f0370290e20d4f043eeab8d35a713aa3a49e96db6390eec5bb644f916e5822d59f3052d74a288c8cbd190628e17dc7857bfd5a3b41d593e6a1869bc30604a68192d9df101f404deb84f1c8ed1c516bc6627193db4588809a43c80206efd5cab6956aa387bca5633355c2c03d066731a967aa5a053fd421f0801dc7c191cb429009f2f6977bb21e7843ecf9a6e57c9a78558f51453c7289432b4dc06aa314ffab88db4c4af980851cc8c426a641c979f3c4305a09d17685d6b89a2075593899af708848e11308c691f6078c2481a60f4f86e545d1c27e82026997e592ab83792e45c3dbc6eb0c2f3bdd42b8f5cc87851a78c74524bdae06191f69b272f7721289e8dd9e5581a0a45b0d72b51b92a5653654497fb0dab609c474ad59547f7d41e76d8defff276e884ef5b0e4c52e00ba1f3ef879234adda7a17135ac81f195ce39ad1824ed05d35fd5a453d34dc32d517d4e11261f8c0b8ad669c112f8d572f90ceca026cfcb9a1e8209647af808cdd06f44a4e9933502b8900903bc33da70845b382c99b1d412b8fde59d49e4117bcdbe2360671f3330ab684d43a60ab9453faf01e2e809f184c6c20cb3cb720423ad2f5aa20d959145c3b7a2290fbfaf69beb393d6a644514707bf2e92c4294e281f08b9ef8161ecd52603e0fecd85383f0356a5ce7fe91acb30233498d54df4c0911a6220972bf83c10e61827c5c231469b0e4e7419ea6982e5d0b7deadc9ca4cb88aa6b6687d16ea98f61f7b5757efbbe526ee83de3ef8e079ea4f57c874a402e75b285dd5a2ecb582a5849af0760bfeb37f4327b939b68ebb5476471c578eef315cd83b63a662f17c2ad0f0f9feb1470441b550a1082ddb10c8c022946c6a10159eaa837b8a5fb95fdae659f6e8512ba2709f977b33bcc18f76aa0f2c9db1a2f5ff599267db8668f85a83816050e9b8fc5f980371865f811c305a1531c25b240ca12194bd2d92711f098a0ebabb47cfd94299fe2aca3bf578187a63661626e012255eeedce619723887dcf55356f590b929faaf87fc130b4e69f0daa5b201d2b758e6f714bc5ba40e5b71f5037961f36b19f6ae6b90ab7e58d8aa3ecd068caa3a603fa87deb60ee589d6bd754070263fb2913ee977c85dd7b8ffdab9fd9feff0a6b0c3355a0bd7ae3e28234e974f71e302c1f0424c0af1cf15fe83d8fbdfd90182c46894c77e7bca7dabd28b914caa0781a397791e447064c899d860c8ca3177e588a34007cbf36a08475197614eaabf7832b9a82a2f8e707558bcb1e24e80b4ae16819bac611636200ab56911d3280dba3187d806daee63e9dae56ce237d3a354a71be22fd92ea5785f16d0e06355531f841476489c7b0f4286e0506c388173e1ee783925fccf486811b37964186ab3c4b51f79fb1f9d16f1e2525da65d1c24fdd8a62ceba2dbf749bad96e45ef84181b93ace00054022661a0f3d67079c0e22c6bc0344fdd56e36fa02bafd7c704a5ecd36e6edcf3368ad87303001a22f216cb51994508451abe05c8eca31d7190156b0398c1c706bed9d177a5781de348839924db62f1cfdbf020986ad00c003999f67a06074b5f9cd8d5fb96af28361832b1fd0a1f4a8cfdffd6b04f5defb48883e6cdc6873f95c3820efdb3e8e1b16d1071fe0013d6f587b8d8cef7b4129229c8b8e0822537054ccb7d848c8ad1f0d64dcb4de7c24e25e2a110e8da7547f6b817cea9a12c74fd9a2b218a786da79174af3dc7cbcd2c442278bda8264ed58ee2b87deb562b64e215b6a309148d548e37cab95deb9d22619f22bf39f8575c31dcd21e8e0fbe82e3c49f0ceb1de593f8304e2a34ef8fc92765f2cf128c9f8aed77551bcc4e7cd7ff34e87b05d68d0245d826fbcbc12cc06416bf08a7c8486f633e94b6764a091648fa015d036337d32aad0593ca74d4878147a490f0c7ed0e3d1a0a22f41b947da9b5598ad4853b48c6b3ef9df101e4bd5a4526bf9370d71f4e75dac3e0e681d79854a6ffa17a4cedcfa52f34aa0310931733f1ba324c5b2863947fe262404c1ec8b49da76ca7f383fba3bc8d11854993a2dfca7750101dd78bf867e162b70606be8aab4af959a34f897eada061f9b8e86857a2628311d9bc4240ecd1f76fe5fcbab4a7d16a6a089d663390cf0f77028c8b2845c1586226508c9bf20c3125e26810d578fda4a6da9f2fe531893a602f97b1893cee23bc0e58e95b4fd23ebb281c4436a889af62f8c81c61593383f56479a7379d0a3e7f4aa57cf99cec1b35bc4c5d8b18915af57e958b883c6d5c9335bbf23033bc2671b9176732b89940ba852899b7a94584d73856df1f4665f3385b71c49d1509a6745d024d6c90c30c5feed7e3e52d99b2938b0a1165312c6d35eec6f2566a7fdc5487ce7de50032cd6bda1751e115796faa6a3e70e72da4cdd5321beab8d536123ca403cd95aa369328c0a9207ba5c60e0f4853efbeaa54fb720182f4be516b8a473957c80d557b66f9294ebbfa6690166c038b2962b2eae20b36eb84639d66d92e7caac73eec815124ae07d946a5da4dd3441736ca574fe3f374084ac1e661c829fed15737a3db3a56e51d31dcbac76681539fcd9889079e0bd76c3eccf450affe4877bac4ef3499bf6", 0x1000}, {&(0x7f0000002a80)="dda962ebbd3d8dd47a2eac7a8682ddb703a4289b241a0726da6ba6d1b162970913d2eda1c05b147b56ced78c073bc9e9c76cbd2245225ce343b12b470005aa6bd182ae03386a2ea74685c84392042ee92edc561fb02ee38b61ba776665c27c0f3b37de30427b26b8388daa7a1f36b6ef68206314cb897587b1a21b06242ebd14433b9bb5d756ab7ad239b3877d61afe573b3936e52e96d9ba828b3b7d59a9e7abae02d5d734f90cf7420f7e879c3082ada498ec7194672f9955252b3e2a0f90221afa0ecca2784e73cc0e069ab850e793cdf5fa6baac01f9eabba06fa0a2292f60cefbb7b69784004e805c4e34f4d74d43f3dd9304da", 0xf6}, {&(0x7f0000002b80)="a707784088220e69e6ebab89bbebb5b83eebb9c4be57ed52f3308451c5064df43e410aa0088f3547deee954517195a3e6d12a9cb2c7b2bd8f50dad864ff0c8787aba8a0ecc7e33726262edafc7e872777bf0818e9b78233b7469a3ad9039c7750739230758dcdf73448cad0908e766513784abc124e5804bfe9efac1b9ef5242cc9852cca8d13184c16ed79a387b69ee11d5a1bd41778e65dda2e186fc2d758603ffb174fca001", 0xa7}, {&(0x7f0000002c40)="cb1ef4ffc0ae6efc11a445bf0422b8a676d95b2de1d2a1f6b58aeee219817044346a0054e5d3e22fa5d4a04b875583d36b2d0700df8aa5f26d743e8dc8d59cc0532bf9a7eb9f3973c087d0ee0f4518726e4c3318595704f0efe320b37eb7455a9dccb671893955c7bae6f8cf5ce4d778d376352fda7dcd51369a4153c14bf7d164c6c431acc1f37e794b25b4ae9b63608d835a8b9397f11380fa9e4a46d74e5e23e682287959f25b7700d1b84e797d6246742b733766c017e726f79156cd9d5f26e03b65b4f62181c0a6e510e0849ce0b0c8102fc1d2f808360e582df9", 0xdd}, {&(0x7f0000002d40)="5f55d63445211a59a08e9692999d42e4b4f9f71bbe1a1958d6a667ac491013e1db4bb4a474fb4f4691b6a2e6cedd152e8efa017f617b26d461d42155fb3b00e8e9f10013656f7d1b16eb40de4a3ae5850fbde0880687efe853d491b58fc2f138abc2d882d3193d2d70cf2324007c690b133c98954f1452f1495a254ba8f07376e5bedd028c794fed69b2ec4a8ec7450d73e33eaf06db8c08a95ae0faf00c85", 0x9f}], 0x7, &(0x7f0000002e80)=[{0xa0, 0x111, 0xfffffffa, "a0aa9d8b10c8be1c6862621f1c7554147c961b1725075ad914f4404875d2ec8e3ab5e263fe438dcf20606b9c0023df22346428eb0260e02c765279dba67de5e449fd22b1ece7885af3382c22c8351a57be733225c8e16b6d2ee4a1d363898406ef60e525ae469fadc0dba4676d0dc904fbff2f937be269923a0b9be7711f8be8bd7ab78e6c857c197c34724ee99382"}, {0xf0, 0x29, 0x9, "faaaa2e152563207d0e8bfbd71630ba8bc1f47384a77175c90a6944c201a6d65d2bea8f04e09d618efa16c6f24e30f5a3529073c5943be1064968f1a2a6d6096e94f40ecbfd52e700577589505ccff0b797874382483e80a31dd4aa6675073dff1f14afbdaa6118ecbac3c4a71912c61fec985b8b35d56dc22eaef0a849a2dee05684a3d60b2de04e324682850a4d49552ae196fcdc724e81b5194cf7fc4faac389e20313a5efac888141cfa3e30db1b62e9751d944a4d71b178477ce4b5bb1f00b5805375025f42659c72add05b544d84cba8d7bff99f1b52a5"}, {0x68, 0x29, 0xdb32, "f3c1df037659861da198c9d139733bfef51933f97307f5f31a8b48c6a33acaa136dfeeb3b3f3d999395081d62773708ba85e7e51560ea5f05cb61663f664907033370d4195302e4e411e734c6449581da9"}], 0x1f8}}, {{&(0x7f0000003080)=@vsock={0x28, 0x0, 0x2711, @my=0x1}, 0x80, &(0x7f0000003280)=[{&(0x7f0000003100)="927238b7e515656d497fdb5054522e524987f0b736df3fb1841b3758fc3fab72d15e056e00352a41ac8bb3c9cccef3e43efe9acf604beefa37743a621a08c8b048257c103ab2750da3d4c3454dcada02cb6e9610b3b718e9e10936edc975a8532d9276328fbf8b4abef0", 0x6a}, {&(0x7f0000003180)="9dd6bc32c545bdd789dfdb78a772b1343afcacb091cded9c90604cd63625bcda2d89f79f8ada6e5e3b0b1036b1820f35a7df590ab752c918488fa7a949", 0x3d}, {&(0x7f00000031c0)="1b9021cc2c993fc4e7c057a9ce8d7f522b2cac6820bd4e4e50327a2719e36db333d21f6b74996972b9a254bfbfe8962083e74f15f2156b4855520ed483d7997ff531702c57a457992a52aae6dcada3ef65e17dcb6c9339c7ac516cbb767f11935937d63b28f8f25986103f68f421bca2aa8436223246ae2999ebe86ea3636fa27356080377f3528f1ba390146b33a317d6a40cd4e06b09f4435a482f607c77bb", 0xa0}], 0x3}}, {{&(0x7f00000032c0)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003340)="4b0742c62b157fb62463597d6f124c5eb3840add1d99e0336b3baf3a2d74e4af6487de028f2e68b641d9412c2b659191d8cf9b80d87236bd4f513e80631d8d0b8edac4f203bf020fa063e5caf1ddfcccc8755c4c2148dd423cdf486a7a3ffe1658aae149937ef5c2dbb99344ab149d799e5de0683932040c527adc9936e2b692148407e6463ace0ef0d88b67c055192303a1bb2b3bc68bd6b0547843c7b34f488263ee36a8cdf3b0704c7ea67fdd63a1df73e49f8dadcea1458747bf45b4cd23d80c1b17aba64c60a979b875f8e3161b10de80b19704383edb4425bac6660704c73c3a8535e7bf4af1d132de7f08612ec2b67a24be47f73c", 0xf8}, {&(0x7f0000003440)="8b031591c8584b4e969aad9f155d8ad2436902337441d2f7fafd0b55313b3f9ab17aaebdbf30128a79dd53c421dff6ee7907fc68c9ee6321ae63da1d62edb514a347332e42d9fe4cabbb8be74461231584cd2df88fd6fd70d4a5bad7ecf1", 0x5e}, {&(0x7f00000034c0)="94678550f95aec8edce1d427002c12e2a71715ba481eef9e201d5ed13a822c4478e5104a2a2f2bcd04ca9350e288a09974636cae329f5e76458245de45a15a9b9d6735732ebbf4844483553380fa9d7ce3e2447115aefd2dfb8f8d4a5a3fd9fef8ab0a0f09ff3033eedddf48c95f6bb5737986ed8e4ca5858a6549a01f69614f967ccb653103f4ecfaec5746125f1cbf3abc9778301ee1921f5f3a6a30ce7ed5cee5e9def92e49b3eb6a9864f80fb0701e5c4c6704814441ef20bddf7e51ac8ee6148669977418a52496f63da0dfa20954ed05", 0xd3}, {&(0x7f00000035c0)="05dc08f9f654354a2a9291dea1749dcece2aa2a63566924e318b5fa5f90857b7b3e3e6639ff33b5438c589f025439618c39cea2571fb4f4b2709e5e0c639d404370928bc154063b06740568bc7794226207fcd89d39faa7cae57aa0a76e919c6b004403b88e2a2200903b6016ffb89f69162364792e6412a6c4c789a33fde98a0816cd22c69213c96417bbe1f99c1cf6f890acf1516804ed8485129624a86de9686a65f2ea31c2a6", 0xa8}, {&(0x7f0000003680)="2a0b9b719633ecbf58743a79aad021a4b09fce07ec2f2fb285c3089b8aa3e37389041adb1f55895f1210aab7ae74fdb23186c852deced660ba0cdeec3fcef624ec7f25742098f0e73c80665836c7a572fc3097481825b0aa5cd5d282c59968705bf2cc02fd2e3ac4c843e7256829a99af20c632a18f38c719ae3ce97f0d935a1f16e5154a64e4d908679fc7e0d97a2c7bc6467158e13c1a7", 0x98}, {&(0x7f0000003740)="3be9fda1b8a3a0f64b5f7d155ceddef43751296f3dbf54b6dc63d48359eaecc055bf20f58ad84d50e765726c8f2880e906b7a4d631af9145f8facb371d0d348390dcfe00b3feea2d58d519e4f8a24ac6be26ab0b2fd19c41bb0c9418ae0ac28ceb3031fd6a23e04fd899b76d35f943ccba63406c0504d83e3ad00d786e0436b9dcd3466e89da23ce89fb7174b208b94302380786c6b7fb19c9d94d5018ed5d6aea90ac6da9bc418fc88211bc", 0xac}, {&(0x7f0000003800)="d63d", 0x2}], 0x7}}, {{0x0, 0x0, &(0x7f0000004ac0)=[{&(0x7f00000038c0)="7219a5225531dda0cfba855d213d", 0xe}, {&(0x7f0000003900)="3c041f9c01a2e8329e85d32508d323ebe38f4d99fe3273b5a43df78f84d1069174ccdff70afedbdd4861f892ee5972d398e73e6e4d65f74e2b9c7db74e25fcdb2e3437579e7df78bddf3518fbe69639f503c850e5241143f61e4ba4dde33f184ab8e772a8f517e0e874b7f9b83e0a4089a4858d02e1bbc3e3f7c2dc756f2275ebc96b55d8e0983ceb7e5e4e17937bf318fdf42a10de2ad762567", 0x9a}, {&(0x7f00000039c0)="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", 0x1000}, {&(0x7f00000049c0)="27635f430a3e6a5607f2c6fafa29e89038e9b8cd64324a994c4e812324cee86f40fcaccf3684b56c9a74493aeb5d611022d4fa88d39188435e1c", 0x3a}, {&(0x7f0000004a00)="5128f98ee47a69b3", 0x8}, {&(0x7f0000004a40)="e50a44074e224044676d0d8c76409726552cdef5e85d9bc183d5a3effcc311c352b862c4c71880f8d637c77be9f181b57e3a68a6be6a16f3d6fd1fca1511f8cc5c2c", 0x42}], 0x6}}, {{&(0x7f0000004b40)=@rxrpc=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @empty}}, 0x80, &(0x7f0000005f40)=[{&(0x7f0000004bc0)="6a8cb67d5fce71344b4b5a5455b9b5ef99134f3a336293d2c6e08279967a05ee5ee78095ec7bab6b45d4c22ac3159919908163ce889a22bd1f774463f3af22e72842b2c350f07c03f2a32296e91b5ccbf1b6a0aa01c45b28e4b7ecd0d401a87c0c85d64cedf514ad6aae73cf07b9dbde6845d70bb403aae556b28931f60dab2dfea6e9408b0eda1ece10d720f636f385be6b2d48ea520d09f7e16539cd31d6a43370d4eeba21e6334b5d86b016bc76248b35dbe21d8ed14aeb", 0xb9}, {&(0x7f0000004c80)="0203172e3ee586ba2d5a7d5f7accbe3df0a51c2281b4150d1e53629a4de54b7b0126907769cd342205fe49cc8a7e4c541ab1fdf035fc219c85340404b3e1dd32405272abff0f2d27d47207ff559ec392c601fed28e7af77cb7f37b65c68fddc50a7b10264f4a8de927e27520919f1d083dca169a9cdccd696b67fc1ff03162c37a1d5406a5f5e48f08903d6a4d65", 0x8e}, {&(0x7f0000004d40)="f0842f476161d606aa3b4cbaac5ef2f495be9d917a7b7614b737fbd2c2c88308dd6439dd82af850f61741aa80b08a03c53765d5195f418ef0b0730504a9c31584f9787d8593611e52b01b3e0c390e5557ffddf8f51707be6f1241176a4c08f37d2ae2aa357a21d6ed3d7cc334ac363ea3e1fd5679574463824809745e503eb1e3becd0fca218d15379a8ff839f9ba6ad30a1c8f1b838cb79b8c7acd43842ad8b24fb8b003d5ebd66631b0b4193d0744ea9967759e94131de6a3e490b02041d76a7c07f37754fc54e299fe6f53efb5e5349d6a2c28a3d084009acde298da85ebee1b3", 0xe2}, {&(0x7f0000004e40)="3b0f9ea51cddc7500a34fc13c83565b2eec635c79427238c12416bc89863d613c0b05883b277226c491e178aa9eebbfddfc1a477de86971400", 0x39}, {&(0x7f0000004e80)="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", 0x1000}, {&(0x7f0000005e80)="9aec46e6bf2c73", 0x7}, {&(0x7f0000005ec0)="dcfbe94050", 0x5}, {&(0x7f0000005f00)}], 0x8, &(0x7f0000005fc0)=[{0x58, 0x107, 0x3ff, "44dd5057ada781eb3946fec4a7ff4abf302f92c087f0cfd5e0d5d27d15a56e5702dcf716bf2ccf1e7bc12f9178e04ee8da459701597d81ef8ba26b593aa82411c6b2c94c36a40a"}, {0x110, 0x117, 0x0, "f66bff8c07b62894f100dee849428641758c2b5e80d5a12f0153b174fce1ec4c4c2befe1a2fd535330e834fe4ba3f8639aa9e7c26ee5a16d8117ef08b07cb980857f04adff8fbfa2279207cda923bd9cb2a372caad4608fcb6594bf3707dba3692aae82606ef440b7becebcbe32c18be96e8bc0b3b04e86e9f86d3bdbc30fdd5a0d2f3d91282fadd87598536f2a5e4519844ea7c691523dc5fd41a94829a5f3ce12ef3b6f7723d7aa4ff5a007d4fa6a01b737f45f9b3cde8b33f2b28ca3988b5867eb8169f2afcd452a0c6bc34f985086edc555fa0fdac97913c8b42bd5cd6936ba8a3c3ee535347bb358e7f7a1b7c09236898fccd818e833f"}, {0xe8, 0x10a, 0x3, "5ae15f74da311b91d402d5572d523be33cc16e58f275c36b8496d87d84da215aa368f292866e09cb557af2d7846ac03e7aca58a04f5de397201e0e28a04992b163ca14301a46d7fd9e0799d3b386fdf5723996629d31a16b1285431557c983e7daa283d2b996c5dd3f4d96be19ecaa4cef9492c3a04961b7e7f9a3a7bbd0364371765d57dde1ac302d147a3e38b595e1e761f9f2c41c3b89c517e6cfe7944f006b2476d88d41cd93a620b25b947d0ab9d107f26f360df75dfc9bae29207322f2d9871714d917c304091dc2b07d4209836c0f"}, {0x68, 0xff, 0xb71, "3d4e795d64dd4f9524464958481c792ad4175599583042a575df24ae80b411f08eb9d5946a1e031d8fba84e8217e8e4c6b7adbcc98bbd9f5c2901ec10586c013c3d30b974e2dc5f3d910f2eeda5a7cf1e18673876d54b5ff"}], 0x2b8}}], 0x7, 0x0) 13:13:25 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0xc0096616, &(0x7f00000001c0)) 13:13:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80b00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:25 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)={0x0, 0xffffffff00000000}) 13:13:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) r2 = open(&(0x7f0000000080)='./file0\x00', 0x141880, 0x20) sendmmsg(r2, &(0x7f00000003c0)=[{{&(0x7f00000000c0)=@ipx={0x4, 0xffff, 0xd1aa, "c136957e758e", 0x42}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000240)="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", 0xfa}, {&(0x7f0000000180)="11b39251d4161bc2c6863311b0f36fbc7a7d8281c1ae2b7c76d8becdbbc3368d76fe2b4d0672e1bb3183e60854c5cd0e9ae3f4d6988b55c55184ec484ddadfbde4d06f3df74da1a58c354d67609118953b79534de6301d4590e1cebd1db7202559ddf4142a3e4dfa1d3c2a7c9245104a593c3e1235043fe8bef9ca21f48e", 0x7e}], 0x2}}], 0x1, 0x0) [ 278.713129][T12426] FAT-fs (loop0): invalid media value (0x00) [ 278.726310][T12426] FAT-fs (loop0): Can't find a valid FAT filesystem [ 278.737514][T12435] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 13:13:25 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)={0x0, 0x0, 0xffffffff00000000}) 13:13:25 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, &(0x7f00000003c0)={{r0}, "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"}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000240)=""/220, &(0x7f0000000080)=0xdc) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:25 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f00000001c0)) 13:13:25 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) [ 278.770046][T12435] EXT4-fs (loop2): group descriptors corrupted! 13:13:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = accept$packet(r0, 0x0, &(0x7f00000000c0)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r3, r1) ioctl$USBDEVFS_BULK(r7, 0xc0185502, &(0x7f0000000100)={{{0x5}}, 0x103f, 0x20, &(0x7f00000003c0)="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"}) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 278.933282][T12454] overlayfs: failed to resolve './file1': -2 [ 278.970327][T12453] FAT-fs (loop0): invalid media value (0x00) [ 278.981788][T12453] FAT-fs (loop0): Can't find a valid FAT filesystem 13:13:25 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_DISCONNECT(r4, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x54, r5, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1b}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x10}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1b}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1e}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x12}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x6}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x37}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x26}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040}, 0x40000) 13:13:25 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0xc0189436, &(0x7f00000001c0)) [ 279.032578][T12467] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 279.050698][T12467] EXT4-fs (loop2): group descriptors corrupted! 13:13:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x541b, &(0x7f00000001c0)) 13:13:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040), 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x200800, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:25 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond0\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:26 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) r3 = dup3(r0, r0, 0x71fafe66004464d) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000140)) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$CHAR_RAW_IOOPT(r5, 0x1279, &(0x7f0000000200)) 13:13:26 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0xc020660b, &(0x7f00000001c0)) [ 279.285557][T12487] FAT-fs (loop0): invalid media value (0x00) [ 279.291739][T12487] FAT-fs (loop0): Can't find a valid FAT filesystem 13:13:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x8, 0x0, 0xffff00000}, {0x80000006, 0xea}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x5a10c1, 0x0) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{0x304}, "d29a5fcc933b207c", "61349d477414b23d32268e67cc6b9b158bd629963b299dbc1c9914905b7d7504", "6b03fe49", "9fc754e284a7e475"}, 0x38) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond0\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:26 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:26 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x10000, 0x0) ioctl$BTRFS_IOC_RESIZE(r3, 0x50009403, &(0x7f0000000200)={{r4}, {@void, @actul_num={@val=0x2b, 0x81, 0x54}}}) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) [ 279.481898][T12489] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 279.495241][T12489] EXT4-fs (loop2): group descriptors corrupted! 13:13:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond0\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80e00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:26 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f00000001c0)) 13:13:26 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) [ 279.619843][T12508] FAT-fs (loop0): invalid media value (0x00) [ 279.645499][T12508] FAT-fs (loop0): Can't find a valid FAT filesystem 13:13:26 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000340)=0xe8) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0xe9, 0x5a, 0x3f, 0x4, 0x3, 0x3e, 0x101, 0x99, 0x38, 0x30a, 0x6, 0x2, 0x20, 0x1, 0x0, 0x1ff, 0x4}, [{0x2, 0x7, 0x6161, 0x8, 0x3, 0x3, 0x7fffffff, 0xff}, {0x70000000, 0x200, 0x7, 0x0, 0xfffffc4d, 0x81, 0x1f, 0x10001}], "a2493e69c189c58498a82aa93222a943cd590e012fcf44fc35f37b2232cead64a34360347665e03c995d58300af3608d560d6dc379880582d9b8be9bfa59c697510813aa77413c258e005b901e22eaff655b716b44d9b909a9b2edb882ee4c8f1ae884ca59d1d5f59b0850558d8ede2c8f7cc6d8be3be6e6b89e79aa9078760039cd56d52b01ffd3c4f10f00875e77c06d2220d37494440bd975d9a230f3e22214160257cc2807935f8a3f5c535843ff61cd3d433f5e71b9da983cc593cb0fdb4fa60609", [[], [], [], [], []]}, 0x63c) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x34, r5, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6a40}]}, 0x34}, 0x1, 0x0, 0x0, 0x24000000}, 0x24044001) 13:13:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f0000000080)=@rc={0x1f, @fixed={[], 0x11}, 0x1}, 0x80, &(0x7f00000024c0)=[{&(0x7f00000003c0)="3c0ea85262eacabb2dcb4ed7c8bee9bcee20ea188b702d88989a5773edcc3c4277a3e652c4f4447d639c2c65b3c6c8128ba37cfbff4aa8f87ad4fdd1279edb2343029884872b5f0e6d519d8c9fd3e7a45802e0be9ede28b80da51a3d7057fd1b87d8f96a3300ff2668bac57ce837444602e7be7f2c518450daffe2713d1ed230d6e8abb2faaeaf825dc98979097e3960fbfebc25b42c5a58f04ffe3ff6aa6a587a1fa5ce71e12e342d412610febc7e36dc7d9ca381e56f5a115918d800822dfd61e482e542f0b76952edb6e8d09b084975333c6480f745ee7e98f9340724f48bc216dcd5e54f681711c75b40b709d056d157a4d583d8d74e465c84cbccb54f45bac60a298d05f7752bc8b8ad16143e81e3bd4f1b91c61b1161bafd4673ff0d90e2d1b3052a5f4d09abe69607262b0b961f6e6f46a6c448a5e28a521c17bd6c3fa6feb943c891d56f5eb991bb9b5e0911f1d9d29ae5a290a7e70ddb55309932af6ddbc3692ee3f7c967cfcefdda405e7c8a7096d88608b55d493bc5dc47459351fd300596b02680c57e01ef34036a27f189aa94ab09e30d508f954a63c768aa25a6faed64f9e637639b51463be62bcc546a16ae71fd5cfe4d2ec436021e0cce6dad20564300109890f52e19ce53d1f88ce2f493b53ce8577fd9e89d1cbb6bfbd5dcb153b926eab3a6221be06e49b96126b2517da9418164f3ee3a5d976a55c5ecefe5e7ff52f9dd2fc893c888c915e259135a8e5e0b12acdbeb467285bc0c976aca0dae60b935b9b2d8b7b7c33f2ae9f3f103ecae986fed3afe21ed7aedbd96f556a4305ebf29f182b46d0238a9322570ca2fc913471a67d78f6f6cb4be3e7f451f9a2b3584af5ebd7236e5a4141a5521cf57f34ed95c6b8f64be42bcca1783d52070c25accca8618f976a078a30f571ef5792c05e1581ffa997cd316d3df8e6bf4212f1bd768f27aa12d22e937ae0d032787b88c43229e4508b68fb693e446532d6381e171fc826708f4411f3a6252d0546c9f829585617290d89f56ec2501cf748da78d64ec6ab5486262a79af5ccf6d499d607e68143a3f5215ad619b312db46571fee8a70b69234154a5b53e88ca26a8b8968e5c254ef88e06bc80af713433e953fd04ec27cffc9a22f4321c5560d9e07722e57fe24374ad2ecbee734b6ab09cdd9d2fe0087fe015a62a583bd13684cfa7ab337977837df3938ceeef877e037d45857193f9093a0471c83c9fcbf63036eb5bdfba0c0bf78707c59a322ab37f2825d1eae27651675fac669e8d5ada3438fb7681e146f69a24c93b8350f4efd1cafbcf497b6c87eb42b376e74dcf07f45c6bb14be6710da887c825283695d7adfebf0e76f3aeb0615d6b369f7f160d1c3c33c07ea265acca2cdd18864cdb44f015a034fa9154adf747f0ca2c114168b790839b071713cf94a93c62a10451a73f0c1fed0ed1de4def53c5d4101e6087cf2f4c81d4b88bde4566b18696821553ac2c1ce8a797d53491da2afbf9a0384f538d24a7bb8a64255e866beeaaf1c9a32bef2c099180ba547532a403577485b68fd86761a5363f476395ff1ccfa49aa024e34faccad15c740caa8c102e4d0528a3ac532646ac61a7bda13cdd99060678a71b1cf6ff2b55399772f33bc838d159c3bde31f68d9b6163386374b3267fca034773ee7692109724d6a5853dea5b80182ce6c3040fff8d57ee20e0f5adf422101a71fb40c31d2583106d20976cd88b2cd2d33aca43daca50c557937d807bc68041861e08d2713e544343457497bcebaac92d60e4a8c910e45c4796df814f7f0baca824101964ecdd266d7dfdd81d4942faa84d41f28c63ec9584f2f025483a36e073d53a19cef0c6d8988a52ccbbf1aaa662446310daf0e321bcf89ce49cd2f883df5faf68235b8bb84b0e59df7b126ecc95f9a61a5cae9a68ae0159e98924a1c01c75018a09f5288b84bb45b586ec158dd89cdf8f010450203671ccf9f714901f79958027e6c5e31d0956ee9ee66d0591e3e0266e16ed9e6b64ee1bf039381e6914b02ff6159a63be9a08f8703ae717fec127250e0a48775d0f737436623bb8ec853edc439f922d9f0aa3a9f26d58267ed02ef7e184dd9ef38cc7c4b917107eaf2ff1e8f1a8f13f4b8bc07b532e1e0a10f9ef3d1d42dae1a0d6fc7b84e5b908598622f79a7047c40f93b60bbb72cfc4d268bce378293e7459a9c000673597282dea8fbc7cde9278c348eeeae18619fef91c7bc060749a9394aa20ef20810af305a9b1ed795bba65622e5ebab0fb274c01bd90d120a41da61f7e751e9ff9ef0330ca66e7c4fe3ba4d7c5ef0340f20617968839c18a48ee4c94a3ee23660ac0afd65c62165ce24b21f2cff60bd07ded4c626af54e27693bae4adcf3060b39182cf7527cf931135d40c8ac9a65644ba236a5e02f0493eb8bd4c2af6702421b3d364bf88ed53ad54a131f1f11584588ec757d1fe9a8a25e1b6c406de334095af7c9d84e3f21ad341d55ce27484a51cfb44b5ce1257f84530c2aa2c03ee7fa1e31667eff70814db566b1862514e7d605fee6ee1c8a32f628c835e5ef8964ffdd82ea36cea880009eac4fe27a402cd9f2626afb67b4d397462f58d056c66f65a8065b8417244d319fc8ded6d91eb7ab0b2bd420668e5ab7894016acf80de00a3006d3f526cea9360d8144139c7b4d3ce83be9ac7d0c597427ebd029c9b5144c7a28e68a6bc2538f7a0ec7e41ef6badf58b567111ac073f14dc66dddeb6bdaa8a376712bc2195d7182f5f4fa5935d2821ea7e5c2f1f89755e0aec6eeca0684ef88ec62521be1ba0e881416587ef51c892f30ca0ee8d71ed63f256b4a90ec0b5059180cef13a0108f68423875975c821a775f89adb874ae389ad289b9bc4239848aee1e600d111c941fb6cac4abb8af21e2352f28a6247e8c962cc4c1fa994a4911bdea6b2df8ced18956684089997cd1580401ba64c68905dd3ca0dbaa3ffa44e9701199ed50a67b89867ae390d21a9d83b31754735442900c8068b5d355a39d6414855a435d29cafe4e4faa6304c852daf5d93cb20946d37482dbedd39ce383d41169d43b3a893707a0ae1917b4979a65782102062c23c72a0da371040e163cea4cbb11c30839cfabb2289b3ca51cd6cff0782ebc943a018e2914726f78d4cc7121d8af28d9bd969085858bddcd4676f59f83eb8cdc6b02fdd4a8ba47a15c274ade062771fe33012160173a409cbd893da57b77e561c77acb178d15699e67bb33a457db29b1a6c195da9b355421a68427c093fe9012a4071ff4797a2cadfbca5e188127b77b5f54d6a94ce4d252ded236873a0a55d59b2decf697d524bda2d6c921dc4ffa8573be23320bc724f491c9f935cdf3bf6cd5f988b3293a2178cd39ceea3116c4f5a2f7f7be078ec9ba2ba89b4a03a1e57554519334333f33c704a6d4c42ba7e4320ae580c464562e0076d6e53e0dd1890fd2d0665f7005df861940a1c1fc3927535dc28f08e47c90bbb92267be6d219f1dbfc30fc25f21a81db04ddda3e59efc66ca4783d23db0eebdb4bd085acd55bc814de58160ae4f41f21ac09fdb2aefaee06ce611c4b8c7b10181b5ddb1f021e7e4f081c78e3e03a61b446100afd13d9142d24970bf11e64a3b208563186649d4c10786705cc8663bd8102f718913afe04a212c1b364df76f48372afb292669fed5529e7942f3ddd1dda237eb42774eaa6564046f256c2f31a6d71a3652ce94c3a8bd0d91acecc70a5d791bb71796db04dc01f5b05278d4f3d19aaf6ffe12d83b43823824bb7f022713033d6586b6309ab447dea8fb75bcd8af995caad57e906d6e38e82221a00e9528455f47f7d8fa222f8a5b57e14301d8fa249df3b916708d6ae46943f8bdb7d233591e37ec19b07fc9e8be115f6cc226716f8a42b6df97a7433a3fc95fbf114dd14189ce712f099045b955853079c603d98c7f38c1dd301bd1a896f3b435bcd5c73d6b0198c3b42921b39b33f0297ba8c3f1135178de8ed1cb4461738431815f1f0891a73bc88f229257970bf5e8a633814f05cff475a08c4c4d1e01c4f19499cc7081090151976832d673ff917c34798e67e0dd66ba5caf71e0301bfc3ad5cd98620abf8d2ef846696a53e82de141e8b1e2a0dc4b1526eea8e421e929cda482ee9cf9c8f026c9539b9759e271a0515406e639c5a0900b0636e134d43fd099797b85627d86247816e12d5b1b2de9c40326f23f9515ea9867f729120f801b6579a533f38725cfdb663062db274b868671fddbf4693a8eff26d41b7bf2449ea08a2a17444e6e5ec4cab229ba032eb5ee11c3a827c7dc43b818631620b5f636594d1c192e4135fa05847894389ed831c5788feaa5296eba63d2e8e4c35e9212d2985910ceb73616dbf49c13c833b035203e14dc10ec749184107077d8f8ba4429984e41eee1fae32381f8325fe2b98ba2951a814d33fa22397c58b49d023e94234fbdef678fafa44b9f82bb50ef2ce38511ed1ec52225d603b94ef0dab0b1931d1af9e0532aeffaf6710fd5ff5736203dedba189723ef5a259ea53a119bd64e712ff73ed17c3cee3b716a3a505a406e013f5096bbb54b1be821d4efbe0708f4f3227d42a9562bf0ee7468edd96587550e361355a2f199fd0b1ee8698697a64dae9a753b417b1f6a29b36eb2c376670177502386c219cdfecb33029a4bdca33d4b175723ef1fa0d765e8a3be6d01f8f70e5371ba0de757a5886f68e1d7305c8f04f9d1ad2192431f392cbba6f622cb55384308e3538497cdbe1e2edbdd27f3c183f17f9dab821b7e22cac9c6fd097180480325cd7aafbf2bfef5298e25141876616ad38582e6f6ae4c5a30f4e78e2cb93de640d141df6d3d7617e4e32ed520ad42a4197fc500ebb4f99511e5fbcf9857c79e69ffb0489f908642be2dd6c349cab9095d3c22997487c257751939a3180ac70096d71c3836999dac519a554d95153c9aa15b5549e34462528b28d7ebe949dda4051d1ef56c52df975889d602332cd8fdd20c1e92176251a6b6414bf837f8a1b580af00e20b2b705f95a2860347017bf3d58503493e4614ad605db678c56841720996b90409383e5d11b5ceed1c5d70b487644132b7320cb8d1430923b7e20101d4c6165c2142450d4736993bc06bdf625a4c31c1e25b987048e9de0cdde1d3479aa76588c6d39685e0e97bf33fcbcd651c540fafaac4b07689622dfd45ddeff05479aef0a05981343ff3537aa0fe5296f70f8877f64831122aac16df0a40ec56812a6b399270c56a0ce9ddb514c2f015e058e0ab2bc3117f741d108f4feb60d38aab6f1cbcad031a0c131c78383b5a84f0fe67cbdc81392068a28a82301a2729b8677e7b20e7fdb04265d8887f0663d78558480ef062c3ee6c58e10d23701a93166a300dec3d01f6e0c7dc2146a92899f3522b3dd0469cdb9ae5fdc7724940cc8a913b4f652667e89c1f65be6db88bbeb5b3ede5f5f8aca74aeb1b55432b93840a2a55da2fc350f42158dab070667c773d164136c74af6b4c00bad013c38bc02e81d66fec0ae8e9a0b93c5824a29f82b6a89c6055f2bbc39444eea73eb4e1e3f1f2a3c6655323418586193898d49d6c19d760bf20fd9853cdb36151ed0d8415a7a4a941f45b46760ed08d409a08d326cf42cad87b7b43b8e300af34f365cc516e35a089fd62ab83b0d9a312806b05533580d9166ca0808330ff3a1483276229a5631ddd50853981d039777ab3073be41a97e686930197c0f963d3570e046a5cdd636a1e89f77a4811c421c2ad7dc7a77cf3803a494af", 0x1000}, {&(0x7f00000013c0)="1a6bf52b0ea9bf70108a61d76ef3ee76f03392ddaee3e227dfdb1e94c779f210730b4f074b5d90dcd4a85937d590053121ee4e821c29669128bc6d3d816907366c5012a8121bfd263df84d6138aa8b57460ff502b82b9188ec66a445d55ceef8c10c8aea8b9c02c1248ed03e9e89ceef123b07d05c02a6a3605cf39861eb065c62844a6c8f4bab87b4d22c3455e7cd727471d68aaf3b9ca7ab0c777bdd25af49cc15b2eb74d4cd1359b5735b4e391b78abfe321a03c2e26af20ab26486a1429d3b987705f6a0aaad07fe31bf4b3d4827626e4147840c19aadea8d31e3a65c3ca197682ec1cca406b15b8fad9f58489f873f34932d15b8625b7e1ccabb1f6199f2cd26b1637b004223f54bf5298caa1892c92a330859399bdd8db67e2108e5b90007264ac04d89c49a55bfb069278bb58e9fc8a566b22e3e924e399bbfac3fc5d122e11bf9cb03fd0c136a9aa3e774acf138e97bbd0ab0f4f517bc994fd134470540e813e4384b523c33ccccbacbef80e5e807943754951b5ae0984c8ea45d4b90b687f3364e00dd0f93b8cb6e9550c5e3712f5b1e90689c2c8ea99772a09a7d92076ae0e46b223ba0daacc260a7731430f4e5fdce49f3f56d95f149f17887d69631fe9803943e10ca7585fe4989ffaa430c426c1dcb73e20b8f90e0b4587187e3c813e1a89df86633efeed88859a53cc9f2317101e89be6d199c70ae1484b493ecc32aa6f8e73ee12d57b7f763ec03b4d154d91c6b6b0812b4a51fc85accd9942b75c4195220e9ca9bade4ba7b2e91f208aba3d76b45811ab10f8b1582a10ef98d59ddd0fc38f9198a0d8210607ce03f793c06ee39147f78d366ca593fb588643a08baa5648f1c1fdab2523787eb8a34a4e6eb2f2226ab95fee2d093449fcf6c19ad88c5a10526265e08405959f076f5a85aea9c5cca72358d67790d20f08c79af49ba07cce62cc6bb164bd121b560eee81579663ad83a1021b2efa282f970f34f9a39ea78e66164e5a99db228e57790a56aef4583dfe641689af1c0cf9efb5c287b30b50d873ef2f2e52d63f313fa8df0130bee552686326fb57acbad35e41fe1520f8be5ec9c18228cf8bee830fc60911edd2e68da5230ebe0bb3e98a68a3e4c485acfbd15191010e5656b05a3f33c036cbd49266bcbc8736ecb1e1f3ef8ab698b98c0a2acb196d3ace981990b9a82ecd78cae2c825eb0fb57b833067a1b0c12e5533e9e3e37bfcc93b86323e03fb5f7de394038fe4cf4fb419562c6e37c8ba70893f007be6f51f0fae8620b00f7b868a303f3e784ef4b09f7c33b1d554d8924ba19874c9c9a346b3712b8856abf9f0847058bb3dc367d4184aa49e56626b5fd6953bdeaf0fcfe4ced7e9c607a07ce73c9deae34ca9c106d697288f8fd9f83f8259e542590afdf7df551db16dcfd336e1e2c19bb964a07dc8c5c586d9bec1b049f2252a079e094dd3cdb8443de78f36e412ef32b25437677362b0f46669a607f7b9f16714ae6f9894bc454dd924abb03720a3686fb36d1091ef1abf21d2230bd42874628adcf09c761f751b9720b98ce809bb7496019ca33435bfe054e9f8645177e84966a638b07b34e1c200a2eed60eb01bea9a750eb64eb5b132ffd756a2bbcf88b6122c9e8a2dffc119058d685374ae0ff3589d921607c106a031af984114574ff2ce09e79588b0824b7fd95c7c62aa8529bcc146e9a3690516d0dcffaa7c2ed6a1acffb103094bc31356f9aca9be89975e39686fbe01c81c33b2fe6207bfb8e7fb45bf1fb18aec3cb786ff347dde2c2fb1e98c53c47f60272cca256ad7d2925f900e85d051d285d7e0dce8ad5307d065c2adb890147cdde5d7db3d1c88ea72ca7da8c89282014e954f5bef640ca6fc022f6578b4f947a0b94f2d9ee7336342818bec5ed29b63782e4beedab1243c830dc6cafe03ebf412ca4869d92eceade0c80a3e6793b572b01432f02ae31a42345e75fe99b4f6bc2f1e6c2aa497b36bababed4c2b760d0ca5761b6223979d7e8051ff72cea3c576dfe1b5089033f10cf0a82abe71faccd4afda9769d9ce65c9ef4a0828a9099d110bf0e9ed30aa7ad19684790d28be1025399b432adc2c7d8e002266867c4f751c6f68315b1fb42d22fd8a13453e776f5c97f8dc332e74fc47fee7504a4a6faf2dce9e021c6f81701f6690e97b9cc317459ae88dd8c415ff482b4d9d536669f89c87242e43483873e843af14d26dad5eec6693ed8858145926c566172769cf792929de2529441ef6669c3e6b2a6370944e6552171f00c5d91634ee4ae08cdcab5138fef7fab08afb2651ad1554c44be7b9ac66f83ff91002d19d137a5e65cf072833a48aaca622eac433ab63146e3249a3016cf790c654ced40f141ba0a94c07fc2754a7ed953f7bb5e2f2eccc635b29d4ebeb88e5b21d2c0ab8653e3c4b252ef284803f81623e1fdda238a0be616974d1f2ddf18cdc06a93aed812eee1bdf0cd5e66c8b1a817ee83d06c6348314f67d74dd887dbeb36338cb22f0e2a0d7448f3053482a7bdb7f995397e1a56a21eff86fa00a1deb78dbf42aa4905dbac27676804ab1b95ac86e921e1eccfa9d146973346faa7b27efe1f6fd8f91d87d321bbf26f89a46ebfa6fc4020ec0bbc6371b5a5555e155145dc1fd22864e17e78e27eff475922c3c89d8987b75c4ecc0c0debf312919dbd0980392cb8c245addf4e8b8b59f8442355c820a859c0abc32f0e7d055cd83007a10a2d9d6c66300ebd95779fa6c509a868809c801658af07a7344bf801a634372aeb96bfec3b9bddad05f4f4caf3455621480cb0cc2c293a5c000a7df16c7705a748c80442c18273a635825a3e06ef8a6148f6254e6dacd5a5428eba24bf1debeb22efd689ef648f336ea6d5d6692810de2a47029735daf649ba4292f0afab2043a3139789da01a5e73cef1046099f74e85e3ad8abf1dad7668e2aba01b9dec958745eca240755376dc8985e2ac90f59aec0d14e48792e706f4a178472fc4dd7550f6b7c2f96f0af635e64918e3680db4a5ddd153c37fc9b4baa56d7adcf36ae0527920c3b90328533ab97b3655575d14091bfbd66a90f6c87b53d51f498d0caa49a5a8cfeba32226026a110a23e2ac449907196615319d645c6da5ef4c837fab4c51100cefa07b7d472e95f87f126e040d99efcdabd91e8226b818fba3a7645e82175258203d20f974d728db83a174168d5f50b3ef9f3c856cad0b2710d7ffcefae3637178f28b76a66c150306e3ef63ee2dd4e05b7bc2ac5e50bf5948ef88332b1ebf289ea189fa89caa6bdbf3a7c14324a1edba14e5e7bb7e8a0e3d25216c3553f1e9b0bde0bb94565b8820ca6b86e046f82f3787508787d5a0e636b1a5fa90e14d847d56a33ce5b83d1db8f4a40b8e4fa4a4fb4aec93cd62e45f912f14376909a0885e4112a9c3b2135b83c965e334ef4973f80b3903cccadfdead0d08f4d0600197b78431e38e42a8addb99069070a1db7a790a77969415cbf76eb89070a068629afb42d191b9c4c521b7178c00973e4cc85d1dc713c5bf65fcf025ae3060790556bf206a7037adf6da88ff5dcc0d08cacfe52ec7011e1452ce66e842b84c957362716f07b05dce6a77787bb5e77c8c2e4c90c696cfebb55ec3f765a668e2d5a2c989a1956a30bad9d5e8d9e419cb3e61b71eb325749fb31a9cd853f94f0a0b29e3af3d878b1d3dd9c8152daf83b42b793f575d9386fd23117f473eb656a8cf1d811f9b1783f52eaa76505ec28325d7e4e4b9584dedf6274a2ecd6314e7aea1e62e7efcefd3d0bd732a6830a4fd96a4e14b7a39187937ed6c15146192bd5793b96d7b4e43a6cc652809a8bc66b6b5a2ae4911e5f5a02da6c71aaa29705c9fdb1d0b1169b9daf4f8a65a2def93dacd7e7e9ed2f8de1c3c109c73f1eec59128294a88588fa2fabf5d72cb5165f7efc120376c00cf8cf22574ffeb7358c901676795c88a18502728c024f50d90ad8b49bd2cd4b58b454c76382d5f3fb0756aad8e8cfd47977e6a42d514e6b41d45e64180d27d871b8ab7d5b14a940f5f1fcc3b4164e4bbf1c3bcc11241d3d6ef946224ff1768dca205dd56eef04bd695299f31ea6390cf7f14fdecbf7342ee8634f439861d2339dbc6dd6800233e0448e2f53510ca6dcfd1f7f68aa09326227525580b4f8fa14264e3aa525accb0508a9dd950888e92095af4add092758ddf7fe773044fc2f1f5ccd5ca7c6c4b5eba4db7f79702262ca0b521da586bc37f0e4e34feab43801855fefc873dd958388a4227fde46d07dddfe4a1a1ce4f6b1f3d56d1f981719d439491936ec59e3b20d8595ac84fc2b8eff131b21a35ce21da847ae93aa243e20ed201afe53df4b793ad9d004ef4ac582817861cfe113c59e476cbb00ca9fa56ea1a0eab432aa8d1050c634ea66047d7919df28bc165cc8cd2936d2b2cd50510491283f2e1d014e0a7bc19a8e1f8986289d7e45263acc16569c68c7da62c6037f356664f00b34b826ba794ee17cadc50a7c4cf45f79742d60b18e862ad3397c7e920f44697a9a43d6b791cc4306335333fdec9ef00e82c22e1dd000e5105c9c8e6ef9ce0f2d0e112bdcb95d6904322d1e28c0c4fcaf826e29cbd7dd1dcce7ce7e085eda21801a39a90e32335e3a09272fe1445d2cc44b104c1692e3fbda1c6b88116f85ed98e3b648080d014288d3bdf1992d7385fd4eea7e4dc3f100f6afe0cc9d4e6d2e0c0fce8cb03f4d68815c04ef3788cdca3dee34ee4824177cecd734a2a20f5a3590fadb04ad23b5dd836f482ae79bd096ba19c73226b04530fc697b4d8602ae4b13564b7002b5d6e93946ace9b6262ab1ba1f40aed376aa4f29f256c17141c30c99bd920a4193bf72a34b95d7e8bd4d192d5c8323788ec7a30989c59d7c24f871ba8e2d6e66b37b59eef977b83dae3b008a9ea78135a0d7ee9307b9d10e1e4a746eed877f97607a03f3c68599765049acdb244230044008a101760450bbd52eab8cb1c65e7e59f7206ec98e9b6b17ce32db994c9bc05097c41323033b462f8f025271061554c060890452f58c1db0ba52e6b04c8440068431978502cd4e567a1b4cc1f4d62319336a812912bac7ff6c02a4c847bf71937f382cc96d9a4f274141a7d361cd827a93e5c3bd4502a0fc29672a97bcceea1a435de49d43817400c2ccf0addbd4c7cc5cca3d27f86a50a1345197f573e3c7a149711d67679a19d1147e80f5987b78a38b8999ef74d849e311b4106f5be966fc948a0248aa3788c3718fb3aa6cd3f9ad793db77702df7c94e10ece835b4695397638aa300e18d06cdc5811d8a91342d03ef7681920474f43448530754413e85f3adcda0735baffdb5044d1835afcb95321754ec67080ada034981faa2287dcf474ca69db4820aabf8138dd2f60043d9c939df76666f127e52f9d85149f23f555a580d590d15485ebbfd760f7ec293dad6f9863b4932b8e135319adbafbc0adf026f0424f971b09a220fc2cee6155f1a4e1b94143e95ede9c44159cb82f785076767df22f45566226d9b24ad0dfb4dbeb5ccc21929edcaee786c00bdb1c1998b8cd537a2de495b8cdcf3061568224231519cadd1256af12d79b526cc5d3e0af90206850ce9216e79428a2aefb74090d1cca27f95a7391d3596a2ba98aec93843ede65a732c488e21ae0046519f35dfc6c22af8f5719b43f0b1e867752777c99fd2f58e9beda9189125fee42c27f85b797c1ee186fef1e784ce47da154b6c38b81063aff1463fcb59611ff263d18993b485e53c3e18375ced5b00bc774a0a5b5157b3695b1477", 0x1000}, {&(0x7f0000000100)="99e8b1c9426946f69a9476b3a57b4cf888b0ba337f069364e610e78054f00bcbedfdb74096a1", 0x26}, {&(0x7f0000000180)="5c9d0daf232d7d4f", 0x8}, {&(0x7f0000000240)="a31a6897904ec448f3f8e6dae968692dd7448c0ff7ac0f7ab63071c89b07297552fcb502ce451245fdd331902d39200b14f22dc134e7c8cd8ac8524c073f8a915f3b7a25d46943aac95c664294325ce83665b4375e425a5c13303110b433a6bba5e13406aaec53cdbe7a2a6165ac9755fa45fe0f90b8d9fad252a166c7809d8fdcb0f45ed3016e6e123855389af8c0fddf0201576b9385", 0x97}, {&(0x7f0000000300)="49ac6705d9eabe6724c21d436c2a767e1e9dca8280e38a070f4bebdb1f1e3d09196a4e0728183bdc2a180f893c1fa53e2ab3dd1d47097f375e40ce34fb5f886c853f79a13cf307c8", 0x48}, {&(0x7f00000023c0)="3a08d262a3315045a1e56afe1438abb9d378f08a2ff3554de89fe0bd66e8f6f8a51020175b1b410b21bf57da7ce4a27706b4335b714bdfb33bb25c6d2d9ee41c50ba25c315ec6f3eab86eb092cd3ae89098f44fede08632b08e8dc16f4f49dc658e03a7e24ea610fd5269ff17a8a95b9e9a7d898b321a79b5fb4546d3dcc1b178137afc3369dcd356141a109649701c9c3154198adf39661235e58ee85d1d347329722555e2f956cdde8c0d20d02900ba526d85f40b20a5e6656fe08d80508dd787ca6", 0xc3}], 0x7, &(0x7f0000002540)=[{0x28, 0x107, 0xe16, "c0576230491bcef4f6a55e0768ad5eb71ab19fa7"}, {0x58, 0x8a, 0x401, "bed21e0954ce6922a5771a918323a6c9344e81457bd54a38f9b9e771782b5bec52a3b6249b5bab19b8bbe4911248b1b9287372ebce3236bd487c05b61bfe826ccab32bd3"}, {0x1010, 0x100, 0x101, "f5c5b423397992035fa10f0d751ff9de05f19d91b9bf708ae33509a9f661e2497f7dbf46fdf96466905eaca2392a676dc9ba59111ae37e329bd07f8d0a10048d8b98fa4cc4c827fceee035ff38d45ed6939ebe666646db091215ca3d20d0812f724b1c4706bb100021eba8aa36d5f76e48fc4d33d6fa4f50f035c582463dba4e8c64bc10644a37d590d789fc3e077d1262fcb096dfb29580a91f710d7a6deeb72a8f1ade85af7f58d9bb4ec57f9b4e2f830eec6072577f720e10b9cd8a0bda5024c1d37675e8535394edc1c7f988fd91879c734462be4274af78d7843cfaab3e7759b3020f767bca56c1d54fdf1a70c9f4059e8afa576f566386a7b89339458beb02116ca2cc0731a3980a92118604580dbe22a8e77381656602d26053160564dd192a484b8d38611513295ff6de00c206e565b63ea30a847eeb79edad5aeabf47459ffc882198b28d0d1b5f4046c360fab937de6915824dbf03cca53de35a49e0c0716def6fd52007f01d2d6829b85d456740ba0e5f9b4a7f46d50aba0bfb975fc286e2ecbfa127e9a3566d1da6f20fbcca30d828e582e798c7745631a0491f1bc693b25fa3c7d7185713086f9dcb47a6b061ed25b746a2ae37eae3325c830f0191107d6b187d58d24ec2c32bf061d959fdc7db53ed65faab8077959e4f45170d17d13a8615a9e7bb5b8c98dc9e2bf55a454daaa86e7ee377b578f0007ec1cdc1f6a4f49bff5246baf976bad3e77e045d0a0b663a0beeada9bd2a8db6b85039a78f039d7e31ac7b1e4e744b8bae035708943ec6a4f6a6f01cfaa43ba7a798293678d034e97561520184a295eb30c7b472731936085a3cc436e1a50027a54cb925aedc7058fc19e2eece1041c537c2603b7d512b2d60fab955109a148e4b7237db04ad3db472c62ca92be90e342178c551b9d3a1c66af13cf86831617e22337da7b617f5a04fe270c7cec6ad2a8f77dcbeda2df9f93bacdaede29433d8f0cc3e93c2f867a835b8688d57e220b929cbcc0b4fc4e677ba686d8d98d10901e63eed3d160d2c268bc2f5d1347cb69d1c62a813beaeb0ed1c9653072d680705cb5555857423d35928c7579fc67bf78b4fae44dcad57174b1a72605774c600c5ae38a2c63180814e8d5f829a6a842316b34ad8d61ad3655cc0a55bf4f6d3b04637ed7bb0bb964d3c1fc0fcb1f249845617718d2ed503cb8c58ccc4d9a83c36cf31bcb2b683dfbb030f8ce05d4074b7872cfe59774856c3e4da6180e5c02e6458ca9c9f7a65c69cb865c110cd7e6f91f28f0e791d41bbece1bef74418231897691fe0c00bf0b55cc25f1c7f4a14c771a841832d37df95800a239ca1749473049185d9579c2f481d69cf5cb3cb0a10fd5d904e12a5d37d06c7448037af62619c2cb4c02b8e9231b1a619e25211e405eeaff3f5fbb86eee3612a9725bbc468aad56e63c7e6fa7700d53b5f4afaa1a35d7a4d112fc06e662498ba0ca768f89a9ad540f5eb0d6ec2bc32fc97344af1938f2f0268791a08d0dd46eb3880a02120023735ccb58f0a7555a7b06a861b6808eaf4f712c48c1fe653fbcbb0337b22ae2490317e53284d3c99fcbde9f87bd4f62101d4d351abcc2ea1ac7f1bc359d87ce2a6fd765a5e97ae6d4f5905680ce590bb9135c22a433b82b6a935e55de0a71ba17398bb844f2ed75a5614211f8c8bbb904c730d352342527beb6ff235360ef15ee17f4faa9dc134fed7d23068b7085d5383b54e614d4ee5a757d6489b2c4651e9f49d0c82916521131798d712962987196bea47a12e46233f81c9756dbba42458411e2719db2cf638f86f41a392a82f4b53dcdc3fa599ca06a49ff8fe1923f4e0dc87110a5bffe4e0b7e430858cd71aa63d71fdb69ff9ad3a27e983600dd802239d82f14c5a8adb9345f31a8593e7fc99d40d604df169e574276115ab08e1f87947ba4c7b2bde4d1bf678312a2fd2d216d98b15bc1e0dbea15ba3d3ff7fb845027be55f0fb4b3d4338a7277457a022aae5debab03cbfbce042959bec4a76a20a52f000d7d360ca066889535b06d153f5102eaa19e71af6b901fe2d06eaa005f2883583e38ad614e02acd42df8194d5a69c1a154e71f132d733c7dea3eb4b9ee92e03d8f3607a9a8b13da3f74563134f6112e5749e56ad23ef2f070d28a4c7b30dbb59e6585029abef6573817a0f082b4edc59410a87c47506db322958ecd9d86853b1624602aa1b90a39a5b35aeca23dab9e1683b5793c051550ff7bb8bb2e0ed617974a69fb314c79bb60ea48e4e26fd22cce2bcc3396e4cbddd28d659fc92c1f847d54748687acabf76ac004cbc3f62c668da1cd981f2e5d5f32f9a12ca7da757df76132ad0c9e1ade2d82ee113376414e46e790895911b2ec30317669a0461e42aa12a0e315175b493dfca3ca045259c31d4898d2c60ac2238d8b0e30b39df82813dd9dbae39584e09eb4c43a03150fd66b9ea04cc02ea81c8a787d0863ff167480ba37ecd707cdc41e5e71445758fc8a257c2718a5041e712f1e7ec8eb4b2f9de79c3cd3e078a03401689a450680f70c89f199aa2a5875f57b8c788f0570cbe2c03decbccc35cd90b9ae0513a3d6c2d9212bf94e8516376ec25777c00b42867c67409a088b6d7ea3c229de502dc4cc7b91aa2fcc2f296811113ca58a2a6680b49d6bdd9c96266ac0f70cb7e7937e69ed4778ad1027f1f5ab864c524419d1be9e763360cce72baca0688ac613d60ab295586160cd80ae1cb3152d5f6f346c4f70630b8f3e438d71e3958970f5333d87f44789293e3b578d6da3ed8bc35299cdfe8acf057da48571463630893b522135aa84d5bd79a5f94fc11f95af488a2bd465c667e9dd90f9d6cf90e1189fb349ded025bc7af4cc1a9c68b168d4144fa949fd61f9ddf21e0d8e72cd35efd1befc7adab6ceb6328ce176ce3bec09a0378eb67bef13c7ae8b5526b8d5fc204d35a28be030322f1f94fffdab33a4f9a4fdd2da9acd81a594da98f077e21988acb71c71dec54caa6d477e5def754d765980087a6be117acca8a2581a128b22c273e182c15c446e824ec03da8d5586da556e19b98012a8a24eca312b9b5ee138f581c56fd5222cad9cd1fd7cac1c2046f521ad2249dfc25c9219fa6a7d9e5d1242de06991d9c303e26220f6b4371fa29392252c20448bb10b0ebe74ef82da8b84fb97fff5a9f576825ab01e5a440d75c3116c89e2d0bb683c917bfd77d440ea6e3becc791a4c57f043ef42e50601064bb8e6d18b89e3c5a08f0b2863da655532d966a86d6745f9cba3fce1311cfddb66a36eb7258db754899ac810c11583ff260db647642119906088dc3471b1305205844d4c170c9b671e062661c41b0aa5e951fdfa5c0017f59a4b99f80a1f9560e174f8e7ba587a01208be6e8b25f5810927cda7814035c7bc1d723001bfc2da14131980afaed52b102b45ab994933b5b997e2c31f3dbac0bf72765029fedf3d6a243370841d615bd35380a50a03fd5fa7173baee29b4f40e8e8cbb820b7cb943e83da95fba368879ccd44d8ccf635028e2bdb78c400a7cf6cc37a2e092d54480ecd220781e758eff23505158a24d2f07eb323bc85df78e6c8303783472ecaba37edb4f0e3cdc25dc9533d061267a8f71fc7ef66dc5d3120d04dce6999506c7f018857333a6f7364b776f286e27674c8617b8c4a461a96275cd2e9318d2e1aa3247b1388aad2b89036ef181b203019249f1b8cd2c1d3cc9165ceb20c3c97683dfb938fb46f7bef9f4e7b959276ad75584329f7172c171273034ac6c5cb6ee4b61b0ca0a90f4041724294d2c49b8f0f94eee77d424eb2b1f81d096b45765c8383500975006ccc15d52a0d1bf557982077b835960a8e60723c02b7cb7673f158c4b54f17b34590acba1d819b13d23332ee56a2655d5747f7d719eb8d8271a25e92a7e51d6710d52b21f459668cd7cf0b77d766e98904e40a23c9cf54dce04be6d75fc0ce05e123cb9ebfe9dfee3b2114abde65de1e82bd90c6402b8423ca59774b9aa1fd1b9710d8e22bdefc33591c3ae8040d204728e464f9f7122700d12683fa8b72d8063d16c5fe63fe5ee6a9517f05115067db2a5fa8279465d3467b80408de02d88959b5010269a56713839d2ecbb6b920e068ad3db8c497e49a8a4467b3bb27a15696ff78c5b0cafcbd2e7239ed726e67126fb20d9578ac05819dfae942fed33cc4eb3086933e88f7f879726f6e2186fd91ac06e4b6f79d39c9c9750ee2e8f07b401a016009434b116569c797261ec72e6a9038b5858d78fb19cd3a51d47017033150c3c7317f25f8726dbb558183a8aa82c94db95ea947aa9808bb6fc759c0ae76da6764fed775a645ee0ddab8dee8b7fa0912064b4877ba1f095f6b5432fa8fbc9c1fb452d9384f45129ff5c0577662ab11c3ee035a5a60d0550bd6439a52614b23e81c4573efc27a125b426f2adbf3f6de5b5fd9e3e9b719615740bb6f2c6515ba8ecbd617ad17bf5ae14876045df9454e2cc80e06458c00a88a651fe43b2c53875fe4882f34c052c2f290eeca74ec46b84062ed92de5d1490101c6c3524a7f2c09a3c11036a2eb8859e8d3234b6a168e128fa9cef2aa8bbc1eff64f28598144886b00d89eb0f76034a1ca93158862ed028b28903df0b86e1b5812f9d6e9d2bf5e9550daaedaa445d1be339fc3e7eb271c7be2490116da50d736f38a811af8b14e8aaa0cfe7a07ff118ac2eb4ab320575de18a2429542c0d850399250cd064ec5413dea7246129f7423c8d51bf595065311c9c25f19111765f37881f3fa84cd3b864750e48f1c32d4c46c353ba09ebf199648a59e1683d907fd0c8b76c37bb52081a154bd781e79acb72a2fea1cc0e4d40939b2fd9d0f05364f2560120242eb2b75bbbeaccf609c2926b38e560b7409ee1cdaf84f951a4ce652a3239a6f8f4501725a0482c78ccc8aaa7016e823ca15997ba1cb558609e96708aa76c340d3ffa1de22a6442573d2c59f0bbac08483ae9f2c523c570824b82a59c5585bbb6dff9ed7b51d85b3aade7e0554684683efc41726c2ac987b35c4240bb003273ffabd758a20e21d1f90e53c347a415117faba5b83241a2aa3744d174206dabdbc5f43b58bdebce703bb995d51c2ab8ed3a3bf5250a986c1f207bf6319411fd69c28aa028f84d1c4bea047f32b4b80bc7e92a162172c31f55f38acbe9bc0d1c146880c559fd6261ce87ae2b9d5988a7a02332c5650f665dc292a0f1fa37c6d4f93089aa6df5e67568281502f359b3ae7782cf4075a65f16452cc75ecd69afd338c1026387fe132374bcccb729a79a5c149aefd3ac77fe8332e4912d1fea62709be8515ce8639134636f20f978b900acc92d528e27e5f031a9ce58e6b6be109fe8349cc249d74e52f931d50e74358a20faa7fd97395069e3b7b84f3df8fdc27ca90f30bcdbae7d2d33b66be1e1ceed35e914678dff523ffe4b7ab4d042b997cc6f92c43310b80bdf53a19878733fb383333eb2f6c7804e28be29a9d5eee71600a2bffa998b75e44647c4654db46533d5e554e9a71b0a414f33253adcb5253f3a25bf9b79a1cb7ec19a5df29c56aba757cf34bfdda7e4228cb5fa95332f377f9578040f87d843b68abfeb89e32e8789852e4995bac60a1ad807799f74397c78f256c45688a4eab4a808085a13a490bc6adc23b39cc71157f58cb14d4c87f25f0694d0ecf8edc1c2d6041a7f5d9fc1e8043ca93692f084926a0453c384eccfbb20d0f7df0aeae3d0bc27b390ea52efa4705628d37d8ff95b48a49eff3b38a76f3119eff815bcd999965b84"}, {0xd8, 0x11, 0x1, "76f863d58ed24cdc6b883a2242290f846f29b6815589a70dc0fd669f15a97cb6f9337e7c629e233d15c8c46e3a1337a0711859a9636c10892a346c7e3f9e016c06b53f6bfaa307a608b597a6d4912b414a2a2c13484278fe24593a50b9d16553ace36e28f9de2e67bcc457821dc370189a92b293c76e906a5059ef6ccfb3fa349171b0d6aa3be2bb774085f247b9e9bdb3142766c20bf9d129f28740dc81db77fa67090a9c93d443cfb1add0d25ce90c992a72257d3adceaa51099ff29c7955107541f8568a50c79"}], 0x1168}}, {{&(0x7f00000036c0)=@nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x4000}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003740)="9f3855b04afa15e9ee115e5302c2dc31588c5a7ca31ccf04705528e3d30384cb08c2a48cbb5dcc7aedb2a0e34869072c0aa7502b082dc745aecbc4966b34035095b7366a605a6050ad705dccd19c4ed4b16cc68d478677ad38ad9873a0e8bf1637aa70f0dafc1162b2a90886ecb0158d6f5add1a84e373216685e874f5eb80bb3c1e2a938928788dfd12bab8bb26a9e27d04750cb8c2c1c99257a1a670488ac0cfba", 0xa2}, {&(0x7f0000003800)="ba71bc71437e52665a912cc94c85aa75b8f79b10889720ab156b46316005c8f5635a8bfde7aef7682cad0077fb7c437829a4688e2f2bef77097d05923a90f1bcb6281f136e0b2225a51104394e6e95bedede70f2883a011eecc52bca801bada2af0074338f8f335692d3f7f927dc3f65f3021e4402b5ef106c9f00e4f5546bd398a88151bddd1b42d99854b800b0664f9161e7fa4b5162cc4ca6b1629d98d4bd72311a0933b793518c04fb2f9fa11a3a1d8213e198c24d7041f377a72ffbbfe98f2a16ad73e53fe3d101ae0f4c674a89705895e3ab8f02f2316960f637d1d57e5a72456e43f071af18", 0xe9}, {&(0x7f0000003900)="c18d54490b7e02340ad3b81e5a3c535f34fea98a342560edd06c6a6bde829ef86f2c50f3931dddcdfa6eb2bfe499302e36533aeae1b29aa2b6904cb852eafc7272ab2ff508ac9c04fb0b0832b9e57e65caa85fb1a0228396f6ecf046f9264176abd522a44f7e97af7ebe64119275c5fe6edfdf4594891952ad007a8710337e1587332fd408720b6d05b881ba966e55d3702144496f8f95f288d2679de13ffce9f18f7fdef916e25d3c63eeb4420360ea0a070485d5fa07f374e1b8f8ae806c0506246fcdb8054c70c011", 0xca}, {&(0x7f0000003a00)="2fa433844feb145006702440ecc5104c724c0401ab9fdbb9949b6bd656b943679d0970b4d923a755eb4647838fd76bf95e73084762d902459f211033d95ca6b368c361012beeafaa5b2b7292d6a4556d2eedbf25c2452f02e25d0d86440c522af5ba496860064c04f5d087d6815b62d472088a0b50d71e5d03181f8b2b8638390d261b9d06", 0x85}], 0x4, &(0x7f0000003ac0)=[{0x78, 0x10d, 0x3, "83dad76022726ab5da389c5c38d1baf6fbae45bedd150cefdb2dd024bfa3bf3f12831855973d3099a2eaceab8ff25765df1a5028932f936ff31cfc21ad6896e65050b39a6dedd71dc51e7849711ae7d2367ae24b3507192951695e8893c6463dae59a0"}, {0x1010, 0x10a, 0x244, "ec20b4c71fce2c39db00f367e9e47c28cb10c4b4de176e4b73da2ffc31af4d5741586d7f38833ae55849f19992dcbc560a201a29b4093ce69199e55b2312aac111a01b204c3460a954c7c72be8aaaf9762021b660b31bd3cc335df46e548e4d61dbbe4acd55a1890d0f3c627de54d80407b0b2e977a599d87b16d8738ccc35693f5ce1cf3191a2715c10fcdb9e66e3d7e8a9f1503fd66fcab48177d2216b2ffb978184619547d3588547a2083bbb6fb26627fe3851fbf2d9ea49e08f0958d3ed7565be03364ad7d250323686fd79efc9d88a4a45303fcb976bff242eda93e7fcb1f8b0653b90706e14b10ebe43975c5d7e0b9d869bb49ec8a70fce701a098b44ab8d39e55a6c7d989a90a7fd10d83cefd2205089cf91da9a3e9382aefe58395099ed540e246dac60d34542cdde71ac3749d0d74b784e669822bb37a6db963ca76011249ffeaf102f5a7351de0aa47eb0c73610e9d85280d169661fd8b0184fe21cb2ee30b612a2e17cb0faef935894e8d7c85abf6569f6836627ac0a8e7b5e49b8e0d35a3f63ebe15c0aee446deb403db0a236e414d0b2b2a5356da28e062944d91397a0fa9b01e25d8b26cc3f5058ee205ac7b36378a5e0dfc954f5323075b81bc62e4b3c47cb7aaf6ba443647c615ef8c63cdd603963f75e7cb96ec00ba00a67debfa2b2c6e97a561fc6520a76f66bd68859d2d8a6454ba6b10e4790fe8d580bc3ca7b9ca7a479f678348d13d9499ec8c4e3d1228a061f82683b37ef673d1c092348e3b86300cdb63bb53017953e8aa04d88c2fcfc8b727e4b8fb3e8c543e3b12c1c0d529177b7028144cb6c21d3ea0000d70803449ba05cd072f59de5ee6bd07cfd2fb8058b5cd25dce08bc2d401af3e166cd47245d15bcacad2c9fe1b0d64144489243a04e4ecc58c03fe74ad16869d20a88637b497d7a4266115618ac51ddccc28218757a077a6c60554d3d9e8c47f47aa2d1b7d8c5183cd20c14242676aa04069c0e7b0876d4a5f033490b347c69ceb0a6f0d620479188df310f9ae5a1bad9956d6e02abbf085b5757d4a3e388b3582fff7822919dfccef2e8bd3a718eec5ae9ee1aabfecb9349b9490200b1f47f0afb1c768f808ec3d7083de6e6c7be0387c7191bfa5d5652b9ef39b0df3115a65368792384fb6cccda6a8fc3fe91f08350b2c3526d6a9f238d0ad24b4422c1ee4fb3b7c2f15a1ec6d1f15fd4f8667e7839e6327481dc363004cd82ced9d4c18b2105ccc0929fcaef540bcc61f67dd90848f08b3bf485315aff7a8b9e4c18faa71890c1e0aa39710a04fe9cd523f1327a8e71083774aba4f0cc2171b5d5c87487edb59ad49946e36d9944106d9c20bb3e352430b573995576122c6664a90dfe3f05c46b0504ff6f9d80b07eafa754ed5d3d28ef0adcb77d517fcc4c1c4fd79543f1bdaa3e21b550f475fde65efee7bc9c4af9299a7a05ee28229a3238162891e9b40e4d66c08cdd94e83eec7a78b9ccbaae553863420930f9671a6cba4744bf853f6427537ef2bbd30b28af4451e998f466f61b400cfe528b932d7505ba696878dc238a6998b9115132d49ad0d99c2e85b9ca4f5e666a5197fb5e05381d962f425c0b09bd7aa15f9f6c3bbdea0bf6dee4d405bd30c15f5605a5842362a0811d27900aec87c666047ce9b26250e22fca26c326e35358613bf24fcf6bbea80ef2325296754cd314087463c1be56a44099f0841d6da060f519403ba2013eaeb7139da5036c5513895601233fcc4715804e438797080c5452ccc75ebf97c9810fbebf67c68c6b545a32bfb8902364c9a0b5610673d620b8282fbd55cb4b24fd8a2fb016edcbe172401d2bfb2eaf565f8dd396ef501cc86f366083851b87f8aff5239b6a55460e84899ab9d9992a079fe8ff991badd329ff3efa162a63fd5227d99df023656e3ed2aafb207e7bebaf774956c362ca3e3668634c5a0a7cd69b81cd1c3880d541dedff42d289f3945ec00dc9ab60a7526031ad1f3198ea5ec9c1b219d314d4e28422b2d2c3170344821f490046ed9545d59f166899187bcfda673a41e19d97ae8d4ad77280de4aea4642527872c19840af6290a450c41e590982a66ccbaf651dd003f2ae56d4c0803f8bb88c05b8d303e60db44e4557baedd185f0f2767d44878b245c65dd0c5fa95bbbbb3894c3170fe0016f84afee12946f82c3e28a317a14870679c96c9016638e844b8c865d547a33f7ac7b63057619359645eccd85a5b5620c8ded4e03304ca2e4c9c5360c35a5f23c601db198625b679de352bf057c5ebf4df50336f1411c1fb3ae375e7ea4dffe943c0d31dbab0b402d808320bd1af31fec245f83499f7f64f544e87cb8eb83984e810ee95430cf38c30bf61d91b31c9a5f6d6a4ff413ee93d86b3160328688f35407db9c05fe53a028b5c08e09164bef61203b7bc66228cd743a229d7e428d84f3fff0e236be9e7c2fa546ae3372241859789a9b148fecf9b8e094aa1bfb4819f5f96308af26f6ba479d9af516679b705c6e0c1ce07deffc0472935ea8eb79bd11381b8aca031b83ec9ade6dbe3a6bdd2151f6cadc09f7fea39c52facc08541a86580dcd26c03a4e79f58556d68419cb6c8d1c9d97024a8a8d9b2a154706367ab7394a632a0cacd4c3e0b5bba2750c5b37df9c193aaa98a801a949632642ee5a41d0e0d883a6035be8669948cd5b52e722960ecce4c6a07138fab9f215bee78a03422c97d5020efa54477e9f220d4c7bd0e82c9c82f6d13927430597c86ee5bc8e3f0edce623e91101623a4396896a661df3c9d373b4b94b14be11f6babd09a26595f5dc2383dbd0ea460daa9ad2507b7446c27ad5cb1d5e79e940b74595e265b568ba23856349aeabd2b3b98f0e8f6accc8cc7a1bf3a915f347e4788a5c3d3a86b5072498a0585726466430e64778b49483c8e9d5b4595dd6551daff60ed9ce6dc5a2cad935037aa50068025fe9e8580d34bed29db70fb606f5fb4e39da6a178fbad2645884e3c08b70119769ce915ad71d1656b2d368688ffc8578c2b2550dcabc7f7a2bdf0a1b7be4337aed3ac9e4d40b3d80eef73487a774ece69d378f5a93ae091442fe0c36b725c83f97db20f407f0902fc811b4f3c4197d8ad4c7ff78dbfe99c4fede5e7f1c7a021b04272e23a18176001e0243acbf48c0b8e86687fea22b25a58e8ef4d6cba7dedf11bddce5c6c5194f7b92e8c125c2c2b6962e6aaefc833026aba4f3d06a7006e26a622031c32fa8ae3764071209ed32f63007f1d372a864c2786fa3c1cbb3d5fd9ed64b9e5ab230cd86b17dcc8158d3d27373dc6ca485660fa8742079032d0341122a173346f860c74ac63ecc6b39ba740da7f3de51704d6df98461475391eb01b5c55ab6858bd7b2e24870e8431edeca72d38ba292f2a7e069de5744f36e6a43a33e8f765fb1875b8423ddbdb7deef0f733145504cd1c864411945ae7d3cdbc37ab6f2fbd7a04b90168d8899d1e14b0f45de55d83d5253ba3c74e678e479d52fffd11327486817d46f8786501855ed285de2816ff4926a09a6115e3c0358818e044b5dba94a0e80a6c2ef03dd17599f48df937e037e35cfe418a8d4d18a461f4b3e29a4b87191fb31d8cde2b237007df51502ebe70d1fc9ed2207518844420c97f9a7e0fc73c8bd88721bac88fedba80ba9878a134409e6441528258128ef37eb4d3ef50a377004bdac5d29a6253d448e6f49fdc9bf11be62a9474ea9f2ee339728d02c0971dfa5961929a548f481a756df2ffd17b8ca060534a9fa72ea75fc511fb9820265bec7d94b32c3daa010e60428d0ced4c028c608087ae72be1fd14ee96b895294fba4561b40df4ca4788b05add4de72b6aa04a424fa5e0409e378a4ddd7293ce543b9168d94dd767569e2a7d254eeede3c7e233b379a2f2444bd0ca6327d7557b321348f0da9905b0f04f2eb59395e1689db52b087855b753a9b531dfbefd4fd0c8132500068e5166962f36bca35b764a20ee1e917bfbfa95358b1c068f73c04fe6d20a9115cd345154fd09300799102aecd20a677bf876706ebccc3e877e4f765d901a073a13b82ae535999d1f72ebd3e3adbbe0de964d0a79364ebb073652fc349f535a31b67ec7c2151341645075790be062c9056456186535a94bb9915a93bc5a2711d11710f00289c338ee583cb59c6b94e1b52c2f5aad52109a59b043e5acc9d726bf4409bc7883dee6ed39dac2e259adea7c8822ee8f8a30daf89b53fe8e6ce6ec95d29122e8adfb786979cc2f8d3412e4e4d9d0d4efad95d651db4eaf7b13665781275ac1234b53fba878142733966462468916328cb3b9d5b89f7d81a43ddba891023798aea8fb0025972aa234825fa9e68f62cb3bb62f17dfdaa3ee52055da617dc0450826dd90e87ef7862a9f0782bef51c09ce2e2f1549dc23dc112f74e3967b9d9fc0a534ac57667b632d34be19494873c5c9cd9e97c276b0a04f396cb38bef9c9bd0258979ed9c5a724e8c37173df4a4ab2e89b94bdcf7417b1f4d4678473dde443c2f5f031c45ac5ab3210ab79a43929aff3713ea7284f0bb3b5d8365ac45f8e733ee639152a364c350192f46b9b99e338afb2065be9add0f8bd3bbb4074d1177b0904e823cada06e09eeec0317c3d014872adbfe70089a0181c0ac8c6011273e1e34fe022d34f17412bdba3fe0603e57aa27224bf84fb1d0fdb99b1b541932d8ebd92618eb43b4627965852c5f6a51c1b114386d239527c7e5b4b0fe4876d04ccbdd39873f6bdce7bc085b8c7491a2050214cc0f0d5ed5aba85f2f152b4f502b0dc019894ea7f2acb863e0fb69f1f0d73b14c32f9b2c6488e55f84be812e5edc27bd3869cc7ada52ae302383724b99eff482e5f1712aa159df6f3548731039b9fbff1dbac56efaf04840f4be38cea4e42f09f2477b003d1233b4c17e59d5c540ee58d0e5e1a0412ef5161b904f1015a07b97d91404b7d3280d454ed26221a61a54dc2f37abc6f16dce92004c0a4dae97ca0a24091b5257dc33ac60091489d3d03d245e6ae4f4d3f3c83a0ec7de2207d1133f3da49d31724c41b030263420fc05dfe815911e96fbdff6989843e4d7471bd08ee6d6a2a1839d4848d34f89897c7f4c91ccbe04bf58209a26e3fe4ce5841e46a43b9fa4f356d399f36ed39fea3eb53ab75486978ea149e50ea6537ebdb278f7495d751245800df0951d6a0b8c6b7bc2cbc5c6880ed687d00a5a2327775a11988aaeb66677b8c072030a84013390a116d112ce7069b0cbf8e7f1f43d901a08e72b146696e84a0b20bc238a39d66e658a64b64aaef7636a46f1cd0ac6cd9a8f0d8def935b9140906862caa77febabe6c50411c7b05f2a21b5445c8bc706cdd4a40d280c2eed4111bb150a4789e892ebc7290e404fc8ac0afd3e64fa4ca623d207510fd1eed5b00f504ba0bb0cd70a3ac077d1904802f5c36570f6eae0d2538600004ed42bfba687b3b24ca090f54ef7ab1f112383420f8d8b344beb13599d04aa28903dc69fc1dae046b243107423a25345a668d39668689053324e33dd41e9dc5d034cd6485f9e038029fb6cb0959d511e6249b8c7a7f97276c27dd45c4d1d8ffa38e85cb0d5bb3c8009a29af7c325efd111ee22425f75c9cd907f15a33993b6e2e11f2c4614582b27fd1d438dbb28c801b4620d8894036f01b88d7c2aaea97a4d935276127f48cacbb04e3924a9c24c46f6bc0d36e4efc18be53df219dba068aaf582f152b80a91eb8dd09c01bfc8d4c1c7ed7a29de8a51afd343162eccc1f5ba718a408ddae0bebfbcbdd012e7122bd836"}, {0x88, 0x10d, 0xfff, "85d29a8bd5471b2b0308b343590b86eda8633037f99a1d697419b3ff57ee3f8d1902cf292d75da1f4339ec3d5f74e629da29099275319a928915ef0e9166174637e291ea449a46e2a918c179676f2fe321d1f1ee21e3d12855379cc40dd2b4cc662c38f404ea3b64ef4145c54b0651dc9aae5cb93da8b4"}, {0x40, 0x0, 0x1ff, "70b6e27816f86937a12f6a5458734b0a6979aece8ff967d17b7bdaf606b3712676c7a88e9585998d6bc4"}, {0x60, 0x100, 0x4, "9a4f5224eed7c69336414cfafc5d34c5f656f3cc10e77083bbf1727b7965eba11db1f183e0cb60b609a7f3e8285ed5c435fe47753a0d1984935725ab041f82a4f721d18cca828a6ba1f59f1a"}, {0x18, 0x112, 0x8, "3d89e3613c35723d"}, {0xc8, 0x88, 0x8, "8b3c66e7dc2e248a24fa883f802a5442111079f521e51c819de78a0698b9312c38da814ae1a9e2d5b5aa1b69715207afb32132468f0a481a0fab5a39c3b6e3211fc5191d8959db08833c540320ac77853e5b7847f9c9f0248d30d9a5a45586c23f997fdc698fb2b695638fcaacc069507093444d4ae1a64b9c86d50dac3d34d04e573fc20d6d937a90cce72c709458d1d36f2f8f508707fb5b0a3f206705356bad286fcd3608d7d05cc788ce8ab926125ee91f9f933b"}, {0xe8, 0x6, 0x6, "539aa6ab00fa49d9eea024591cded1a8a84b35e66ac8a400ff02b638c72e0da4b9fd7a3201ecc2ec81db03a6342dee3b95d678c967a282f8ed2d0575b51771e87f66528eee7ccecbd536db0b1fa22f527e78b790c56780d35e6711b70c42200eb49c5106d001a4dc3d5bb79dedaae40962294db14e87cf4eb0a4763de1f625a13a89694e729313fb5d69b7e0266c1a145919603786fe728f07da2b949139af47ae6bd053663d02dd62eca5bfcf7f7f9054b4ca1a6ef3a4a2c426c9a710e3a2fb3ab52d8b2ff4fa68c503f604f0ce0e26bf703a11"}], 0x1378}}], 0x2, 0x44881) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) fsopen(&(0x7f0000004ec0)='configfs\x00', 0x0) [ 279.692298][T12522] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 279.704109][T12522] EXT4-fs (loop2): group descriptors corrupted! 13:13:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond0\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x88c0) 13:13:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond0\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:26 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0xc028660f, &(0x7f00000001c0)) 13:13:26 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r0, 0x0, 0x31, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond0\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:26 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0xc0406618, &(0x7f00000001c0)) [ 279.950952][T12549] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 279.960333][T12549] EXT4-fs (loop2): group descriptors corrupted! [ 279.971975][T12542] FAT-fs (loop0): invalid media value (0x00) [ 279.978241][T12542] FAT-fs (loop0): Can't find a valid FAT filesystem 13:13:26 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000240)=""/244, 0xf4}, {&(0x7f0000000180)=""/110, 0x6e}, {&(0x7f00000003c0)=""/161, 0xa1}, {&(0x7f0000000100)=""/21, 0x15}], 0x4, &(0x7f0000000480)=""/123, 0x7b}, 0x12000) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000000540)={0x0, 0x0, "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", "d11c51dedb2821ec5fa94c654d0471f59975bfecfaeb99e35745a80c6e2da11c415e004259d387b4ed55e473c2a2ed3ec88f04b995321050fcc19a6a8d510830e56a3d88095694dec23188950cc63ad09ce89501bec65506bdab046593581f6bef1776ce269b94498cbfd6e61905da8753d1f490f05b518f208e34972c01c91c1e802c1152312794a810bdf5071b4e471a5ab004f618f63bff1095e9da732dab96a4bbee98fe6bdc0a6d7ef7fa7f32ec8e1f3193b1035d4b9ca754ec2eebf60c32a8fc6eca211b984bfd744bb9149cf4668c40b1af1c309fa92cc33bfdccc5e715671b890e512c1d78e0f4e6e1b94d8315444aeb9f7a539e5af0e082083b6affd58d12d4118ab0bf63e948af1bb9cee67bf0498052790028a50e643269468371a8a6079aa1a1ac5062de680ab0e96d667729068f18eccda063a0c97248bc7cd0648bb89c1d647167a21e07b8a4cd6373228109af4ab09bbe8d2d8b33fbe308afdc1261c6f3072acace82d1340d276cd7be60b895133ff49cad6cfdd29b7309270221e6ff49bd55046636bc439751d5b9804e7c3ae847e12b476d69072eff5722de11e123b40fe9fffdf3be4fefa026a0b59136f69cc7743fb8b07a5e4563186544a79d2ec51703336991e2de6779f7b3d4c23e2bca32d4689f56d42c58b1e3b4ee481b4b87e4339f16b8f3b42968c81f358134fe12b72dedcf97530ed92a69c8194f7c8b323ebb10ed0bcd42c091fd4e1bc0db51c58a11f60a8554ac1e9cbfacab5244bfb1e3d93cd58135b5e916152588e10cc89addbb26cd2cc281533e3b294bec4993dfd92536688e99661d6414758b0ec3c9ddc362a942dadca8fde302348f7460e5d76c9dfa68d993d9386cd9a1259cfe5bb18cea820f778f4062ae43ae36bfa211689af4e1f292e0c07588b1d2b606da7b32590e51c601a149949f81ba23bdd785917d26a45dd00375cd68cff30a74139fea0915a7aa015952a70f0b15b82b605d91301101fe8f97946320eb6b3638388d8a17a623c19e280edf3096153300d4915df1c67c795c4bdb47a6f9fd0e9f4d11637e2033b0aba1cd2756135fc4f070cdfc7d94385b4d8f4d8d0b16f7e84ae32d8e908957b842f8fc2db69e2ff7182fa572e1235cf37fd10dc0ba902639eb03f4dbe282826899bd3281affd2a8da36a1b1ac6fb3407c213a33aa1c2516d95d7e90e33787f264810a1a18863e9029de3d5538d83c6938b89f862ccc97d24d8f4b35ed8954208cc0cfc20bbde82482c36a0fc5ddd4c6078813f2ad014bad73c4fbafd353b5782bb05297cf158165d6ea3f7dfa4c1b06fceb94516f713a33c2d6d22362c3bb4d1e904fe59d518ac066c3a06a615d3e42a7c36667914e7c97670c0739c86ccbf6efc6232086d47ed8d1c38824adf1b0d597ee2bf60b4ea1664b03bbdd93f1d0eeae2637ada9ec9d70fefc201214d7e1d266efa916e4ef7c8f0fae60c9571bd4ce9d5acd5b1a6715b9f8579a84491c4f3e99a205f76256972f23543f9d74649c2b3c7ab29bfa36e7e6f55378bd90f82993a5b4de79b4ace33acc1a17cd347b4cbcc5ad1eccea469dba0ea200a27c943658bf48bd0339ed67faaddefa85f65848d4be837a894227875cf6998a69637146bc43d81f51235e1666355f5d17eb884aa7823f9d57d65f960a721cf2e94226ba3e61c22238e9166e324203880ba424e048b4b77b728192ca2189d12448ed327a38d65c23c6b32773d4905c8ec939097e35bb9bc9915bcc21d891881290e9068be514ebcd7baba3ffef467986bdb5930e20efbc7775fe16f0ed43c36cc3a00e37adfed5831e2aa92d44c228fad0a37f5281f80c1a2a17964aff35157783ca773bcdc806a10f59c12a893d71303bfebb5869112a9ff900c3b9d73c6c7a1eb9ec3c31fffa2f3d0b8a17d1dbd669b09f9423244dc29753dafa992231c8f9efa67800f195ca85ef7e49b52268417af9ab121fca883f0b987d2cecd97d982618982c2770d1cf5f8622549b261d35d738919b97c04817003a4105f6e09cd700f977aed8b6d8bc634763fb767f57e0ade620ca292ecf6bec3abf27a698108f58b0e3d08e18f1544da83f296507b0c50711c24162f6f9961e3f749b4bf697fa6c54a70ddf85cdcf9e7692a779959d8d37f5f49e7eb7a567839c813d09d6d985e780f9d09a0b0c840de6e7285ac3c415e6cf975b4b563e3ebb207fa579940872936c2de1b1fa556e63ab78843da1fb4c4f3ff0966e1b93eb3727e3c8a9fc4cc595ee2daf90f0474d209b47b23a04dae83a0e008acada682797d929990b06de0bf87e8871769a13f6d98c334779a8d0a282410b8b469e5c5325a05683f3ad89f2c5c415fa40a96c8e367def044c103dbd35aa8d345753fb945b59bd1a3b807985e37830bb2f4d851680b4d73430b30ab4943564c45bae63e7795d8e01b5851168831a7a5722e8677c7f1628271244670b054f092cb53c9c6bdd8fcfc6766b913b3e6a8308fda6df08f7418d8af17155f50257ece1b551b56b1764c638a1ebb290767a2cbedce079c7906cb2ff7f5bda51819ba5da195eb277f68f79a159d494e86ed3f2018411a261f57e47e37a09e0973bcc75ac276d962effcf779a5ccf3a1ddd38467c7b73076156d2cbe3b7e075d3735b712bd070acceb31eb2489f7dc837bbda0c4838c9bffb45b28246eddd3fc8dc9bfdeb036e963e20f1127e36bebe48365cb837490ea4fd627f61711d312eba2eb48f6e6361d40c873731a8eb887ca7cbef86b976474e2ac156d3d4fc1756d336730c53ef7d002c7a6baf7066728bf4a44aad75c5e178e9d6f79743241dc69c623e3c9a11ab177304fc3314f09fec9d239d7b30ad970bfbe20fd45aec83917873d0062ad935bddf434857847b9e4856ee89f6c5a88e1e28a28b604cb809dc5076974455dd9c4c55f24f8459878fdb3312757c23f31ab3002035b8eeb90aa99c0a312555088db7c0917a0993ea11f44cebd2ca4521f53d24958266f13ffa4c6203c1d6c53420ea8b0dd80fd5ba81666d647d2c1b26dd04baa5aa471d0c5393bef7533557ae76f87b1bb567fbdaf64fc324fa8dafd558cd09d999754020320b0d8826e32652ece9dc2556480b7d59f6b4a84c64106eaaaef4a7dee96badb670b6b5dc7a5193de7ee603eaffeedbca234f51cef482fe0373e9a8adb3291937150e45afc5f40412449e8a2d8b9af0ae108c6078287d338e394df0f4008f253e4d1237a0d1c294992b6745af1a1feb561974e0a48b25686e5c4e941a7c98377652ec9c535e52640c759776208d25c1d9725f7af0ee673e4518cb7c1a6696adfe9ad0821ba231609f76808feffc2f4a5a45e8068d4a130be796bf122f050b1540070694c8c47fa6e75054996bcb18ece29ab2dc3070a3a5ade87af7b0d78f2194d2f7f90a474579e9550b3a1f5ba0f1a14c0292f964c97940d8fde963a8d1f5cb8d8b9f9aa6b51d6b77ccc95133d21f5a4fe835cea36e996a4e30bee139fffbe33d7a10197834911b7962136a1788e975fe3c80c224b31b43d9b4988631ddbc1b92ffeb4fa9f7e1943194dacb2bf9e7d78f4b6b0de71ef2b91fb70dfbae98dc1f683f30efe68bef179ab085229cec0791e61901be6a4819e2b3ecce2974163732394ff7fd087aa2688ac6aa439ae31ab37af73749c91443ecf64c9f1d73b1338865d49da78b000245c82db7bf2f67269a9bbe7dfd5c4fc87c8b6880643ae8b2ebc2b9b81cb81348b9c6d9f769a370a96da6f5909b8e7d0dc50ff2dff9a87312b943014a10865e4ff203eaca7c1a6f1f0cc7e57d753e4a502ce97530e30e04abab4d4633b85e6d4731117a67f30792f3fa18696e59efc8aa5a900d4f305273cc5bbc53ba0c83d78f83e54c18ceb6f481524091e73c34af1195c61f0c6a8723dc8d34e58fc619c32a03bef57a00821cd40beec7fa78ff8f50be9e1b3e401b4c2be2d507724e243a0bdc95350d46072bf2d2d4008ba4f055369e0c428f7e9e4a9278489bf57c1ffe1688c8c7d7ce185fd05a819b1efc7ff68e164233745d6ca42a2fc1b0970d3ddd36887b807a1ab8645f5414d65cb624ce9e3b93b911c84e54a573acd36f4fcfe0e8f3d3d117aa84263ecc60b35e4332107195085ae47401dae6fc5a3348eeedf279735c86236d1f6a4c8518be023887b4a368bd70053102c86da9ed4a011fa6aed9d6ad79653d12485ef18353d38ddb5a44dde023996d0e1ce30b00bd2232d986bffaaf29690a493f56571e98943aa03975780edcfce04de889645a49ac2e81ae8866a1003e580b78c5288fd7eee48f83140301985922e287d851977e62913e1cfad88b676c62222aa67bcb1ad615bccd944a0d44264745f30f304ce429f3d99160aff02fbc96f787b090a4d95e1a2f2b31f03d514e09abd47b735a7ceac8e4618abfab2cfe9047548ba97b2cce8e2c2086464f897c18b39473c78355b6334203d638fc18ebbea445e68b9cbe81c997d9c3ace0a1fa9bb0bb58781c68a066cde4890c6ba2ae7f571c9e61f3818d01f321df7fcfeba3971e52f2a269a6559d489a0a6b86753f24a83952f9685b476d5f7f1b653f3ddda015c52421ab4b608b9114140ba7d79d3cdda77a89f09148b0afe74bcffd8f23117d5bf8996868b91a88f02b8952c959175f5ce55159c7ceea78d1cb71ebe1f33c5cb714126ec3803d51c6b4257d699b60c5d681e0baf5d84269e8678ad5ca97cee5fe8662df851769fd3c4189962602ed3bc7555fc224206e92eb2726cefc8a33cad404f576349f77dd593ef0e5b751d0167fd05a3b54f5ea58452028dae97d09ec733750b0fd7af2b8280d1b8b5cdf8334b66747d80efab6888891e27b7b9789f946ce3f27823aa1b7ae628c64b86012eb9115ea133b55105d4bfadb3fd0001b23814c60229a9ebadf39ba4af03a066bfb7da70788b66c8a5bd6c59e24a83d7d894dbd0fccc7ab174e3862ff3656e861c6549194d5098ea29c12b91c669c5baf17c4a3c4bd398036a3296aa84620ec427bc9e101577aa130df2c58d8f9580a6bdfbd06c2ab5ad7758952a878eb511f0584bba8a76632415b87a6a4945916c6997da8e1829ded28b1d919e306b44ed4d0fe3c45a4fb63bfc79372a44066930650d5b52bbfa97e52a21d2b51c8270d4485bc9ffc94cd65292efaf15c30993eea3457fec167c89de623f7431dab80474b9f3492ef027b871337b05c720a6fb194157643e6a43c0202c447f928820228128f01b9d7731875ac59ccf99eafedb2c20be757046066fdf44971d80ba5f83e70576fbf2ac79ce118baeb658009d47c52c9f07f353a5d4ef9ae8e321fc1b70056d1b37fd949be5e9132f111d5439130e2991d2edcadfd85605c87252f14cf051bb2bbb63697563a4b836872993a93f9b7faa57e6c5"}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000001540)={{0x2, 0x2, 0x0, 0x3, 0x2}, 0xb493, 0x6, 0x1ff}) sendmmsg(r3, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:26 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x81020, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x100000000}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r5 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getdents(r5, &(0x7f0000000100)=""/26, 0x1a) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0xc) ioctl$FITRIM(r8, 0x82307201, &(0x7f00000001c0)) [ 280.213812][T12574] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 280.233464][T12575] FAT-fs (loop0): bogus number of FAT sectors [ 280.254293][T12575] FAT-fs (loop0): Can't find a valid FAT filesystem 13:13:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond0\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:27 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0xc0406619, &(0x7f00000001c0)) [ 280.263988][T12574] EXT4-fs (loop2): group descriptors corrupted! 13:13:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10) timer_create(0x7, &(0x7f0000000080)={0x0, 0x1f, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)=0x0) timer_gettime(r1, &(0x7f0000000100)) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000180)={0x923}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCXONC(r4, 0x540a, 0x3) 13:13:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond0\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:27 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x81100, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond0\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 280.535516][T12585] FAT-fs (loop3): bogus number of reserved sectors [ 280.552941][T12585] FAT-fs (loop3): Can't find a valid FAT filesystem 13:13:27 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0xc0506617, &(0x7f00000001c0)) [ 280.583310][T12598] FAT-fs (loop0): bogus number of FAT sectors [ 280.598176][T12598] FAT-fs (loop0): Can't find a valid FAT filesystem [ 280.609747][T12587] FAT-fs (loop3): bogus number of reserved sectors [ 280.616973][T12587] FAT-fs (loop3): Can't find a valid FAT filesystem 13:13:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond0\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x521001, 0x0) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f0000000400)={0x8, '\x00', {'ipvlan1\x00'}, 0x200}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r5, 0x80045400, &(0x7f00000003c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r3, &(0x7f0000000240)="b0f667c4d8ffa56a0d4befa300bf99969f699be4cd196c5a17c59378b64e5f0818fd40a2f2840fe13a851e6155b82b9927373041c61515269b3a91bd905dba9f45361397436bd9effa8eed255cb653890809363f5d24a5e72d0303a0547ad511b82748a857934ad62c3e8a5e4305bbb4458c44032fb2b330fc720ce20749cf09e02b695e2f6c5565f0ad106ce7243e19ba1f56d7d88f04787682936559b91226d941464f7c8b27912342c4f592e8b3dfe5e02cbaa5305845c4ff9fa08c244bbf8faa5ec1907547a6faa704baaeebcf92b09f9e604a93e9fc79d5eb49fca35cda5abe08a8bfc64e1516e51d5bc5c982d214c526", &(0x7f0000000080)=""/177, 0x4}, 0x20) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 280.624206][T12602] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 280.637417][T12602] EXT4-fs (loop2): group descriptors corrupted! 13:13:27 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000080)='./file1\x00') ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x3ff) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000000)) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r4}, 0x8) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000200)=0x4) 13:13:27 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond0\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x81200, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond0\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 280.773503][T12620] FAT-fs (loop3): bogus number of reserved sectors [ 280.773741][T12624] FAT-fs (loop0): bogus number of FAT sectors [ 280.793188][T12628] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 280.800338][T12620] FAT-fs (loop3): Can't find a valid FAT filesystem 13:13:27 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0xc080661a, &(0x7f00000001c0)) 13:13:27 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) [ 280.816635][T12628] EXT4-fs (loop2): group descriptors corrupted! [ 280.840521][T12624] FAT-fs (loop0): Can't find a valid FAT filesystem 13:13:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond0\x00'}) bind$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPSET_CMD_PROTOCOL(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x4c, 0x1, 0x6, 0x301, 0x0, 0x0, {0xc, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x24008000) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:27 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:27 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0xc0c0583b, &(0x7f00000001c0)) 13:13:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x82000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 281.029595][T12620] FAT-fs (loop3): bogus number of reserved sectors [ 281.055309][T12620] FAT-fs (loop3): Can't find a valid FAT filesystem [ 281.169348][T12663] overlayfs: failed to resolve './file1': -2 13:13:28 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file1\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:28 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond0\x00'}) bind$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000100)=@v1={0x0, @aes128, 0x10, "5c2bf58ba3684517"}) fdatasync(r0) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:28 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond0\x00'}) bind$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 281.218744][T12661] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 281.232425][T12661] EXT4-fs (loop2): group descriptors corrupted! 13:13:28 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x82010, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:28 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:28 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)={0xffffffff00000000}) 13:13:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) fstat(r1, &(0x7f0000000180)) syz_80211_join_ibss(&(0x7f0000000100)='wlan0\x00', &(0x7f0000000240)=@default_ibss_ssid, 0x6, 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$KDGKBTYPE(r3, 0x4b33, &(0x7f0000000280)) 13:13:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond0\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:28 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000280)='./file1\x00', 0x8000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$unix(r1, &(0x7f0000000200)=@abs, &(0x7f0000000140)=0x6e, 0x0) r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r2, &(0x7f0000000100)=""/26, 0x1a) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000002c0)='./file1\x00') ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)={0x5}) r5 = gettid() ptrace$setopts(0x4200, 0x0, 0xfffffffffffffffe, 0xc1) tkill(r5, 0x3c) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r5, 0x0, 0x0) syz_open_procfs(r5, &(0x7f0000000340)='coredump_filter\x00') [ 281.530206][T12682] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 281.541710][T12682] EXT4-fs (loop2): group descriptors corrupted! 13:13:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80006, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x82200, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:28 executing program 1: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:28 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:28 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)={0x0, 0xffffffff00000000}) [ 281.736476][T12702] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 281.755836][T12703] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 281.768522][T12702] EXT4-fs (loop4): group descriptors corrupted! [ 281.775222][T12703] EXT4-fs (loop2): group descriptors corrupted! 13:13:28 executing program 1: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 281.800482][T12710] FAT-fs (loop3): Directory bread(block 2571) failed [ 281.808442][T12710] FAT-fs (loop3): Directory bread(block 2572) failed [ 281.815882][T12710] FAT-fs (loop3): Directory bread(block 2573) failed [ 281.822966][T12710] FAT-fs (loop3): Directory bread(block 2574) failed [ 281.830282][T12710] FAT-fs (loop3): Directory bread(block 2575) failed [ 281.837384][T12710] FAT-fs (loop3): Directory bread(block 2576) failed 13:13:28 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:28 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x800ffffffff, 0x5, &(0x7f0000000340)=[{&(0x7f0000000080)="26d2006ba461acacc59a8122", 0xc, 0x800}, {&(0x7f0000000240)="bae40061ae071941a179e583a2267b8a1df2a42e918be85ce91e2075300482a3d358984334614c875aa185aab1c61e01a9a0fdb0be3b7c0ee7f918852a3b014b58b479ea8b4a464a6f396e3ac4aa6882ac8d957eb8b3a30a4f3f3f43df669f6eeee7fb68c1742e36b36a716f181d717bb758fcfc8ef9bafa99a0bae6db393c98bee2ec5226c1b0d282e8c086959c61a4efcb71c9cee9d0d923d0b538313306e50d4fbb8e0b5bce3dc7f627fff243aeea523f7373fec3a01669a9e5d5b8355e06c723957fb10d3db3959a1f794589e8f7a2b8acecec5b7a0ff17b7d6742fd13383d17ed2b3f97fd5dff1abadab82785410dd7e9c7c2", 0xf5, 0x6}, {&(0x7f0000000400)="33da54ffa82bca263ce831245bbdd85a550c87e2d591c7f58c00a0903d93c82d0c828283ac27cd785a084a025885514c8233495be9cb337fb9c01806632313cc538dae5afb06e7e493293810c2c9c1614f6a453edcac927ce0bc526ce9b3d166f850355f7f9142dffeb4495b3bf6efd064bd6bb733ddff9bc6ef781fefff07be8d7bb9a7d8cd6af3512203e5fac67d429bf160", 0x93}, {&(0x7f00000000c0)="966ec51728cedbb420114c76cbd33cbe75f87cb2a2", 0x15, 0x4}, {&(0x7f00000004c0)="99ec450d9c9d0daf6743be62b24067ef48b4e1259cc1a4b35e681b16579e1c19e7e6e654dcc5db890194553155fe893d7f8944cd522e055f3688d55559284180e923b2c61a6ac88dbe98778bee5d0c25152fca1d6623a0b63a420eda90d3e397bca2fc2409023bbb938775f8700d5e6ab1bea5151f8419d0ef8d8abd1ef5cd2d2e548f3dec0571a1e91694d352039cb75450443f26704ae6cdbe320f06a7cb8265b65f", 0xa3, 0xffffffff}], 0x20, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) symlink(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000140)='./file1\x00') r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000580)) [ 281.847202][T12710] FAT-fs (loop3): Directory bread(block 2577) failed [ 281.864773][T12710] FAT-fs (loop3): Directory bread(block 2578) failed [ 281.874739][T12710] FAT-fs (loop3): Directory bread(block 2579) failed [ 281.886893][T12710] FAT-fs (loop3): Directory bread(block 2580) failed 13:13:28 executing program 1: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x82500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:28 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)={0x0, 0x0, 0xffffffff00000000}) 13:13:28 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:28 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008000}, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:28 executing program 4 (fault-call:5 fault-nth:0): syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:29 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:29 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 282.164590][T12728] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 282.203978][T12728] EXT4-fs (loop2): group descriptors corrupted! [ 282.331583][T12750] FAULT_INJECTION: forcing a failure. [ 282.331583][T12750] name failslab, interval 1, probability 0, space 0, times 0 [ 282.366961][T12750] CPU: 0 PID: 12750 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 282.377236][T12750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.387413][T12750] Call Trace: [ 282.390705][T12750] dump_stack+0x1b0/0x21e [ 282.395297][T12750] ? devkmsg_release+0x11c/0x11c [ 282.400239][T12750] ? show_regs_print_info+0x12/0x12 [ 282.405439][T12750] ? proc_fail_nth_read+0x1c0/0x1c0 [ 282.410642][T12750] ? memset+0x1f/0x40 [ 282.414631][T12750] should_fail+0x6fb/0x860 [ 282.419230][T12750] ? setup_fault_attr+0x2b0/0x2b0 [ 282.424262][T12750] ? __fsnotify_parent+0x300/0x300 [ 282.429377][T12750] ? getname_flags+0xb8/0x610 [ 282.434056][T12750] should_failslab+0x5/0x20 [ 282.438567][T12750] kmem_cache_alloc+0x36/0x250 [ 282.443340][T12750] getname_flags+0xb8/0x610 [ 282.447846][T12750] do_mknodat+0x112/0x460 [ 282.452178][T12750] ? vfs_mknod+0x640/0x640 [ 282.456639][T12750] do_syscall_64+0xcb/0x150 [ 282.461153][T12750] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 282.467046][T12750] RIP: 0033:0x45de59 [ 282.470939][T12750] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.490576][T12750] RSP: 002b:00007fb4e6a96c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 282.498990][T12750] RAX: ffffffffffffffda RBX: 00000000000210c0 RCX: 000000000045de59 [ 282.506965][T12750] RDX: 0000000000000708 RSI: 0000000000000000 RDI: 0000000020000140 [ 282.514932][T12750] RBP: 00007fb4e6a96ca0 R08: 0000000000000000 R09: 0000000000000000 [ 282.522950][T12750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 13:13:29 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x82e00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:29 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x10000, @ipv4={[], [], @multicast1}, 0x101}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:29 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:29 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000100)={0x40, 0x1, 0x800, 0x8, 0xb1, 0x7ff, &(0x7f0000000200)="ab0d48ef3670c24575ec89ebb7a11dd57ae5a9e0887017abdb9d43178d12923c8f2d083e86fb14c8da6eb7be3c104b330ec992d0922d10914c6a61464684b5aac21cb088fc3aee19daf698da588498933b7e09f46c16a70c5143ebece7b8b75e1fac734c25706bdfc97189f4cc7bbce6e41701a5faf1cc79f8478cd2a58752e2fd967bf183b550e10c53f2c35ceeecf31e008ac0c40e9a19d8fdeedc25641148950d99cf8efd3d6f443ad3d6f4865d7331"}) 13:13:29 executing program 4 (fault-call:5 fault-nth:1): syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 282.530922][T12750] R13: 00007ffcd28df1af R14: 00007fb4e6a979c0 R15: 000000000118bfd4 13:13:29 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:29 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:29 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 282.717879][T12762] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 282.740291][T12762] EXT4-fs (loop2): group descriptors corrupted! 13:13:29 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4) chdir(&(0x7f0000000000)='./file1\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BTRFS_IOC_QUOTA_RESCAN(r3, 0x4040942c, &(0x7f0000000100)={0x0, 0x6, [0xff, 0x7, 0xaeb3, 0x7fffffff, 0x4, 0x2c]}) r4 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) chroot(&(0x7f0000000140)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r4, 0x82307201, &(0x7f00000001c0)) [ 282.836314][T12781] overlayfs: failed to resolve './file0': -2 [ 282.857068][T12792] FAULT_INJECTION: forcing a failure. [ 282.857068][T12792] name failslab, interval 1, probability 0, space 0, times 0 [ 282.870065][T12792] CPU: 0 PID: 12792 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 282.880206][T12792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.890243][T12792] Call Trace: [ 282.893520][T12792] dump_stack+0x1b0/0x21e [ 282.897848][T12792] ? devkmsg_release+0x11c/0x11c [ 282.902777][T12792] ? show_regs_print_info+0x12/0x12 [ 282.907971][T12792] ? arch_stack_walk+0x78/0xe0 [ 282.912731][T12792] should_fail+0x6fb/0x860 [ 282.917143][T12792] ? setup_fault_attr+0x2b0/0x2b0 [ 282.922203][T12792] ? unwind_next_frame+0x1c07/0x22b0 [ 282.927493][T12792] ? ebitmap_cmp+0x1c8/0x230 13:13:29 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:29 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000140)={@initdev={0xfe, 0x88, [], 0x6, 0x0}, 0x6, 0x2, 0xff, 0xd, 0xfff, 0xff}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r1, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r1, 0x82307201, &(0x7f00000001c0)) fcntl$addseals(r2, 0x409, 0x6) 13:13:29 executing program 1: socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 282.932078][T12792] ? mls_compute_context_len+0x7f0/0x820 [ 282.937706][T12792] ? context_struct_to_string+0x3b5/0x7f0 [ 282.943420][T12792] should_failslab+0x5/0x20 [ 282.947919][T12792] __kmalloc+0x5f/0x2c0 [ 282.952253][T12792] context_struct_to_string+0x3b5/0x7f0 [ 282.957788][T12792] ? security_bounded_transition+0x520/0x520 [ 282.963744][T12792] ? mls_range_isvalid+0x363/0x480 [ 282.968845][T12792] context_add_hash+0xf5/0x200 [ 282.976018][T12792] ? security_sid_to_context_inval+0x40/0x40 [ 282.981974][T12792] ? mls_context_isvalid+0x98/0x380 [ 282.987163][T12792] ? policydb_context_isvalid+0x1b6/0x400 [ 282.992877][T12792] security_compute_sid+0x1147/0x1be0 [ 282.998228][T12792] ? security_transition_sid+0x90/0x90 [ 283.003682][T12792] ? avc_denied+0x1c0/0x1c0 [ 283.008168][T12792] ? mntput+0x63/0xb0 [ 283.012144][T12792] ? terminate_walk+0x382/0x4f0 [ 283.016984][T12792] ? filename_parentat+0x2bc/0x840 [ 283.022072][T12792] ? __rcu_read_lock+0x50/0x50 [ 283.026834][T12792] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 283.032183][T12792] security_transition_sid+0x78/0x90 [ 283.037459][T12792] may_create+0x5e0/0x930 [ 283.041766][T12792] ? slab_free_freelist_hook+0xd0/0x150 [ 283.047283][T12792] ? show_sid+0x210/0x210 [ 283.051634][T12792] ? selinux_inode_follow_link+0x2aa/0x390 [ 283.057419][T12792] ? from_kgid+0x203/0x350 [ 283.061829][T12792] ? generic_permission+0x13a/0x4a0 [ 283.067010][T12792] security_inode_create+0xa6/0x130 [ 283.072184][T12792] vfs_create+0x2ff/0x510 [ 283.076489][T12792] do_mknodat+0x323/0x460 [ 283.080790][T12792] ? vfs_mknod+0x640/0x640 [ 283.085194][T12792] do_syscall_64+0xcb/0x150 [ 283.089687][T12792] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 283.095570][T12792] RIP: 0033:0x45de59 [ 283.099439][T12792] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.119037][T12792] RSP: 002b:00007fb4e6a96c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 283.127432][T12792] RAX: ffffffffffffffda RBX: 00000000000210c0 RCX: 000000000045de59 [ 283.135395][T12792] RDX: 0000000000000708 RSI: 0000000000000000 RDI: 0000000020000140 [ 283.143355][T12792] RBP: 00007fb4e6a96ca0 R08: 0000000000000000 R09: 0000000000000000 [ 283.151304][T12792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.159291][T12792] R13: 00007ffcd28df1af R14: 00007fb4e6a979c0 R15: 000000000118bfd4 13:13:30 executing program 4 (fault-call:5 fault-nth:2): syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:30 executing program 1: socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 283.254634][T12791] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 283.265584][T12791] EXT4-fs (loop2): group descriptors corrupted! [ 283.329107][T12806] overlayfs: failed to resolve './file0': -2 13:13:30 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:30 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') readv(r0, &(0x7f0000000580)=[{&(0x7f0000000100)=""/29, 0x1d}, {&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/172, 0xac}, {&(0x7f0000000400)=""/149, 0x95}, {&(0x7f0000000340)=""/92, 0x5c}, {&(0x7f00000004c0)=""/165, 0xa5}], 0x6) r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) mknod(&(0x7f0000000140)='./file1\x00', 0x8, 0x7) 13:13:30 executing program 1: socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:30 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000200)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x0, 0x20) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x200280, 0x0) sendmsg$NFT_MSG_GETGEN(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x4}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x40000) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) [ 283.499693][T12813] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 283.534614][T12827] overlayfs: failed to resolve './file0': -2 [ 283.541170][T12813] EXT4-fs (loop2): group descriptors corrupted! [ 283.551598][T12826] FAULT_INJECTION: forcing a failure. [ 283.551598][T12826] name failslab, interval 1, probability 0, space 0, times 0 [ 283.571547][T12826] CPU: 0 PID: 12826 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 283.581731][T12826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.591784][T12826] Call Trace: [ 283.595055][T12826] dump_stack+0x1b0/0x21e [ 283.599369][T12826] ? devkmsg_release+0x11c/0x11c [ 283.604303][T12826] ? context_struct_to_string+0x5ab/0x7f0 [ 283.610027][T12826] ? show_regs_print_info+0x12/0x12 [ 283.615214][T12826] ? context_to_sid+0x63c/0x6b0 [ 283.620054][T12826] should_fail+0x6fb/0x860 [ 283.624469][T12826] ? setup_fault_attr+0x2b0/0x2b0 [ 283.629485][T12826] ? context_add_hash+0x177/0x200 [ 283.634484][T12826] ? ext4_alloc_inode+0x1b/0x620 [ 283.639411][T12826] should_failslab+0x5/0x20 [ 283.645371][T12826] kmem_cache_alloc+0x36/0x250 [ 283.650144][T12826] ? set_qf_name+0x350/0x350 [ 283.654724][T12826] ext4_alloc_inode+0x1b/0x620 [ 283.659868][T12826] ? set_qf_name+0x350/0x350 [ 283.664437][T12826] new_inode_pseudo+0x64/0x240 [ 283.669177][T12826] new_inode+0x25/0x1d0 [ 283.673590][T12826] ? avc_has_perm_noaudit+0x36d/0x3f0 [ 283.678945][T12826] __ext4_new_inode+0x609/0x5ce0 [ 283.683886][T12826] ? avc_denied+0x1c0/0x1c0 [ 283.688818][T12826] ? filename_parentat+0x2bc/0x840 [ 283.693933][T12826] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 283.699635][T12826] ? avc_has_perm+0xbd/0x260 [ 283.704200][T12826] ? avc_has_perm+0x15f/0x260 [ 283.708874][T12826] ? memset+0x1f/0x40 [ 283.712846][T12826] ? __dquot_initialize+0x228/0xdc0 [ 283.718056][T12826] ? may_create+0x6a8/0x930 [ 283.722537][T12826] ? slab_free_freelist_hook+0xd0/0x150 [ 283.728077][T12826] ext4_create+0x24e/0x5c0 [ 283.732538][T12826] ? ext4_lookup+0xae0/0xae0 [ 283.737114][T12826] ? security_inode_create+0xed/0x130 [ 283.742467][T12826] vfs_create+0x37d/0x510 [ 283.746774][T12826] do_mknodat+0x323/0x460 [ 283.751103][T12826] ? vfs_mknod+0x640/0x640 [ 283.755498][T12826] ? __x64_sys_futex+0x9d/0xf0 [ 283.760242][T12826] do_syscall_64+0xcb/0x150 [ 283.764726][T12826] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 283.770602][T12826] RIP: 0033:0x45de59 [ 283.774472][T12826] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.794053][T12826] RSP: 002b:00007fb4e6a96c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 13:13:30 executing program 4 (fault-call:5 fault-nth:3): syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 283.802460][T12826] RAX: ffffffffffffffda RBX: 00000000000210c0 RCX: 000000000045de59 [ 283.810429][T12826] RDX: 0000000000000708 RSI: 0000000000000000 RDI: 0000000020000140 [ 283.818376][T12826] RBP: 00007fb4e6a96ca0 R08: 0000000000000000 R09: 0000000000000000 [ 283.826341][T12826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 283.834299][T12826] R13: 00007ffcd28df1af R14: 00007fb4e6a979c0 R15: 000000000118bfd4 13:13:30 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:30 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:30 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:30 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) write(r1, &(0x7f00000002c0)="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", 0xfa) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x8b80, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)={0x4}, 0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000400)={0x0, 0x0, 0x9, 0x0, [], [{0x9, 0x9, 0x81, 0x7fff, 0x2477a1, 0x1000}, {0x337e, 0x9, 0xfffffffffffffff8, 0x8000, 0x100, 0x2}], [[], [], [], [], [], [], [], [], []]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r4, &(0x7f0000000200)="7672c4e956042e05f7985b8c00920cabe9a8ed7dad030fcbbb74cd9d5a19a50be947826e688e83fdab1938f743dca1a00b512972e80b0544266501eba025b77f97c22c5046a2e26e35edec0ecee763a3c36e5ad70768cf582fcc51c0bb7202aa4aa0bf5162a8e3c7569cc07c1df490bb48253e8f49023f18d0e17bf9", &(0x7f0000000700)=""/4096}, 0x20) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000001700)={@local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) getdents(r2, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:13:30 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) [ 284.082719][T12845] FAULT_INJECTION: forcing a failure. [ 284.082719][T12845] name failslab, interval 1, probability 0, space 0, times 0 [ 284.098642][T12846] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 284.119371][T12846] EXT4-fs (loop2): group descriptors corrupted! [ 284.124462][T12845] CPU: 0 PID: 12845 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 284.135857][T12845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.145908][T12845] Call Trace: [ 284.149200][T12845] dump_stack+0x1b0/0x21e [ 284.153516][T12845] ? devkmsg_release+0x11c/0x11c [ 284.158450][T12845] ? show_regs_print_info+0x12/0x12 [ 284.163631][T12845] ? _raw_spin_lock+0xa1/0x170 [ 284.168381][T12845] should_fail+0x6fb/0x860 [ 284.172784][T12845] ? setup_fault_attr+0x2b0/0x2b0 [ 284.177882][T12845] ? __mark_inode_dirty+0xaa4/0xbd0 [ 284.183069][T12845] ? fat_alloc_inode+0x19/0xa0 [ 284.187819][T12845] should_failslab+0x5/0x20 [ 284.192319][T12845] kmem_cache_alloc+0x36/0x250 [ 284.197083][T12845] ? fat_get_block_bmap+0x420/0x420 [ 284.202276][T12845] fat_alloc_inode+0x19/0xa0 [ 284.206862][T12845] ? fat_get_block_bmap+0x420/0x420 [ 284.212052][T12845] new_inode_pseudo+0x64/0x240 [ 284.216805][T12845] new_inode+0x25/0x1d0 [ 284.220971][T12845] ? atime_needs_update+0x570/0x570 [ 284.226160][T12845] fat_build_inode+0x1e8/0x3e0 [ 284.230929][T12845] msdos_create+0x449/0x540 [ 284.235430][T12845] ? msdos_lookup+0x4c0/0x4c0 [ 284.240113][T12845] ? from_kgid+0x203/0x350 [ 284.244534][T12845] ? security_inode_create+0xed/0x130 [ 284.249899][T12845] vfs_create+0x37d/0x510 [ 284.254225][T12845] do_mknodat+0x323/0x460 [ 284.258545][T12845] ? vfs_mknod+0x640/0x640 [ 284.262949][T12845] do_syscall_64+0xcb/0x150 [ 284.267444][T12845] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 284.273323][T12845] RIP: 0033:0x45de59 [ 284.277203][T12845] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.296792][T12845] RSP: 002b:00007fb4e6ab7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 284.305194][T12845] RAX: ffffffffffffffda RBX: 00000000000210c0 RCX: 000000000045de59 [ 284.313156][T12845] RDX: 0000000000000708 RSI: 0000000000000000 RDI: 0000000020000140 [ 284.321914][T12845] RBP: 00007fb4e6ab7ca0 R08: 0000000000000000 R09: 0000000000000000 13:13:31 executing program 4 (fault-call:5 fault-nth:4): syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 284.329964][T12845] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 284.337927][T12845] R13: 00007ffcd28df1af R14: 00007fb4e6ab89c0 R15: 000000000118bf2c 13:13:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:31 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) r4 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r4, 0x82307201, &(0x7f00000001c0)) 13:13:31 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:31 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[@ANYRESOCT]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000002c0)='./file1/../file0\x00', 0x0, 0x100) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getpeername$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000280)=0x14) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) listen(0xffffffffffffffff, 0x200) 13:13:31 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x0, 0x0}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:31 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) [ 284.553984][T12868] FAULT_INJECTION: forcing a failure. [ 284.553984][T12868] name failslab, interval 1, probability 0, space 0, times 0 [ 284.566504][T12864] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 284.587770][T12864] EXT4-fs (loop2): group descriptors corrupted! [ 284.598535][T12868] CPU: 1 PID: 12868 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 284.608703][T12868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.618769][T12868] Call Trace: [ 284.622067][T12868] dump_stack+0x1b0/0x21e [ 284.626379][T12868] ? devkmsg_release+0x11c/0x11c [ 284.631296][T12868] ? show_regs_print_info+0x12/0x12 [ 284.636492][T12868] ? fat_zeroed_cluster+0x820/0x820 [ 284.641670][T12868] should_fail+0x6fb/0x860 [ 284.647384][T12868] ? setup_fault_attr+0x2b0/0x2b0 [ 284.652822][T12868] ? should_fail+0x182/0x860 [ 284.657494][T12868] ? security_inode_alloc+0x32/0x1f0 [ 284.662814][T12868] should_failslab+0x5/0x20 [ 284.667299][T12868] kmem_cache_alloc+0x36/0x250 [ 284.672045][T12868] ? from_kuid_munged+0x3b0/0x3b0 [ 284.677058][T12868] security_inode_alloc+0x32/0x1f0 [ 284.682159][T12868] inode_init_always+0x37c/0x800 [ 284.687077][T12868] ? fat_get_block_bmap+0x420/0x420 [ 284.692278][T12868] new_inode_pseudo+0x7b/0x240 [ 284.697018][T12868] new_inode+0x25/0x1d0 [ 284.701162][T12868] ? atime_needs_update+0x570/0x570 [ 284.706351][T12868] fat_build_inode+0x1e8/0x3e0 [ 284.711096][T12868] msdos_create+0x449/0x540 [ 284.715579][T12868] ? msdos_lookup+0x4c0/0x4c0 [ 284.720254][T12868] ? from_kgid+0x203/0x350 [ 284.724675][T12868] ? security_inode_create+0xed/0x130 [ 284.730038][T12868] vfs_create+0x37d/0x510 [ 284.734351][T12868] do_mknodat+0x323/0x460 [ 284.738655][T12868] ? vfs_mknod+0x640/0x640 [ 284.743043][T12868] do_syscall_64+0xcb/0x150 [ 284.747553][T12868] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 284.753434][T12868] RIP: 0033:0x45de59 [ 284.757534][T12868] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.777222][T12868] RSP: 002b:00007fb4e6ab7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 284.785612][T12868] RAX: ffffffffffffffda RBX: 00000000000210c0 RCX: 000000000045de59 [ 284.793588][T12868] RDX: 0000000000000708 RSI: 0000000000000000 RDI: 0000000020000140 13:13:31 executing program 4 (fault-call:5 fault-nth:5): syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 284.801539][T12868] RBP: 00007fb4e6ab7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 284.809491][T12868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 284.817460][T12868] R13: 00007ffcd28df1af R14: 00007fb4e6ab89c0 R15: 000000000118bf2c 13:13:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x86000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:31 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x0, 0x0}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:31 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) [ 284.966977][T12873] FAT-fs (loop3): Unrecognized mount option "01777777777777777777777" or missing value 13:13:31 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:31 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x0, 0x0}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 285.040401][T12889] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 285.049714][T12889] EXT4-fs (loop2): group descriptors corrupted! 13:13:31 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:31 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 285.153792][T12873] FAT-fs (loop3): Unrecognized mount option "01777777777777777777777" or missing value 13:13:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x86800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:32 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) r3 = socket$nl_audit(0x10, 0x3, 0x9) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r4, 0x0, 0x0) fcntl$lock(r3, 0x6, &(0x7f0000000140)={0x1, 0x2, 0x1, 0x0, r4}) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:32 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:32 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:32 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000005c0)={'syztnl2\x00', &(0x7f0000000540)={'gretap0\x00', 0x0, 0x80, 0x10, 0x401, 0x9, {{0x14, 0x4, 0x2, 0x8, 0x50, 0x64, 0x0, 0x0, 0x29, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@lsrr={0x83, 0x13, 0x99, [@empty, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @ssrr={0x89, 0x23, 0x73, [@broadcast, @local, @rand_addr=0x64010100, @local, @dev={0xac, 0x14, 0x14, 0x10}, @local, @rand_addr=0x64010101, @multicast2]}, @ra={0x94, 0x4}]}}}}}) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f00000001c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18fa8ff89740001c2f9fa0b3836005404b0e0301a4ce875f2e31760163ee34004000000000000000000010101013c5811039e1577501eecce66fd6e2bbf0e5bf5ff1b0816f3f6db1c0001000000000000003a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="c70800002a00fb490ddcff5489814856af999f5b", @ANYRES32=r4], 0x2}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000600)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000700)={'batadv0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000800)={'vcan0\x00', 0x0}) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f00000001c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18fa8ff89740001c2f9fa0b3836005404b0e0301a4ce875f2e31760163ee34004000000000000000000010101013c5811039e1577501eecce66fd6e2bbf0e5bf5ff1b0816f3f6db1c0001000000000000003a09ffc2c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="c70800002a00fb490ddcff5489814856af999f5b", @ANYRES32=r9], 0x2}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_GET(r1, &(0x7f0000000a80)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000ac0)={0x1f8, 0x0, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x20040000}, 0x40804) chdir(&(0x7f0000000000)='./file1\x00') r10 = open(&(0x7f0000000180)='.\x00', 0xd0602, 0xb34e15e9875f452) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r10, 0x82307201, &(0x7f00000001c0)) [ 285.423522][T12915] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 13:13:32 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:32 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x3, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 285.476125][T12915] EXT4-fs (loop2): group descriptors corrupted! 13:13:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:32 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x402001, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000280)={@local}, 0x14) fallocate(r1, 0x12, 0x1000, 0x2) dup(r1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000140)={{0x1, 0x0, @descriptor="af81c73305d7f1a0"}}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r3, 0x40189429, &(0x7f0000000200)={0x1, 0x0, 0x400}) syz_extract_tcp_res$synack(&(0x7f00000002c0), 0x1, 0x0) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x86c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:32 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x321040, 0xc5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='selinuxfs\x00', 0x4010, &(0x7f0000000280)='msdos\x00') r3 = open(&(0x7f00000002c0)='./file0\x00', 0x200000, 0x1c4) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x28, r4, 0x230, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private1={0xfc, 0x1, [], 0x1}}]}, 0x28}, 0x1, 0x0, 0x0, 0x24008004}, 0x8010) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) 13:13:32 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x0, 0x0, 0x6}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:32 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0xff) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x4) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:13:32 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:32 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x4, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x0, 0x0, 0x6}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 285.749409][T12969] overlayfs: missing 'lowerdir' [ 285.763266][T12968] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 285.773212][T12968] EXT4-fs (loop2): group descriptors corrupted! 13:13:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x87400, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:32 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='./file1\x00', 0x0, 0x180) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) [ 285.961432][T12980] overlayfs: missing 'lowerdir' 13:13:32 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x5, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:32 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) timerfd_create(0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:13:32 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x0, 0x0, 0x6}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:33 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x8) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r4, 0x111, 0x5, 0x1ff, 0x4) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 286.222979][T12988] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 286.258020][T12988] EXT4-fs (loop2): group descriptors corrupted! 13:13:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x87a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:33 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[]) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) [ 286.359841][T13010] overlayfs: missing 'lowerdir' 13:13:33 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x6, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x1284803, &(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRESHEX=0x0, @ANYRES16, @ANYRES64=r1, @ANYRES64=r0]) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) r5 = socket$pptp(0x18, 0x1, 0x2) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$NL80211_CMD_GET_SURVEY(r6, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x1c, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4001}, 0x8850) r7 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r7, 0x82307201, &(0x7f00000001c0)) 13:13:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:33 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x22, 0x1, &(0x7f0000000080)=[{&(0x7f0000000200)="0400050900000000666174000404090a0200027400f801", 0x17, 0x6}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f0000000140)) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='environ\x00') getdents(r0, &(0x7f0000000100)=""/34, 0x22) ioctl$FITRIM(r1, 0x82307201, &(0x7f00000001c0)) 13:13:33 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[]) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) [ 286.508618][T13027] overlayfs: missing 'lowerdir' [ 286.521719][T13020] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 286.537408][T13020] EXT4-fs (loop2): group descriptors corrupted! 13:13:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:33 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x7, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c103, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 286.650287][T13038] FAT-fs (loop3): bogus number of reserved sectors [ 286.661736][T13038] FAT-fs (loop3): Can't find a valid FAT filesystem 13:13:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:33 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000000200)="0400050900000000666174000404090a0200027400f8019a1cc0654c84b3b74b71cbc5aa63615425c2f7c7ed5a540d175773747eb7f8507f0108410967c9d74191488a1ca129149bc3c99f74cda90b51995d6ff108960478d9261652a98f7a46d1b4ce00bd644f0ceff09bb2ed91bb9059774834b52bd6e76971", 0x7a}], 0x802012, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00'}) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000300)={0x0, r1}, 0x10) fcntl$setown(r2, 0x8, 0xffffffffffffffff) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r5 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r5, 0x82307201, &(0x7f00000001c0)) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="91269069ad270e7e00d156d01a1d23f41bb51b41d3caadb2bf34fbc7f28622303efda9e47707ccc6cc04fa52da393b4dcdc6efc1588a0beceaa0c5b37bf9ea106e103baff1f64e99d72dbfa3eaf1", @ANYRES16=0x0, @ANYBLOB="00062dbd7000fbdbdf25120000000800390001010000080032008000000008003b0006000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20044000}, 0x8000) 13:13:33 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[]) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) [ 286.773975][T13047] overlayfs: missing 'lowerdir' 13:13:33 executing program 3: chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f00000006c0)=0xe8) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file1\x00', 0x3, 0x6, &(0x7f0000000500)=[{&(0x7f0000000200)="5e1044b55fc9a97e4372814d5b4f615290d6c2dd1e5f298699b2690b00d92df0d98ed8f82ad4ea00db0bec6bdf6df8e6688a481168702c6cd00413d664389297dd11e8c543e006db6188cdd2197273ca8ba24a2c19208f7f3aa83aced434eea1b040067cfdaa78513052c58079f63b8631bf", 0x72, 0xb1}, {&(0x7f0000000280)="9c4cf73fa82673b11328f07d610771ef4f3e8963e90b8eb4f9690bc897d771d1d52fdc73b5fb96398fda36400185f8b8dbfc930fb02da8465ca0fa0f183ec82f73b877056915f5cb93c6273fb9f75c7417620580d5efb8b4bd0f9dd493555f138d2665ad07724e282c09d6ad0666ee6df5ffe06f1940e1c214ab274270c4ae484916229cc5309405717d6ee83881b048c593d42f7a5e44ebd314f4c9c3c351055b13a078ae4d4c796dbac0e32e0259337021797f5736d0b1ae9b1e8d27e5a90f42d0", 0xc2, 0x9}, {&(0x7f00000000c0)="ecb7e7c43bac649e74415d59f304107e66800cd87371a7662e7573819920396912c16b80e992b0b32a634a9dfad4d867d7", 0x31, 0x100000000}, {&(0x7f0000000380)="7a349fe79683b12e144727b02f3f65e7215e5f1e14e027d0cd7321f747274e3b2ec04173f2d87dc259922565596cf8b6f9f9e05598b8041f75c9f75341d1bf1c5398bd685e61c216cbd4890e8ded5b682761616d9a2f938b810f3b221e84f020c4da", 0x62, 0x40}, {&(0x7f0000000140)="c44543e6997aa84979bae7754146524367852a36e76f0203219ec277a3647e354f3da54b76503dcfc01e7c08196de7b6b09223", 0x33, 0x391c0000000}, {&(0x7f0000000400)="bc008ac706f70039fdbe0cfa4564a4681dda7d792347db931cdba2b3727c189a169c2476a925f37df77e37a6c7598301cf95a5fef777b3bb6937b9704810fe504bf5be02b590c804585cfd58c83b470533529db18d5754242bd2cd023cc1949987ba97955b8148e3bfe7f9fef3de9ae44c3b869478f77eff6f47e358c12dac2ffcefca6099c105b9628ca00bf80c41943a60342ea1e658a939e7d195637d71a61cbcd3bbc7fba28458f084347528d3a0f14caad9e49b114ed51281c22010ed89802a715d0e5309d0684a50af5a8e219dde059a74205a4f763f8209941eb542cc4bfb4281bd46979daa497d3fbd86", 0xee}], 0x20c2, &(0x7f0000000700)={[{@rodir='rodir'}, {@uni_xlateno='uni_xlate=0'}], [{@obj_type={'obj_type'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@smackfsroot={'smackfsroot', 0x3d, '@]'}}, {@fowner_lt={'fowner<', r3}}, {@obj_type={'obj_type', 0x3d, '\xe5&'}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000780)={0x80, {0x8000, 0x6d2, 0x7fffffff, 0x7, 0xa85, 0x6}}) 13:13:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 286.836712][T13051] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 286.846389][T13051] EXT4-fs (loop2): group descriptors corrupted! 13:13:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8e0ff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:33 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x8, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 287.008626][T13078] overlayfs: missing 'lowerdir' 13:13:33 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:33 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000400)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:13:33 executing program 3: chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000080)='./file1/file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)={0x0}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x500000) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000140)={r3, 0x0, r5, 0x6}) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)={0x0, 0x800000008}) 13:13:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x808000, &(0x7f0000000140)=ANY=[@ANYRESDEC=r0, @ANYRES16]) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x2, &(0x7f0000000300)=0x1, 0x3e1) r5 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r5, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x1}, 0x1c) r6 = dup(r3) r7 = syz_io_uring_complete(0x0) ioctl$RTC_UIE_ON(r7, 0x7003) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r1}, 0x8) write$rfkill(r8, &(0x7f0000000240)={0x2}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getdents(r2, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:13:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 287.119728][T13080] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 287.136000][T13080] EXT4-fs (loop2): group descriptors corrupted! 13:13:34 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x9, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8fc00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 287.254341][T13107] overlayfs: missing 'lowerdir' 13:13:34 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x7, 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) getsockopt$EBT_SO_GET_INIT_INFO(r4, 0x0, 0x82, &(0x7f0000000200)={'nat\x00'}, &(0x7f0000000280)=0x78) 13:13:34 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:34 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) [ 287.352083][T13112] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 287.361361][T13112] EXT4-fs (loop2): group descriptors corrupted! 13:13:34 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 287.458291][T13124] overlayfs: missing 'lowerdir' 13:13:34 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xfffffffffffffffc}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:34 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:34 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xa, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8ff01, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:34 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:34 executing program 5: syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) [ 287.755637][T13130] FAT-fs (loop3): bogus number of reserved sectors [ 287.780508][T13130] FAT-fs (loop3): Can't find a valid FAT filesystem [ 287.858685][T13148] overlayfs: missing 'lowerdir' 13:13:34 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:34 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=.']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:34 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xb, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 287.879800][T13141] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 287.889155][T13130] FAT-fs (loop3): bogus number of reserved sectors [ 287.909955][T13130] FAT-fs (loop3): Can't find a valid FAT filesystem [ 287.917188][T13141] EXT4-fs (loop2): group descriptors corrupted! 13:13:34 executing program 5: newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r0) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000300)='./file1\x00', 0xaac3, 0x8, &(0x7f0000000a00)=[{&(0x7f0000000400)="178b8b638b1d314997ba41c62b69c52ef48df9e52dc9daeaa7ca392ead3b589857c390c646a081ecb05ee7d7e300f4d4a935e629bd1b67e9408570c681bd36fafd974b7a5ed60f5711fa7ea4525fd8e84c6f3870799da668228b39656981cf31ec4e6e3e926bafa3b17d0af149b6500f05bb9116d2e9f64394732f38d691765516765dd54670a8c7c4919e00f3c67ac74b9a0389c48b7a4a842201d24c5aeb2eb40a99bdcb77b8abf0479663154fd481ac04486d9f176a363c448c1f5d3cec4dc94b3f4daa95a0469442e31a55fc53a6788f9adfff7b691f6f", 0xd9}, {&(0x7f0000000500)="52fdc9ba364f8fde0bdefe2f40066610ac35124b422c8a66d34189be5e0107097e7e6b3b02f4783f7cc747a76b78343119de1d334dd65fba108a85690676e7e81c4e5b3c704a90442f04876b6458fbd054abfe0e240aff0fbc53c308e3fd352b8f11a7e16e807194dded6aa78ab3ef13f81d1a3f5a847cd49def9387e029b95a91fb82d8c06432b1007b992a09dde630a9aaa1da0dffc344bb", 0x99, 0x12ee6730}, {&(0x7f00000005c0)="d8b426ea64f7697422f9374c975024c988b0ebe0df59e89e1c14c0d82a5030d55d781230662ab82bcc871a4a627ebcc71ae340000154b05d15c049a40658d3bee4107b414543e1298f5dc7a3ffc0c5767ebf88c7a74a4f7ed619b765fbe5205dd642d067a428409a3e2678f34ce718e9628e4c3e710d3e87a6e2deeb6820cbc06ca0d459c6beb070e2becb5cc45969a9ff7cf5e9c34a1b2a4e4539a1a02c", 0x9e, 0x5}, {&(0x7f0000000680)="1b37d39771fca5152898e3d71c0ae015b022743c93b6d83d8d055be77d32e4a540affbf3783efc05a79c3244f99ea2dd75a8ac6db51db541ecab1324884e56bf45bacdb58d6511f2e8bf139e0605b39db1d98101ecddda0552e08704cb1a2a2efc10618102c9da95702a7018368b364175f1e81874581034e3c05d3a024e914902e4220385968f09169e9e13efe3c1d318a8c31d153d6a5968394eddedcc364396c8df96eb52bffa1dce31942b8023090ad47f2a8224416b4b5bc8ff424b03122b6c50512373a393afefb91ba1b988139470d7fe5376", 0xd6, 0xd8}, {&(0x7f0000000780)="75ae51caa6041eca38316b0a0d163574a05b00938a38bb1f023ce90489fef75e083361161216b5d348f22af37a8b1e4779e1fa3603d77862b5c15daa2e19499547e8f1ab339b95bde1bc0b7097ea72ab232208f6a25ef1722e1f85b96692d0fd5dedff2e15732b082f66fe5f93fece53f36d2c8c7a9c7681604d252f5d2f4a34b7251c3dd9fdbd32850361049204dbd67ef104f45fb62e59ec3d5199f18aca6924ac1c7b9c0887502d4e221be2b6d7ec81dd89c54cbd", 0xb6, 0xada}, {&(0x7f0000000840)="3d6d43b2a00346e615fa42474da03188c1355149eb3a87c5521fbba7e5bb15e51b727ff67861cfbb928f15e479ea232a5cfac9896511fb9ef3c3854c322dd11fb3cbc03c5e189dd8cb32bf06439701a70b250c668bf0a925220cf0501a89587bb8818490f152dbbae0c7b367c412c69fa958b2372fc97bb1b8695000354bf3c370ba7c385c7bcbc44aceabbf387a58baa28670988e1186fddead7d78116b443969d492eab56ebbb5cc97c985365b7b944879184d734e15cb355827532f4b99a56f2b40c3fe77428ba9f831fc4b68105fe5da9958d18fd5fbbf8a5f4882c5e881172ded", 0xe3, 0x5}, {&(0x7f0000000940)="7096938f2da8decc588a31b9bdc83dd86247a3300d96313baa3e53b1ced2104a9f8e6408f93e9417ee449f7edd4b39f582471267ca5f84d297d34bb5141d367d90d4dd71f1575a0c5b986bd071039f52ed4fe7c77c6c2c401dcd0efba005b59162993c16efa5385c8fdd529c82f64004809df410ce453ed405a352ddafa343f13d847b9bac61868d", 0x88, 0xfffffffffffffffa}, {&(0x7f0000000340)="90b2a90f15d8ca16a9035ba26c0f60a7226ca1eed40658e0917a8bd3c841bd352e02c1de31cd69f450179dacdcbf2f4ab88a8f47e0e5946a681d2270", 0x3c, 0x5}], 0x20000, &(0x7f0000000ac0)={[{@test_dummy_encryption='test_dummy_encryption'}, {@data_err_ignore='data_err=ignore'}, {@user_xattr='user_xattr'}, {@minixdf='minixdf'}, {@nogrpid='nogrpid'}, {@noauto_da_alloc='noauto_da_alloc'}], [{@uid_lt={'uid<', 0xee01}}, {@subj_role={'subj_role', 0x3d, 'msdos\x00'}}, {@hash='hash'}, {@fowner_eq={'fowner', 0x3d, r0}}, {@obj_role={'obj_role', 0x3d, 'msdos\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x65, 0x37, 0x37, 0x30, 0x62, 0x62, 0x38], 0x2d, [0x36, 0x38, 0x64, 0x66], 0x2d, [0x39, 0x39, 0x63, 0x38], 0x2d, [0x5e, 0x34, 0x36, 0x63], 0x2d, [0x64, 0x36, 0x31, 0x36, 0x30, 0x35, 0xca, 0x39]}}}]}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000380)={0x6, 0x400}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_udp_int(r5, 0x11, 0x1, &(0x7f0000000100)=0xd51, 0x4) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0xb, &(0x7f0000000200)=""/209) ioctl$FITRIM(r3, 0x82307201, &(0x7f00000001c0)) r6 = openat$cgroup_subtree(r2, &(0x7f0000000c00)='cgroup.subtree_control\x00', 0x2, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c80)={&(0x7f0000000c40)='./file1\x00'}, 0x10) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000cc0)={0x7, 0x6, 0x3, 0x0, 0x0, [{{}, 0x1a82}, {{r6}, 0x6}, {{r7}, 0x101}]}) 13:13:34 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:34 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) write(r2, &(0x7f0000000200)="c3a5f787118acd611b985b9a056749af6c663b3b3bdd22a22c540ff7681e03500fc66001a0df86c060891339fc86cf976f6d89fdd7011ab9a3ed164bf13a4f0d7e676c39c5b1743ceb362d3a19f524e1ccb927606fe91a7220487804be7ea94088307fa5f0dbcf7fb6687224e21e309a8e7b2bb6d1b3bf7bf0d761ab18b88ca88702705456dc63d736e0622cf08f31880551674ff671bb6143ec48d4390d28970613f7105c8073689e5ad5ab0f73474881c3ea8297a3b2813d31d99dd6094b6b8ce79a2beee0b5865d", 0xc9) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) linkat(r3, &(0x7f0000000300)='./file1\x00', r5, &(0x7f0000000340)='./file1\x00', 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:34 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=.']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) [ 288.021345][T13159] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 288.030094][T13159] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 13:13:34 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x10}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000100)='./file1\x00', 0x1b1200, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:13:35 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xc, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8ff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:35 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r2 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self\x00', 0x30880, 0x0) sendfile(r2, r1, &(0x7f0000000380)=0x330, 0x7) socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x1f, 0x400) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) linkat(r3, &(0x7f0000000240)='./file1\x00', r5, &(0x7f0000000280)='./file1\x00', 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$BTRFS_IOC_FS_INFO(r6, 0x8400941f, &(0x7f0000000780)) r7 = fsmount(r1, 0x0, 0x1) sendmsg$TCPDIAG_GETSOCK(r7, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="ec6df1aa3db9f259130000001200177833e1af406100082abd70004bdbdf252b01d2074e204e20766d00dd7ecc22ff070000004b06000003", @ANYRES32=0x0, @ANYBLOB="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"], 0xec}, 0x1, 0x0, 0x0, 0xe5833ebfc32b454b}, 0x40004) r8 = dup(r0) ioctl$MON_IOCT_RING_SIZE(r3, 0x9204, 0xfa1b) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getdents(r1, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r1, 0x82307201, &(0x7f00000001c0)) [ 288.293026][T13178] FAT-fs (loop5): bogus number of reserved sectors [ 288.319898][T13177] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 288.328600][T13178] FAT-fs (loop5): Can't find a valid FAT filesystem 13:13:35 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=.']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 288.338456][T13183] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 288.339460][T13177] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 288.357013][T13183] EXT4-fs (loop2): group descriptors corrupted! 13:13:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:35 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xd, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8ffe0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:35 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xe, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 288.621361][T13178] FAT-fs (loop5): bogus number of reserved sectors [ 288.628412][T13206] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 288.646245][T13178] FAT-fs (loop5): Can't find a valid FAT filesystem [ 288.655869][T13206] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 13:13:35 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000140), 0x3824c2, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:35 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upper']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:35 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) fsmount(r3, 0x1, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:13:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 288.717577][T13214] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 288.729947][T13214] EXT4-fs (loop2): group descriptors corrupted! 13:13:35 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x10, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:35 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="e07eb80c31f3e72551b215a9f8a319e033bdd768704f52745fdf203d1e7ceb12817b4b585bfe5c6fb9282f46f5a003cf", 0x30, 0xfffffffffffffffd) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$cgroup_pid(r4, &(0x7f0000000200), 0x12) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000140)) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 288.854291][T13229] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 288.871424][T13229] EXT4-fs (loop2): group descriptors corrupted! [ 288.873013][T13237] overlayfs: unrecognized mount option "upper" or missing value 13:13:35 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upper']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:35 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x20000080) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, &(0x7f0000000100)=0x1, 0x4) chdir(&(0x7f0000000000)='./file1\x00') r4 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r4, 0x82307201, &(0x7f00000001c0)) 13:13:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:36 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/1011], 0x3f3) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) [ 289.181894][T13255] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 289.207198][T13252] overlayfs: unrecognized mount option "upper" or missing value 13:13:36 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upper']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 289.229150][T13255] EXT4-fs (loop2): group descriptors corrupted! 13:13:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:36 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r3, 0x10, &(0x7f0000000100)={&(0x7f0000000200)=""/159, 0x9f}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r4 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) timerfd_gettime(r7, &(0x7f0000009200)) r8 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) recvmmsg(r8, &(0x7f0000008f80)=[{{&(0x7f00000002c0)=@xdp, 0x80, &(0x7f0000000380)=[{&(0x7f0000000340)=""/62, 0x3e}], 0x1, &(0x7f0000000400)=""/5, 0x5}, 0x3}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)=""/100, 0x64}], 0x1, &(0x7f0000000500)=""/71, 0x47}, 0xff}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000580)=""/32, 0x20}, {&(0x7f00000005c0)=""/54, 0x36}, {&(0x7f0000000600)=""/36, 0x24}, {&(0x7f0000000640)=""/251, 0xfb}, {&(0x7f0000000740)=""/170, 0xaa}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/47, 0x2f}, {&(0x7f0000001840)=""/225, 0xe1}], 0x8}, 0x5}, {{&(0x7f00000019c0)=@in6={0xa, 0x0, 0x0, @private1}, 0x80, &(0x7f0000002c00)=[{&(0x7f0000001a40)=""/37, 0x25}, {&(0x7f0000001a80)=""/6, 0x6}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000002ac0)=""/46, 0x2e}, {&(0x7f0000002b00)=""/220, 0xdc}], 0x5, &(0x7f0000002c80)=""/4096, 0x1000}, 0xffff}, {{&(0x7f0000003c80)=@can, 0x80, &(0x7f0000006240)=[{&(0x7f0000003d00)=""/213, 0xd5}, {&(0x7f0000003e00)=""/247, 0xf7}, {&(0x7f0000003f00)=""/123, 0x7b}, {&(0x7f0000003f80)=""/144, 0x90}, {&(0x7f0000004040)=""/240, 0xf0}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/208, 0xd0}, {&(0x7f0000005240)=""/4096, 0x1000}], 0x8, &(0x7f00000062c0)=""/34, 0x22}}, {{&(0x7f0000006300)=@hci, 0x80, &(0x7f0000006440)=[{&(0x7f0000006380)=""/96, 0x60}, {&(0x7f0000006400)=""/62, 0x3e}], 0x2, &(0x7f0000006480)=""/201, 0xc9}, 0x4}, {{0x0, 0x0, &(0x7f00000078c0)=[{&(0x7f0000006580)=""/239, 0xef}, {&(0x7f0000006680)=""/85, 0x55}, {&(0x7f0000006700)=""/4096, 0x1000}, {&(0x7f0000007700)=""/65, 0x41}, {&(0x7f0000007780)=""/122, 0x7a}, {&(0x7f0000007800)=""/174, 0xae}], 0x6, &(0x7f0000007940)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000008940)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000008ac0)=[{&(0x7f00000089c0)=""/201, 0xc9}], 0x1, &(0x7f0000008b00)=""/138, 0x8a}, 0x3}, {{&(0x7f0000008bc0)=@tipc, 0x80, &(0x7f0000008e80)=[{&(0x7f0000008c40)=""/139, 0x8b}, {&(0x7f0000008d00)=""/112, 0x70}, {&(0x7f0000008d80)=""/125, 0x7d}, {&(0x7f0000008e00)=""/116, 0x74}], 0x4, &(0x7f0000008ec0)=""/162, 0xa2}, 0x9}], 0x9, 0x2, &(0x7f00000091c0)) ioctl$FITRIM(r4, 0x82307201, &(0x7f00000001c0)) 13:13:36 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x11, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:36 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 289.531280][T13271] FAT-fs (loop3): Unrecognized mount option "™û5.Ü;ù/W&"1WÞ”ÏàÕpê™oS)¤‚(;ÐŒ{ÀÖìè¨~4Tœ‘H­" or missing value [ 289.551235][T13277] overlayfs: unrecognized mount option "upper" or missing value [ 289.560983][T13281] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 289.572170][T13281] EXT4-fs (loop2): group descriptors corrupted! 13:13:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 289.644194][T13271] FAT-fs (loop3): Unrecognized mount option "™û5.Ü;ù/W&"1WÞ”ÏàÕpê™oS)¤‚(;ÐŒ{ÀÖìè¨~4Tœ‘H­" or missing value 13:13:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:36 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661740004040911020000f8010000", 0x17}], 0x800, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x30) r1 = openat$cgroup_type(r0, &(0x7f0000000240)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000180)=[0x81, 0x9]) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000280)={{0x2, 0x4e21, @empty}, {0x306, @multicast}, 0x46, {0x2, 0x4e22, @local}}) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) connect$tipc(r0, &(0x7f0000000300)=@name={0x1e, 0x2, 0x3, {{0x40}, 0x4}}, 0x10) 13:13:36 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x12, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 289.758447][T13299] overlayfs: filesystem on './file1' not supported 13:13:36 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperd']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 289.934123][T13307] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 289.959918][T13307] EXT4-fs (loop2): group descriptors corrupted! [ 290.005794][T13314] overlayfs: unrecognized mount option "upperd" or missing value 13:13:37 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x20, 0x3, 0x7, 0x101, 0x0, 0x0, {0xa, 0x0, 0x9}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x48001) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:13:37 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@ax25={{}, [@null, @remote, @rose, @rose, @netrom, @rose, @netrom]}, &(0x7f0000000140)=0x80, 0x800) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_WDS_PEER(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x74, r1, 0x8, 0x70bd27, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x0, 0x4e}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @random="3809a134da53"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @random="d6325407a7b4"}, @NL80211_ATTR_MAC={0xa, 0x6, @random="ef8ae6feb0b7"}]}, 0x74}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004004) r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r2, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:13:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:37 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperd']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:37 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x13, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 290.476425][T13330] overlayfs: unrecognized mount option "upperd" or missing value [ 290.487758][T13328] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 13:13:37 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperd']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:37 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x24, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:37 executing program 3: syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 290.518157][T13328] EXT4-fs (loop2): group descriptors corrupted! 13:13:37 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x50, 0xa, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0x6}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0xffff}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x24000081}, 0x40804) r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:13:37 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 290.642496][T13350] overlayfs: unrecognized mount option "upperd" or missing value 13:13:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:37 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xc0, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:37 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 290.879177][T13370] overlayfs: unrecognized mount option "upperdir=" or missing value [ 290.887630][T13368] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 290.909656][T13368] EXT4-fs (loop2): group descriptors corrupted! 13:13:37 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="c70800002a00fb490ddcff5489814856af999f5b", @ANYRES32], 0x2}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000340)={'ip6tnl0\x00', 0x0, 0x4, 0xe0, 0x81, 0x1, 0x8, @private0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1, 0x7, 0xc8ef, 0xdf8}}) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f00000001c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18fa8ff89740001c2f9fa0b3836005404b0e0301a4ce875f2e31760163ee34004000000000000000000010101013c5811039e1577501eecce66fd6e2bbf0e5bf5ff1b0816f3f6db1c0001000000000000003a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="c70800002a00fb490ddcff5489814856af999f5b", @ANYRES32=r5], 0x2}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f00000001c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18fa8ff89740001c2f9fa0b3836005404b0e0301a4ce875f2e31760163ee34004000000000000000000010101013c5811039e1577501eecce66fd6e2bbf0e5bf5ff1b0816f3f6db1c000100003a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="c70800002a00fb490ddcff5489814856af999f5b", @ANYRES32=r7], 0x2}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000680)={&(0x7f0000000440)={0x210, 0x0, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x210}, 0x1, 0x0, 0x0, 0x800}, 0x24000089) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:37 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = add_key$fscrypt_provisioning(&(0x7f0000000100)='fscrypt-provisioning\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000200)={0x2, 0x0, "0d38c177c3cb3c748d62d67cc9fef82a88596396528485d7fb664233d8ff7aa97e684f245ae34385201301f70a2f843402e48cc5914dab2ab51af8d5942b2eef331454b9aff314dac7a679a2cdb3237dc4cee25319"}, 0x5d, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r2) keyctl$chown(0x4, r1, r2, 0xee00) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r4 = open(&(0x7f0000000180)='.\x00', 0x3c9201, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r4, 0x82307201, &(0x7f00000001c0)) 13:13:37 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x300, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 291.108809][T13388] overlayfs: unrecognized mount option "upperdir=" or missing value 13:13:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:37 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:38 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x480, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:38 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x2000000000}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)={0x0, 0x0, 0x200}) 13:13:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 291.262820][T13396] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 291.272370][T13396] EXT4-fs (loop2): group descriptors corrupted! [ 291.312743][T13408] overlayfs: unrecognized mount option "upperdir=" or missing value 13:13:38 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:38 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L+', 0x5}, 0x16, 0x2) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)={0x2a0, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0xa8, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}]}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x138, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x9}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x94, 0x2, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}]}, 0x2a0}, 0x1, 0x0, 0x0, 0x4020014}, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) r3 = socket$inet_icmp(0x2, 0x2, 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r3, &(0x7f0000000300)=0x100000001, r5, &(0x7f0000000340)=0x1, 0x9, 0x7) 13:13:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:38 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x4f5, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:38 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)={0x30, 0x6f, 0x1, {0x3, [{0x0, 0x4, 0x2}, {0x20, 0x4, 0x8}, {0x8, 0x4, 0x5}]}}, 0x30) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) [ 291.548020][T13417] FAT-fs (loop5): bogus number of reserved sectors [ 291.561384][T13431] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 291.576600][T13429] overlayfs: filesystem on './file1' not supported [ 291.581669][T13417] FAT-fs (loop5): Can't find a valid FAT filesystem 13:13:38 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 291.598735][T13431] EXT4-fs (loop2): group descriptors corrupted! [ 291.660464][T13417] FAT-fs (loop5): bogus number of reserved sectors [ 291.667801][T13417] FAT-fs (loop5): Can't find a valid FAT filesystem 13:13:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:38 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_usb_connect(0x4, 0x72c, &(0x7f0000000400)={{0x12, 0x1, 0x51, 0x66, 0x53, 0x9e, 0x8, 0xdf6, 0x5c, 0x4689, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x71a, 0x3, 0xfc, 0x4, 0x10, 0x4, [{{0x9, 0x4, 0x30, 0x3c, 0x9, 0xff, 0xff, 0xff, 0x0, [], [{{0x9, 0x5, 0x5, 0x8, 0x20, 0x38, 0x4b, 0x7}}, {{0x9, 0x5, 0xd, 0x0, 0x3ff, 0x8, 0x1f, 0x8, [@generic={0xcc, 0x6, "21351797eab9f9960b147f254c94f923a57cc8897ecb3d9e267909434cbb226436a9932b3dbf2d261e44fdfb25ead1799d48b59bf2fc9aad1df627eae030eef528a81e8a331a3c4ee5d0b4aef4e04da32c8d17c38b44d69c1d1bbee95491431a819d98f1ea8bf645570fec6a4077b8f8ce047df64600aab5ff2afb238382ebe09df79b9872fcee50eec9c50ad576435747e0f224abf21d13a0a45e9e69e03eac33bd285e39238a55438bfb3bfe6d5201e2a9b79d427869eaa0e9792eb3bc70ecca33a94ab620c8049bcb"}, @uac_iso={0x7, 0x25, 0x1, 0x82, 0x40, 0x1f}]}}, {{0x9, 0x5, 0x9, 0x10, 0x3ff, 0x9, 0x3f, 0x5b, [@generic={0x1d, 0xa, "378ce49059174373bcfb5ec6d6b698e80d1a8430af894a1de454db"}, @generic={0x54, 0x24, "5a51451469973aa8f2f166d3d72fc65312736a861bf480897cf98bce9990ded1b0d71303a5b8c19579508320562bed8c07b188b430f0984bb8e241f87220bf4d320e207b930a35e8d9febb4cd240f5f5cdcc"}]}}, {{0x9, 0x5, 0xa, 0x10, 0x3ff, 0xff, 0xe3, 0x1}}, {{0x9, 0x5, 0x5, 0x1c, 0x3ff, 0x64, 0x1, 0x8}}, {{0x9, 0x5, 0x4, 0x8, 0x200, 0x7f, 0x2, 0x65}}, {{0x9, 0x5, 0x6, 0x0, 0x40, 0x2, 0x3, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x3, 0x9, 0xfe6}, @generic={0xc4, 0xf, "54edfd330d7d269e5507a0c150924fcec97541d360fbf86e4c1030e0672fe07b5f6afa615c68bebd2e1b16a52491ac3ca823041f2a19612dc4e6c6b7f761a193186baabb0cd4552da1a623c7eed82d640a7cb6623f6cb2544581d7d66c61d537ad7f979999c8907fca43e0c9b4c91417bee872f085f2f0f2b71f3230217c40cf3e1cf6be2e6e7b002197d2d2b62fb1378d0aaa96b9a33d14514c1ac2604b19fde29edd66e9decded7af0413c542e896ea9520279faabc39f65bdb86c5612a7d3ac91"}]}}, {{0x9, 0x5, 0x1, 0x0, 0x8, 0x3f, 0x8, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x1, 0x5}]}}, {{0x9, 0x5, 0xd, 0x2, 0x10, 0x4, 0x7, 0x40, [@generic={0x57, 0xd, "c2b3f590ac2626639aaa344ff320f5ef76d5ceaffbc858016b14bada3826ea5633f1c2d1d5294b7844e60e80faf559c5d0672a24e7426fcfa237a09d2d6c7014631e25b4afe3fcf289d1e76f1c3b9e62652bb2ab63"}]}}]}}, {{0x9, 0x4, 0xac, 0x81, 0xc, 0x98, 0x8, 0xa1, 0x0, [], [{{0x9, 0x5, 0xc, 0x2, 0x3ff, 0x8, 0xd5, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x8, 0x4}]}}, {{0x9, 0x5, 0x5, 0x6, 0x10, 0x1, 0x3f, 0x1}}, {{0x9, 0x5, 0xe, 0x8, 0x3ff, 0x9, 0x3f, 0xe9, [@generic={0x11, 0x3, "148ba03c7aa47f022c3943661b02a2"}]}}, {{0x9, 0x5, 0x3, 0xc, 0x10, 0x1f, 0x80, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x5, 0x9}]}}, {{0x9, 0x5, 0x7, 0x0, 0x8, 0x20, 0x3, 0x8, [@generic={0xf1, 0x22, "02afb4c73c827410d6b4b0748378583dc6eaccdfde684bcf43cc5b9327c2c5b6b3f912e7b248f1abd8ffab1ee3649ef0b44352a6c52a413f8a0b155b328e374793b9a9e40be735278d3f6c96938ab10e477604d4159a46a058a914e351dbda8dee5965449cb63148d7ae413945eb2c2d6d18ea5eb92f318c29b7fb51029346130cf6d6317f2d71219daa9f5ba2f614ca75e231e41b640af94ae860d786b1a4201517f019d5be9fc2cfda3e159d2f4b788d854cff1a0a3cba9890550eeeaf3421d15d308f0b4abdaf55680e9ee319a421fc20710ef61f9db62ae9320a4c694cf7545ef1127c1e5468aa871bb00770b3"}]}}, {{0x9, 0x5, 0x8, 0x0, 0x8, 0x2, 0x3, 0x5}}, {{0x9, 0x5, 0x7, 0x10, 0x400, 0x0, 0x45, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x1b, 0x2}, @generic={0xd5, 0x21, "c34c9b1ff011a6b530fc9ea15dda7e3456d7517cfb9945b3f41c79907d3be02ee6200fb3fcaccc0b55773e0d2c7737174e7f1a30ea0c634a55fdb431814566b2b050b93202463fe355711d9f6bf2e99bd41cc083f4c2b505da1f90fadb4b6297a386aae5e647ac58028e327c0764bdc933dc073ecc9a3af3086b5a58abdf70fb4cc5117302d239a9c3aa380bfdfc8887dc3c695914b21fffd277a803f8cdaea32883cdd5a725cce87201108f187a0a9f4635c2fdb1da7836b6a0a97d843fd61627844d44b7eec5d8e6296fac11f43fb0841044"}]}}, {{0x9, 0x5, 0x2, 0x0, 0x400, 0x0, 0x4, 0x2, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0xff, 0x4}, @generic={0x4, 0x10, "f076"}]}}, {{0x9, 0x5, 0x7, 0x10, 0x400, 0x5, 0x1, 0x8}}, {{0x9, 0x5, 0x7, 0x2, 0x400, 0x24, 0x0, 0x18}}, {{0x9, 0x5, 0x6, 0x7, 0x478, 0x37, 0xc0, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0x81, 0xff}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x5, 0x1}]}}, {{0x9, 0x5, 0x80, 0x0, 0x3ff, 0xff, 0x1f, 0x30}}]}}, {{0x9, 0x4, 0xe5, 0x9, 0x6, 0xc2, 0xc7, 0x5e, 0x0, [], [{{0x9, 0x5, 0x1, 0x3, 0x39f, 0x80, 0x20, 0x80, [@generic={0x33, 0x21, "d6ed1619e97c7e94113b6990f11462ec5e0d7178fd519d9154c32171c4b63e606d0e99e01c2751f67ffafcfc358f4d4596"}]}}, {{0x9, 0x5, 0xf, 0x1, 0x10, 0x8, 0x81, 0x40, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x5, 0x3}, @generic={0xf7, 0x7, "609684410e0ba228007d46eaee9e79e17fd8cceccaa8aa1238f7893f0fe0a61765a87108a5c87b79e05e9d30b737dfeb6f4908310553663229ce207a4b10bbf275ba196cf7c5d7c059c1fcf974bc22a6ab7bd3660c11e827b5915c38f941c41fe0d6a056692facaaea70b31cc8ed25ba349d132ffedae7305d57d76ab14c6babf3c912a28b8fb0cb995173ce6a723211e5ef5cbd6827bc3bf412bc28a28c49e709269fe52f87311a3b89cc88eecb1fb39ac821e468f37c73f5106a35e3b3d9a064b85d4ead5de0b2fc231592e0b1f0e8aa73508faeba16afeef54329240e8d432c96577161eac2705702bc01eca07289ab38bdb899"}]}}, {{0x9, 0x5, 0xa, 0x1, 0x8, 0x1, 0xfb, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0xed, 0x7ff}, @uac_iso={0x7, 0x25, 0x1, 0x180, 0x1, 0x1f}]}}, {{0x9, 0x5, 0xc, 0x10, 0x20, 0x1, 0x8, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x0, 0x3}, @generic={0x3d, 0xb, "9effdf93b5228b1585652210dc23629377030bc30f861fcf092b4ae59771451e60a2f7a39c45aba52d58d22885b7c50106db0021e07e694ac5f362"}]}}, {{0x9, 0x5, 0x8, 0x10, 0x197, 0xff, 0xf7, 0x80, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x4c, 0x3}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x2, 0x4}]}}, {{0x9, 0x5, 0x86, 0x4, 0x10, 0x5, 0xff, 0x6}}]}}]}}]}}, &(0x7f0000000b40)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x300, 0x6, 0x5, 0x8, 0x48, 0x8}, 0x5, &(0x7f0000000200)={0x5, 0xf, 0x5}, 0x3, [{0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x41c}}, {0x5a, &(0x7f0000000280)=@string={0x5a, 0x3, "784fd5f4f4cdc7140b6dab0f07845b309b6c742395d947bb0fd2dc7f34101775b9489d29a595f65364bad9790fef68740505662a5247e5a75d717dd9420d32c8a61fdc222c5b7c08a841f82a2c7220011a01fcd0541ad55a"}}, {0x91, &(0x7f0000000300)=@string={0x91, 0x3, "21af2efbd984fcff8b920a2a0a544b9f30367b8392d1bf22c242555afe4a624d2e7984d85e84397a6275928474c88db844e1c453136256c86e06b5b176a33b81b613216b3117a7ca1f2248dc8446a2fa3107e6b7692a0585f75ffde28d32be44627e51d1089d168f77adbdcc33d670daf9f2641c70b64e1aaf68d06ed7cac2534d09b5c890ef50dc6472006650721b"}}]}) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x41500, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000100)={0x21}, 0x8) 13:13:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 291.784419][T13450] overlayfs: unrecognized mount option "upperdir=" or missing value 13:13:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:38 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:38 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x500, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:38 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) utimes(&(0x7f0000000140)='./file1\x00', &(0x7f0000000240)={{0x77359400}, {r0, r1/1000+60000}}) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400201) getdents(r2, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) [ 291.986232][T13457] FAT-fs (loop5): Unrecognized mount option "îÉÅ [ 291.986232][T13457] ÕvCWGàò$«ò ¤^žià>¬3½(^9#ŠUC‹û;þmRâ©·Bxiê éy.³¼pìÊ3©J¶ È›Ë%‚@" or missing value [ 292.008598][T13459] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 292.018470][T13459] EXT4-fs (loop2): group descriptors corrupted! 13:13:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:38 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) [ 292.122445][T13479] overlayfs: unrecognized mount option "upperdir=" or missing value 13:13:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, 0x0, 0x0, 0x0) 13:13:39 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x600, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 292.266926][T13482] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 292.276602][T13482] EXT4-fs (loop2): group descriptors corrupted! [ 292.337374][T13492] overlayfs: unrecognized mount option "upperdir=" or missing value [ 292.565542][T13457] FAT-fs (loop5): Unrecognized mount option "îÉÅ [ 292.565542][T13457] ÕvCWGàò$«ò ¤^žià>¬3½(^9#ŠUC‹û;þmRâ©·Bxiê éy.³¼pìÊ3©J¶ È›Ë%‚@" or missing value 13:13:39 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000100)) ioctl(r0, 0x7fff, &(0x7f0000000140)="bb78ba522ba2aa04b00bf854c2e92ded453e4a484acc8223fbdcf7aa3ae01c5a7863398a509ef5fddf00e6cc70c7e9f0") 13:13:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, 0x0, 0x0, 0x0) 13:13:39 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:39 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, 0x0, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000140), &(0x7f0000000200)=0x4) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:39 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x700, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2e, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:39 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:13:39 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0xffffdfff, 0x4, &(0x7f0000000500)=[{&(0x7f0000000580)="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"/517, 0x205, 0x20}, {&(0x7f0000000300)="2e0db9a3f8f5443f0752491d6a0d416668811dd9274ab84e8d45ebbd12af4a2276cc2ba006ee86a662e32f3319e98bb154ad1718d8ddcfda4449f6020fc96c1ab3639bc3a6aded8aefc489dba88a0b91a63d07b5f69ee4718b5cd19ff8e559690ecc3bb2a0", 0x65, 0x6}, {&(0x7f0000000380)="3a31c378425d81ff6f75160c25799b5e36ef3b78130ad3f587b1b3f1ba21c3f26cbe440437711d95433cba465a8b19c43463be53f6a10ef63eddfd9fde69ccd0279fe5b020228770ff6817a6713614a2eec745f240822e2c63192f8567d5d09bd79c861825411b8fa5fa71024d5ec1eaea367cba56682e03120cc6c5f7c00b463b1579d79ff28d3c2138877a1dbe32bf63a218e12c4378d543a762749ede5c49570a87eb7c1f56dafc915ef18d8d3204b9259df6838912324bd4794190c43759ea6c2c0e0186535a3b58b9ecb82829643846af5aa6c8f2b5e3924e5ecaacc9c3b12fd1968b1e57665690804a", 0xec, 0x3}, {&(0x7f0000000480)="56e66b37b4f16498b2002b065865bfcc062630900c1feeacfe8312c02fb5d1d3cb25ca8a545fc7cea85caf7be774e3d952f786bbd71ab62eb59e23e6c7128f402485b3", 0x43, 0x7f}], 0x2a0000, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000200)=0x1c) ioctl$BTRFS_IOC_SPACE_INFO(r1, 0xc0109414, &(0x7f00000007c0)={0x28c, 0x2, [[], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], []]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000004500)={0x2, {{0x2, 0x4e21, @rand_addr=0x64010100}}, {{0x2, 0x4e23, @empty}}}, 0x108) r3 = dup(r2) r4 = open_tree(r0, &(0x7f0000000240)='\x00', 0x100) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)={0x0, 0x1}) 13:13:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, 0x0, 0x0, 0x0) [ 292.684898][T13512] overlayfs: filesystem on './file1' not supported [ 292.779335][T13519] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 292.793206][T13519] EXT4-fs (loop2): group descriptors corrupted! 13:13:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000100), 0x4) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r5 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffe) ioctl$FITRIM(r5, 0x82307201, &(0x7f00000001c0)) 13:13:39 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x900, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:39 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./']) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x64, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 292.954676][T13540] overlayfs: failed to resolve './file1': -2 13:13:39 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000300)=0xe8) recvfrom$packet(r1, &(0x7f0000000140)=""/40, 0x28, 0x3, &(0x7f0000000340)={0x11, 0xc, r2, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f0000000400)='./file1\x00') r3 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r3, 0x82307201, &(0x7f00000001c0)) 13:13:39 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000140)=0x2) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:39 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 293.092497][T13553] overlayfs: filesystem on './file1' not supported [ 293.122063][T13552] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 293.131540][T13552] EXT4-fs (loop2): group descriptors corrupted! 13:13:40 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xa00, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x300, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x2, &(0x7f0000000080)=[{&(0x7f0000000200)="78bd1e863b3a03dfe8fcfa92e7fba043ae633f7f09c2730a59c78b0d499a03f2f44f3f032a4ece5559d156acef7cc7fa2af5a4b2b3376924c7a9f36d066d3d23668e85ad388cbd9157961d09ea0d1ba060f534e7d8ba5d796592966e38a8a62ae591c059b36ab0fc69eeca2811aad300354c112e463c1a65c96b38495fdde52b34d25b30ddced04a08f46a41d2f06386697b4c2c5e73c231122d53785d8cfdbc73a0eae70aee83a1d1d4dbe1bfc10839c2f3c113", 0xb4, 0xb3f}, {&(0x7f00000002c0)="dbaab62dbbc6cdb198b292730fdbdb198e31a3a79bd7a6454aac34da10e9e369c75bc33b6e8bcc8b574626485c7282728e5da00164f776234ab11dce3e7fdbd58ea5504054cf70b38ae221bc5bf6f61e2b2747ebe21f0f96f6f1cc20e8cceb15e521ad05d2b08014f9067940efa1556ae21b438ee7ce1860e7a2bbaed0812dfbdc9e3c49cffe20f6329f97f9", 0xa1, 0x10003}], 0x40001, &(0x7f00000000c0)=ANY=[@ANYRES16=r1, @ANYRES16, @ANYRESDEC=r2]) chdir(&(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000480)={'filter\x00', 0x0, 0x3, 0x1c, [], 0x6, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000140)=""/28}, &(0x7f0000000380)=0x78) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getdents(r3, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r3, 0x82307201, &(0x7f00000001c0)) [ 293.347287][T13570] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 293.350407][T13569] overlayfs: filesystem on './file1' not supported [ 293.375801][T13570] EXT4-fs (loop1): group descriptors corrupted! 13:13:40 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xb00, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:40 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 293.396323][T13579] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 293.406499][T13579] EXT4-fs (loop2): group descriptors corrupted! 13:13:40 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x383, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 293.652987][T13595] overlayfs: missing 'lowerdir' 13:13:40 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x40000, 0x76) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000140)={@multicast2, @broadcast}, &(0x7f0000000200)=0xc) [ 293.725679][T13593] overlayfs: filesystem on './file1' not supported [ 293.757320][T13602] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 293.766846][T13602] EXT4-fs (loop2): group descriptors corrupted! 13:13:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x14040, &(0x7f0000000200)=ANY=[@ANYRESHEX, @ANYBLOB="bb001230ff8a84a30d5da24bea54135415201e60b7de6ec3724cb04ddba6242321e39be322eb41bd99917e30c771e257771963174b57686923f3983b1649a8d518d12434cee8e8cb11e9ecf1370a3815361cccf274358c8f86e44f65fba982746fd25433f3a22ca3d3f73fea355e8732e5", @ANYRESHEX=0x0]) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r4 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r4, 0x82307201, &(0x7f00000001c0)) unlinkat(r4, &(0x7f0000000080)='./file1\x00', 0x0) 13:13:40 executing program 0: socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006, 0x0, 0x6}]}, 0x10) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:40 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) 13:13:40 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xc00, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x3fa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:40 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x123001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x2}, 0x7) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f0000002440)={0x0, 0x5, 0x7, 0x1}) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) read$FUSE(r0, &(0x7f0000000400)={0x2020, 0x0, 0x0, 0x0}, 0x2020) lsetxattr$security_capability(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002880)='security.capability\x00', &(0x7f00000028c0)=@v3={0x3000000, [{0x6, 0x3}, {0x1ff, 0x7fffffff}], r5}, 0x18, 0x2) r6 = socket(0x2, 0x6, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r7, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) sendmsg$NFT_BATCH(r8, &(0x7f0000002840)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000002900)=ANY=[@ANYBLOB="1400e4007e78cccc964a884e0000100001000010000000000000120a01020000008930248ae59f000000000003000007ffffff7f73797a31040000001c000000140a01040000000000000000050000090800034000000006140000001100010000000000000000000000000a0000"], 0x64}, 0x1, 0x0, 0x0, 0xc800}, 0x2004) read$char_raw(r4, &(0x7f0000002a00)={""/38021}, 0x9600) lchown(&(0x7f0000000300)='./file1\x00', r5, r7) 13:13:40 executing program 1 (fault-call:3 fault-nth:0): syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 294.022891][T13620] FAT-fs (loop5): Unrecognized mount option "0xffffffffffffffff»" or missing value [ 294.031528][T13622] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 294.041535][T13622] EXT4-fs (loop2): group descriptors corrupted! [ 294.047170][T13614] overlayfs: missing 'lowerdir' 13:13:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x3fc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:40 executing program 0 (fault-call:6 fault-nth:0): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:40 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xd00, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:41 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000100)) r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) [ 294.247534][T13642] FAULT_INJECTION: forcing a failure. [ 294.247534][T13642] name failslab, interval 1, probability 0, space 0, times 0 [ 294.260266][T13642] CPU: 0 PID: 13642 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 294.270439][T13642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.280476][T13642] Call Trace: [ 294.283771][T13642] dump_stack+0x1b0/0x21e [ 294.288169][T13642] ? devkmsg_release+0x11c/0x11c [ 294.293094][T13642] ? show_regs_print_info+0x12/0x12 [ 294.298523][T13642] ? memset+0x1f/0x40 [ 294.302586][T13642] ? unwind_next_frame+0x1c07/0x22b0 [ 294.307850][T13642] should_fail+0x6fb/0x860 [ 294.312284][T13642] ? setup_fault_attr+0x2b0/0x2b0 [ 294.317313][T13642] ? unwind_next_frame+0x1c07/0x22b0 [ 294.322580][T13642] ? __alloc_skb+0x88/0x4d0 [ 294.327084][T13642] should_failslab+0x5/0x20 [ 294.331585][T13642] kmem_cache_alloc+0x36/0x250 [ 294.336409][T13642] __alloc_skb+0x88/0x4d0 [ 294.340770][T13642] alloc_skb_with_frags+0xb1/0x580 [ 294.345876][T13642] ? unwind_next_frame+0x1c07/0x22b0 [ 294.346222][T13646] FAULT_INJECTION: forcing a failure. [ 294.346222][T13646] name failslab, interval 1, probability 0, space 0, times 0 [ 294.351176][T13642] sock_alloc_send_pskb+0x87e/0xcc0 [ 294.351188][T13642] ? sock_kzfree_s+0x50/0x50 [ 294.351200][T13642] ? memset+0x1f/0x40 [ 294.351218][T13642] ? unwind_next_frame+0x1c07/0x22b0 [ 294.382763][T13642] __ip_append_data+0x1fbd/0x31b0 [ 294.387790][T13642] ? unwind_get_return_address+0x48/0x90 [ 294.393443][T13642] ? ip_do_fragment+0x2290/0x2290 [ 294.398462][T13642] ? ip_setup_cork+0x810/0x810 [ 294.403219][T13642] ? ipv4_mtu+0x212/0x2c0 [ 294.407546][T13642] ? ip_setup_cork+0x46b/0x810 [ 294.412304][T13642] ip_make_skb+0x1c9/0x4d0 [ 294.416720][T13642] ? ip_do_fragment+0x2290/0x2290 [ 294.421737][T13642] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 294.427365][T13642] ? __sk_dst_check+0x1b0/0x1b0 [ 294.432215][T13642] udp_sendmsg+0x1d1b/0x2e80 [ 294.436812][T13642] ? ip_do_fragment+0x2290/0x2290 [ 294.441838][T13642] ? udp_cmsg_send+0x340/0x340 [ 294.446597][T13642] ? __up_read+0x6f/0x1b0 [ 294.450926][T13642] ? __down_read+0x210/0x210 [ 294.455510][T13642] ? selinux_socket_sendmsg+0x10b/0x320 [ 294.461061][T13642] ? selinux_socket_accept+0x580/0x580 [ 294.466514][T13642] ? rw_copy_check_uvector+0x6b/0x310 [ 294.471883][T13642] ? inet_send_prepare+0x1b7/0x470 [ 294.476990][T13642] ? inet_send_prepare+0x470/0x470 [ 294.482095][T13642] ____sys_sendmsg+0x56f/0x860 [ 294.486858][T13642] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 294.492053][T13642] __sys_sendmmsg+0x338/0x680 [ 294.496728][T13642] ? __ia32_sys_sendmsg+0x90/0x90 [ 294.501751][T13642] ? __rcu_read_lock+0x50/0x50 [ 294.506511][T13642] ? __kasan_slab_free+0x1e2/0x220 [ 294.511614][T13642] ? __kasan_slab_free+0x168/0x220 [ 294.516724][T13642] ? slab_free_freelist_hook+0xd0/0x150 [ 294.522268][T13642] ? kmem_cache_free+0xac/0x5c0 [ 294.527128][T13642] ? do_sys_open+0x4a3/0x620 [ 294.531716][T13642] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 294.537786][T13642] ? do_sys_open+0x2fc/0x620 [ 294.542374][T13642] ? proc_fail_nth_write+0x166/0x200 [ 294.547657][T13642] ? proc_fail_nth_read+0x1c0/0x1c0 [ 294.552855][T13642] ? ip4_datagram_release_cb+0x864/0xde0 [ 294.558481][T13642] ? proc_fail_nth_read+0x1c0/0x1c0 [ 294.563679][T13642] ? memset+0x1f/0x40 [ 294.567676][T13642] ? fsnotify+0x13a0/0x1460 [ 294.575392][T13642] ? __kernel_write+0x340/0x340 [ 294.580239][T13642] ? fsnotify+0x13a0/0x1460 [ 294.584775][T13642] ? security_file_permission+0x128/0x300 [ 294.590494][T13642] ? __sb_end_write+0xa4/0xf0 [ 294.595166][T13642] ? vfs_write+0x427/0x4f0 [ 294.599589][T13642] ? ksys_write+0x237/0x2a0 [ 294.604110][T13642] ? __ia32_sys_read+0x80/0x80 [ 294.608874][T13642] __x64_sys_sendmmsg+0x9c/0xb0 [ 294.613745][T13642] do_syscall_64+0xcb/0x150 [ 294.618258][T13642] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 294.624156][T13642] RIP: 0033:0x45de59 [ 294.628046][T13642] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.647680][T13642] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 294.656105][T13642] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 294.664075][T13642] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 294.672041][T13642] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 294.680006][T13642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 294.687975][T13642] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 294.695974][T13646] CPU: 1 PID: 13646 Comm: syz-executor.1 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 294.706121][T13646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.716184][T13646] Call Trace: [ 294.719459][T13646] dump_stack+0x1b0/0x21e [ 294.723773][T13646] ? devkmsg_release+0x11c/0x11c [ 294.728693][T13646] ? show_regs_print_info+0x12/0x12 [ 294.733878][T13646] ? fsnotify+0x13a0/0x1460 [ 294.738368][T13646] should_fail+0x6fb/0x860 [ 294.742786][T13646] ? setup_fault_attr+0x2b0/0x2b0 [ 294.748036][T13646] ? security_file_permission+0x128/0x300 [ 294.753752][T13646] ? ksys_mount+0x30/0xf0 [ 294.758073][T13646] should_failslab+0x5/0x20 [ 294.762570][T13646] __kmalloc_track_caller+0x5d/0x2b0 [ 294.767859][T13646] ? strnlen_user+0x185/0x210 [ 294.772722][T13646] strndup_user+0x73/0x150 [ 294.777139][T13646] ksys_mount+0x30/0xf0 [ 294.781275][T13646] __x64_sys_mount+0xb1/0xc0 [ 294.785848][T13646] do_syscall_64+0xcb/0x150 [ 294.790681][T13646] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 294.796555][T13646] RIP: 0033:0x45de59 [ 294.800424][T13646] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.820512][T13646] RSP: 002b:00007f59655f7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 294.828934][T13646] RAX: ffffffffffffffda RBX: 0000000000021a00 RCX: 000000000045de59 [ 294.837032][T13646] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000400000 13:13:41 executing program 0 (fault-call:6 fault-nth:1): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 294.845128][T13646] RBP: 00007f59655f7ca0 R08: 0000000020000100 R09: 0000000000000000 [ 294.853085][T13646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 294.861302][T13646] R13: 00007fff5c787dcf R14: 00007f59655f89c0 R15: 000000000118bfd4 13:13:41 executing program 1 (fault-call:3 fault-nth:1): syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:13:41 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xe00, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 294.902963][T13644] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 294.929867][T13644] EXT4-fs (loop2): group descriptors corrupted! [ 294.940798][T13663] FAULT_INJECTION: forcing a failure. [ 294.940798][T13663] name failslab, interval 1, probability 0, space 0, times 0 [ 294.953948][T13663] CPU: 1 PID: 13663 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 294.964126][T13663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.974193][T13663] Call Trace: [ 294.977494][T13663] dump_stack+0x1b0/0x21e [ 294.981837][T13663] ? devkmsg_release+0x11c/0x11c [ 294.986796][T13663] ? show_regs_print_info+0x12/0x12 [ 294.991983][T13663] ? memset+0x1f/0x40 [ 294.998484][T13663] ? unwind_next_frame+0x1c07/0x22b0 [ 295.003781][T13663] should_fail+0x6fb/0x860 [ 295.008204][T13663] ? setup_fault_attr+0x2b0/0x2b0 [ 295.013214][T13663] ? unwind_next_frame+0x1c07/0x22b0 [ 295.018661][T13663] ? alloc_skb_with_frags+0xb1/0x580 [ 295.023990][T13663] should_failslab+0x5/0x20 [ 295.028509][T13663] __kmalloc_track_caller+0x5d/0x2b0 [ 295.033791][T13663] ? kmem_cache_alloc+0x1d5/0x250 [ 295.038850][T13663] ? alloc_skb_with_frags+0xb1/0x580 [ 295.044164][T13663] __alloc_skb+0xd1/0x4d0 [ 295.048502][T13663] alloc_skb_with_frags+0xb1/0x580 [ 295.053604][T13663] ? unwind_next_frame+0x1c07/0x22b0 [ 295.058934][T13663] sock_alloc_send_pskb+0x87e/0xcc0 [ 295.064138][T13663] ? path_openat+0x2258/0x4270 [ 295.068921][T13663] ? sock_kzfree_s+0x50/0x50 [ 295.073535][T13663] ? memset+0x1f/0x40 [ 295.077498][T13663] ? unwind_next_frame+0x1c07/0x22b0 [ 295.082779][T13663] __ip_append_data+0x1fbd/0x31b0 [ 295.087805][T13663] ? unwind_get_return_address+0x48/0x90 [ 295.093435][T13663] ? ip_do_fragment+0x2290/0x2290 [ 295.098448][T13663] ? ip_setup_cork+0x810/0x810 [ 295.103216][T13663] ? ipv4_mtu+0x212/0x2c0 [ 295.107530][T13663] ? ip_setup_cork+0x46b/0x810 [ 295.112275][T13663] ip_make_skb+0x1c9/0x4d0 [ 295.116682][T13663] ? ip_do_fragment+0x2290/0x2290 [ 295.121687][T13663] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 295.127323][T13663] ? __sk_dst_check+0x1b0/0x1b0 [ 295.132259][T13663] udp_sendmsg+0x1d1b/0x2e80 [ 295.136929][T13663] ? ip_do_fragment+0x2290/0x2290 [ 295.141929][T13663] ? udp_cmsg_send+0x340/0x340 [ 295.146679][T13663] ? __up_read+0x6f/0x1b0 [ 295.150998][T13663] ? __down_read+0x210/0x210 [ 295.155582][T13663] ? selinux_socket_sendmsg+0x10b/0x320 [ 295.161125][T13663] ? selinux_socket_accept+0x580/0x580 [ 295.166581][T13663] ? rw_copy_check_uvector+0x6b/0x310 [ 295.171941][T13663] ? inet_send_prepare+0x1b7/0x470 [ 295.177059][T13663] ? inet_send_prepare+0x470/0x470 [ 295.182159][T13663] ____sys_sendmsg+0x56f/0x860 [ 295.186964][T13663] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 295.192183][T13663] __sys_sendmmsg+0x338/0x680 [ 295.198017][T13663] ? __ia32_sys_sendmsg+0x90/0x90 [ 295.203030][T13663] ? __rcu_read_lock+0x50/0x50 [ 295.207786][T13663] ? __kasan_slab_free+0x1e2/0x220 [ 295.212895][T13663] ? __kasan_slab_free+0x168/0x220 [ 295.218001][T13663] ? slab_free_freelist_hook+0xd0/0x150 [ 295.223522][T13663] ? kmem_cache_free+0xac/0x5c0 [ 295.228503][T13663] ? do_sys_open+0x4a3/0x620 [ 295.233096][T13663] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 295.239170][T13663] ? do_sys_open+0x2fc/0x620 [ 295.243753][T13663] ? proc_fail_nth_write+0x166/0x200 [ 295.249048][T13663] ? proc_fail_nth_read+0x1c0/0x1c0 [ 295.255296][T13663] ? ip4_datagram_release_cb+0x864/0xde0 [ 295.260933][T13663] ? proc_fail_nth_read+0x1c0/0x1c0 [ 295.266152][T13663] ? memset+0x1f/0x40 [ 295.270133][T13663] ? fsnotify+0x13a0/0x1460 [ 295.274618][T13663] ? __kernel_write+0x340/0x340 [ 295.279445][T13663] ? fsnotify+0x13a0/0x1460 [ 295.283940][T13663] ? security_file_permission+0x128/0x300 [ 295.289643][T13663] ? __sb_end_write+0xa4/0xf0 [ 295.294358][T13663] ? vfs_write+0x427/0x4f0 [ 295.298754][T13663] ? ksys_write+0x237/0x2a0 [ 295.303342][T13663] ? __ia32_sys_read+0x80/0x80 [ 295.308107][T13663] __x64_sys_sendmmsg+0x9c/0xb0 [ 295.312941][T13663] do_syscall_64+0xcb/0x150 [ 295.317438][T13663] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 295.323306][T13663] RIP: 0033:0x45de59 [ 295.327190][T13663] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.346831][T13663] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 13:13:42 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NL80211_CMD_SET_CHANNEL(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x48, 0x0, 0x1, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x77e, 0x6f}}}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x18}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x44000}, 0x50) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) rename(&(0x7f0000000140)='./file1\x00', &(0x7f0000000200)='./file1\x00') getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) [ 295.355227][T13663] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 295.363266][T13663] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 295.371459][T13663] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 295.379413][T13663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 295.387374][T13663] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 295.416120][T13668] FAULT_INJECTION: forcing a failure. [ 295.416120][T13668] name failslab, interval 1, probability 0, space 0, times 0 [ 295.429399][T13668] CPU: 0 PID: 13668 Comm: syz-executor.1 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 295.439873][T13668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.450521][T13668] Call Trace: [ 295.453804][T13668] dump_stack+0x1b0/0x21e [ 295.458124][T13668] ? devkmsg_release+0x11c/0x11c [ 295.463049][T13668] ? show_regs_print_info+0x12/0x12 [ 295.468241][T13668] ? fsnotify+0x13a0/0x1460 [ 295.472739][T13668] should_fail+0x6fb/0x860 [ 295.477137][T13668] ? setup_fault_attr+0x2b0/0x2b0 [ 295.482606][T13668] ? security_file_permission+0x128/0x300 [ 295.488329][T13668] ? ksys_mount+0x62/0xf0 [ 295.492645][T13668] should_failslab+0x5/0x20 [ 295.497149][T13668] __kmalloc_track_caller+0x5d/0x2b0 [ 295.502783][T13668] ? strnlen_user+0x185/0x210 [ 295.507577][T13668] strndup_user+0x73/0x150 [ 295.511988][T13668] ksys_mount+0x62/0xf0 [ 295.516131][T13668] __x64_sys_mount+0xb1/0xc0 [ 295.520706][T13668] do_syscall_64+0xcb/0x150 [ 295.525203][T13668] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 295.531080][T13668] RIP: 0033:0x45de59 [ 295.534975][T13668] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.554568][T13668] RSP: 002b:00007f59655f7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 13:13:42 executing program 0 (fault-call:6 fault-nth:2): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 295.562968][T13668] RAX: ffffffffffffffda RBX: 0000000000021a00 RCX: 000000000045de59 [ 295.570930][T13668] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000400000 [ 295.578893][T13668] RBP: 00007f59655f7ca0 R08: 0000000020000100 R09: 0000000000000000 [ 295.586868][T13668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 295.594832][T13668] R13: 00007fff5c787dcf R14: 00007f59655f89c0 R15: 000000000118bfd4 13:13:42 executing program 1 (fault-call:3 fault-nth:2): syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:13:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x3fd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 295.694180][T13677] FAULT_INJECTION: forcing a failure. [ 295.694180][T13677] name failslab, interval 1, probability 0, space 0, times 0 [ 295.707216][T13677] CPU: 0 PID: 13677 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 295.717358][T13677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.727440][T13677] Call Trace: [ 295.730741][T13677] dump_stack+0x1b0/0x21e [ 295.735075][T13677] ? devkmsg_release+0x11c/0x11c [ 295.740014][T13677] ? show_regs_print_info+0x12/0x12 [ 295.745224][T13677] ? memset+0x1f/0x40 [ 295.749197][T13677] should_fail+0x6fb/0x860 [ 295.753609][T13677] ? setup_fault_attr+0x2b0/0x2b0 [ 295.758641][T13677] ? memset+0x1f/0x40 [ 295.762648][T13677] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 295.768102][T13677] ? skb_clone+0x1b2/0x370 [ 295.772503][T13677] should_failslab+0x5/0x20 [ 295.776997][T13677] kmem_cache_alloc+0x36/0x250 [ 295.781752][T13677] skb_clone+0x1b2/0x370 [ 295.786599][T13677] dev_queue_xmit_nit+0x279/0x9e0 [ 295.791620][T13677] xmit_one+0x7b/0x460 [ 295.795675][T13677] __dev_queue_xmit+0x1858/0x25d0 [ 295.800690][T13677] ? dev_queue_xmit+0x20/0x20 [ 295.805894][T13677] ? ip_finish_output2+0x936/0x1810 [ 295.811091][T13677] ip_finish_output2+0xbdf/0x1810 [ 295.816106][T13677] ? ip_fragment+0x210/0x210 [ 295.820686][T13677] ? __ip_finish_output+0x4e1/0x6d0 [ 295.825891][T13677] ip_output+0x318/0x400 [ 295.830138][T13677] ? ip_finish_output+0x1d0/0x1d0 [ 295.835322][T13677] ? ip_mc_finish_output+0x3a0/0x3a0 [ 295.840595][T13677] ? udp4_hwcsum+0x26b/0x430 [ 295.845174][T13677] ip_send_skb+0xaa/0x140 [ 295.849610][T13677] udp_send_skb+0x8e9/0x1100 [ 295.854459][T13677] udp_sendmsg+0x1d45/0x2e80 [ 295.859037][T13677] ? ip_do_fragment+0x2290/0x2290 [ 295.864042][T13677] ? udp_cmsg_send+0x340/0x340 [ 295.868899][T13677] ? __up_read+0x6f/0x1b0 [ 295.873304][T13677] ? __down_read+0x210/0x210 [ 295.877882][T13677] ? selinux_socket_sendmsg+0x10b/0x320 [ 295.883417][T13677] ? selinux_socket_accept+0x580/0x580 [ 295.888951][T13677] ? rw_copy_check_uvector+0x6b/0x310 [ 295.894319][T13677] ? inet_send_prepare+0x1b7/0x470 [ 295.899413][T13677] ? inet_send_prepare+0x470/0x470 [ 295.904507][T13677] ____sys_sendmsg+0x56f/0x860 [ 295.909258][T13677] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 295.914457][T13677] __sys_sendmmsg+0x338/0x680 [ 295.919126][T13677] ? __ia32_sys_sendmsg+0x90/0x90 [ 295.924146][T13677] ? __rcu_read_lock+0x50/0x50 [ 295.928918][T13677] ? __kasan_slab_free+0x1e2/0x220 [ 295.934020][T13677] ? __kasan_slab_free+0x168/0x220 [ 295.939138][T13677] ? slab_free_freelist_hook+0xd0/0x150 [ 295.944673][T13677] ? kmem_cache_free+0xac/0x5c0 [ 295.949598][T13677] ? do_sys_open+0x4a3/0x620 [ 295.954193][T13677] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 295.960266][T13677] ? do_sys_open+0x2fc/0x620 [ 295.964874][T13677] ? proc_fail_nth_write+0x166/0x200 [ 295.970150][T13677] ? proc_fail_nth_read+0x1c0/0x1c0 [ 295.975344][T13677] ? ip4_datagram_release_cb+0x864/0xde0 [ 295.980977][T13677] ? proc_fail_nth_read+0x1c0/0x1c0 [ 295.986168][T13677] ? memset+0x1f/0x40 [ 295.990135][T13677] ? fsnotify+0x13a0/0x1460 [ 295.994625][T13677] ? __kernel_write+0x340/0x340 [ 295.999461][T13677] ? fsnotify+0x13a0/0x1460 [ 296.003960][T13677] ? security_file_permission+0x128/0x300 [ 296.010474][T13677] ? __sb_end_write+0xa4/0xf0 [ 296.015145][T13677] ? vfs_write+0x427/0x4f0 [ 296.019634][T13677] ? ksys_write+0x237/0x2a0 [ 296.024148][T13677] ? __ia32_sys_read+0x80/0x80 [ 296.030120][T13677] __x64_sys_sendmmsg+0x9c/0xb0 [ 296.034966][T13677] do_syscall_64+0xcb/0x150 [ 296.039723][T13677] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 296.045607][T13677] RIP: 0033:0x45de59 [ 296.049505][T13677] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.069098][T13677] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 296.077513][T13677] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 296.085661][T13677] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 296.093628][T13677] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 296.101617][T13677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 296.109940][T13677] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:43 executing program 0 (fault-call:6 fault-nth:3): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:43 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x3}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001ff) getdents(r1, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r1, 0x82307201, &(0x7f00000001c0)) ioctl$UI_GET_SYSNAME(r3, 0x8040552c, &(0x7f0000000140)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$getflags(r5, 0x40a) fsetxattr(r0, &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f00000002c0)='msdos\x00', 0x6, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$IP_SET_OP_GET_FNAME(r7, 0x1, 0x53, &(0x7f0000000200)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000240)=0x2c) [ 296.275429][T13693] FAULT_INJECTION: forcing a failure. [ 296.275429][T13693] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 296.275592][T13690] FAULT_INJECTION: forcing a failure. [ 296.275592][T13690] name failslab, interval 1, probability 0, space 0, times 0 [ 296.301750][T13693] CPU: 1 PID: 13693 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 296.311926][T13693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.322477][T13693] Call Trace: [ 296.325963][T13693] dump_stack+0x1b0/0x21e [ 296.330335][T13693] ? devkmsg_release+0x11c/0x11c [ 296.335384][T13693] ? show_regs_print_info+0x12/0x12 [ 296.340595][T13693] ? ip_finish_output2+0x936/0x1810 [ 296.345815][T13693] should_fail+0x6fb/0x860 [ 296.350246][T13693] ? setup_fault_attr+0x2b0/0x2b0 [ 296.355531][T13693] __alloc_pages_nodemask+0x1ee/0x7c0 [ 296.360938][T13693] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 296.366604][T13693] ? ip_mc_finish_output+0x3a0/0x3a0 [ 296.371890][T13693] ? udp4_hwcsum+0x26b/0x430 [ 296.376568][T13693] wp_page_copy+0x1a4/0x15a0 [ 296.381333][T13693] ? ip_send_skb+0x11e/0x140 [ 296.386086][T13693] ? add_mm_rss_vec+0x270/0x270 [ 296.390942][T13693] ? vm_normal_page+0x1c9/0x1d0 [ 296.395786][T13693] do_wp_page+0x48d/0x14b0 [ 296.400306][T13693] ? _raw_spin_lock+0xa1/0x170 [ 296.405067][T13693] ? do_swap_page+0x1510/0x1510 [ 296.409917][T13693] handle_mm_fault+0xf6c/0x4140 [ 296.414774][T13693] ? finish_fault+0x230/0x230 [ 296.420058][T13693] ? selinux_socket_sendmsg+0x10b/0x320 [ 296.425605][T13693] ? down_read_trylock+0x17a/0x1d0 [ 296.430820][T13693] do_user_addr_fault+0x48a/0x9f0 [ 296.435844][T13693] page_fault+0x2f/0x40 [ 296.439991][T13693] RIP: 0010:__put_user_4+0x1c/0x30 [ 296.445099][T13693] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ed 01 00 48 8b 9b 58 0b 00 00 48 83 eb 03 48 39 d9 73 3f 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 296.465394][T13693] RSP: 0018:ffff8881d887fa78 EFLAGS: 00010293 [ 296.473993][T13693] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020007ff8 [ 296.481959][T13693] RDX: 0000000020007fc0 RSI: 0000000000000241 RDI: 0000000000000242 [ 296.489941][T13693] RBP: ffff8881d887fee0 R08: ffffffff831f4eff R09: ffffffff835dc46b [ 296.497994][T13693] R10: ffff8881d37fec80 R11: 0000000000000002 R12: 1ffff1103b10ff74 [ 296.506580][T13693] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000040000 [ 296.514774][T13693] ? udp_sendmsg+0x75b/0x2e80 [ 296.519627][T13693] ? __sys_sendmmsg+0x46f/0x680 [ 296.524567][T13693] __sys_sendmmsg+0x48e/0x680 [ 296.529241][T13693] ? __ia32_sys_sendmsg+0x90/0x90 [ 296.534274][T13693] ? __rcu_read_lock+0x50/0x50 [ 296.539029][T13693] ? __kasan_slab_free+0x1e2/0x220 [ 296.544130][T13693] ? __kasan_slab_free+0x168/0x220 [ 296.549668][T13693] ? slab_free_freelist_hook+0xd0/0x150 [ 296.555203][T13693] ? kmem_cache_free+0xac/0x5c0 [ 296.560045][T13693] ? do_sys_open+0x4a3/0x620 [ 296.564630][T13693] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 296.570685][T13693] ? do_sys_open+0x2fc/0x620 [ 296.575461][T13693] ? proc_fail_nth_write+0x166/0x200 [ 296.580928][T13693] ? proc_fail_nth_read+0x1c0/0x1c0 [ 296.586242][T13693] ? ip4_datagram_release_cb+0x864/0xde0 [ 296.591883][T13693] ? proc_fail_nth_read+0x1c0/0x1c0 [ 296.597268][T13693] ? memset+0x1f/0x40 [ 296.601249][T13693] ? fsnotify+0x13a0/0x1460 [ 296.605753][T13693] ? __kernel_write+0x340/0x340 [ 296.610602][T13693] ? fsnotify+0x13a0/0x1460 [ 296.616004][T13693] ? security_file_permission+0x128/0x300 [ 296.622343][T13693] ? __sb_end_write+0xa4/0xf0 [ 296.627027][T13693] ? vfs_write+0x427/0x4f0 [ 296.631551][T13693] ? ksys_write+0x237/0x2a0 [ 296.636071][T13693] ? __ia32_sys_read+0x80/0x80 [ 296.640857][T13693] __x64_sys_sendmmsg+0x9c/0xb0 [ 296.646314][T13693] do_syscall_64+0xcb/0x150 [ 296.650811][T13693] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 296.656731][T13693] RIP: 0033:0x45de59 [ 296.660721][T13693] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.680431][T13693] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 296.688858][T13693] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 296.696835][T13693] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 296.705011][T13693] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 296.712991][T13693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 13:13:43 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x2000, 0x0) r3 = syz_open_procfs(0x0, 0x0) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000002c0)='NLBL_MGMT\x00') r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_TRAP_GET(r6, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x0, 0x600, 0x70bd26, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x2090}, 0x4040040) sendmsg$NLBL_MGMT_C_ADDDEF(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x78, r4, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={[], [], @multicast2}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @local}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private2={0xfc, 0x2, [], 0x1}}]}, 0x78}, 0x1, 0x0, 0x0, 0x20008040}, 0x8000) sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r4, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r7 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r7, 0x82307201, &(0x7f00000001c0)) [ 296.721146][T13693] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 296.730117][T13690] CPU: 0 PID: 13690 Comm: syz-executor.1 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 296.740313][T13690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.750641][T13690] Call Trace: [ 296.753941][T13690] dump_stack+0x1b0/0x21e [ 296.758256][T13690] ? devkmsg_release+0x11c/0x11c [ 296.763388][T13690] ? show_regs_print_info+0x12/0x12 [ 296.768584][T13690] ? __kernel_write+0x340/0x340 [ 296.773427][T13690] ? fsnotify+0x13a0/0x1460 [ 296.777924][T13690] should_fail+0x6fb/0x860 [ 296.782334][T13690] ? setup_fault_attr+0x2b0/0x2b0 [ 296.787378][T13690] ? setup_fault_attr+0x2b0/0x2b0 [ 296.792416][T13690] ? security_file_permission+0x128/0x300 [ 296.798170][T13690] ? copy_mount_options+0x59/0x320 [ 296.803280][T13690] should_failslab+0x5/0x20 [ 296.807787][T13690] kmem_cache_alloc_trace+0x39/0x270 [ 296.813078][T13690] copy_mount_options+0x59/0x320 [ 296.818025][T13690] ? ksys_mount+0x8f/0xf0 [ 296.822355][T13690] ksys_mount+0x97/0xf0 [ 296.826508][T13690] __x64_sys_mount+0xb1/0xc0 [ 296.831090][T13690] do_syscall_64+0xcb/0x150 [ 296.835613][T13690] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 296.841499][T13690] RIP: 0033:0x45de59 [ 296.845385][T13690] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.864993][T13690] RSP: 002b:00007f59655f7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 296.873399][T13690] RAX: ffffffffffffffda RBX: 0000000000021a00 RCX: 000000000045de59 [ 296.881365][T13690] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000400000 [ 296.889332][T13690] RBP: 00007f59655f7ca0 R08: 0000000020000100 R09: 0000000000000000 [ 296.897298][T13690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 296.905269][T13690] R13: 00007fff5c787dcf R14: 00007f59655f89c0 R15: 000000000118bfd4 13:13:43 executing program 0 (fault-call:6 fault-nth:4): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:43 executing program 1 (fault-call:3 fault-nth:3): syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 296.931561][T13682] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 296.946916][T13682] EXT4-fs (loop2): group descriptors corrupted! 13:13:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x3fe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x1100, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 297.073859][T13706] FAT-fs (loop3): invalid media value (0x02) [ 297.080116][T13706] FAT-fs (loop3): Can't find a valid FAT filesystem [ 297.117588][T13719] FAULT_INJECTION: forcing a failure. [ 297.117588][T13719] name failslab, interval 1, probability 0, space 0, times 0 [ 297.161640][T13719] CPU: 0 PID: 13719 Comm: syz-executor.1 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 297.171833][T13719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.181883][T13719] Call Trace: [ 297.185195][T13719] dump_stack+0x1b0/0x21e [ 297.189688][T13719] ? devkmsg_release+0x11c/0x11c [ 297.194643][T13719] ? handle_mm_fault+0x138a/0x4140 [ 297.199782][T13719] ? show_regs_print_info+0x12/0x12 [ 297.204975][T13719] should_fail+0x6fb/0x860 [ 297.209405][T13719] ? setup_fault_attr+0x2b0/0x2b0 [ 297.214431][T13719] ? getname_flags+0xb8/0x610 [ 297.219094][T13719] should_failslab+0x5/0x20 [ 297.223581][T13719] kmem_cache_alloc+0x36/0x250 [ 297.228346][T13719] getname_flags+0xb8/0x610 [ 297.232834][T13719] user_path_at_empty+0x28/0x50 [ 297.237674][T13719] do_mount+0x147/0x2630 [ 297.241912][T13719] ? copy_mount_string+0x30/0x30 [ 297.246838][T13719] ? page_fault+0x2f/0x40 [ 297.251175][T13719] ? copy_mount_options+0x1f8/0x320 [ 297.256364][T13719] ? copy_mount_options+0x230/0x320 [ 297.261553][T13719] ? copy_mount_options+0x1e8/0x320 [ 297.266756][T13719] ? copy_mount_options+0x293/0x320 [ 297.271954][T13719] ksys_mount+0xc2/0xf0 [ 297.276139][T13719] __x64_sys_mount+0xb1/0xc0 [ 297.280728][T13719] do_syscall_64+0xcb/0x150 [ 297.285227][T13719] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 297.291116][T13719] RIP: 0033:0x45de59 [ 297.295019][T13719] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.314615][T13719] RSP: 002b:00007f59655f7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 297.323034][T13719] RAX: ffffffffffffffda RBX: 0000000000021a00 RCX: 000000000045de59 [ 297.331001][T13719] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000400000 [ 297.338972][T13719] RBP: 00007f59655f7ca0 R08: 0000000020000100 R09: 0000000000000000 [ 297.346944][T13719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 297.354916][T13719] R13: 00007fff5c787dcf R14: 00007f59655f89c0 R15: 000000000118bfd4 13:13:44 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000000400)="0400050900000000666174000404090a0200027400f8019fc52de7810bcef1bedabd0e823ae4884b796eafb2adc01cde621b18a3de6fdb5eb5677cceb2844234266f5e12a438a5b43ed6e2ee0ddf002fe0389c26a42f815428785a6bb268b190052f78653bf9b713e1881b901f5f03a08ac8fca135fe8758d127f29ced796719209cc6819d51cdb36269c71ce53edcc1257ccdfcafefd4f42028b80d3b63679df995e7051b388b09e52c102da47cb0ec97110951fc6cbe6691879a0c85a9367e0578f63cb6aeff", 0xc7, 0x7d5}], 0x0, &(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYBLOB="2861456c52d5b296b5b9b1d93de56337d37223c084c99e0b16cb34b23128b2c3", @ANYRESOCT, @ANYRESHEX=0x0, @ANYRES32=0x0]) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) eventfd2(0x3ff, 0x80001) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0x82307201, &(0x7f00000001c0)) 13:13:44 executing program 1 (fault-call:3 fault-nth:4): syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 297.372968][T13725] FAULT_INJECTION: forcing a failure. [ 297.372968][T13725] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 297.412781][T13725] CPU: 0 PID: 13725 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 297.423166][T13725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.433214][T13725] Call Trace: [ 297.436522][T13725] dump_stack+0x1b0/0x21e [ 297.440860][T13725] ? devkmsg_release+0x11c/0x11c [ 297.446327][T13725] ? show_regs_print_info+0x12/0x12 [ 297.451522][T13725] ? ip_finish_output2+0x936/0x1810 [ 297.456707][T13725] should_fail+0x6fb/0x860 [ 297.461256][T13725] ? setup_fault_attr+0x2b0/0x2b0 [ 297.466383][T13725] __alloc_pages_nodemask+0x1ee/0x7c0 [ 297.471787][T13725] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 297.477464][T13725] ? ip_mc_finish_output+0x3a0/0x3a0 [ 297.482742][T13725] ? udp4_hwcsum+0x26b/0x430 [ 297.487716][T13725] wp_page_copy+0x1a4/0x15a0 [ 297.492347][T13725] ? ip_send_skb+0x11e/0x140 [ 297.496915][T13725] ? add_mm_rss_vec+0x270/0x270 [ 297.501753][T13725] ? vm_normal_page+0x1c9/0x1d0 [ 297.506594][T13725] do_wp_page+0x48d/0x14b0 [ 297.511097][T13725] ? _raw_spin_lock+0xa1/0x170 [ 297.515870][T13725] ? do_swap_page+0x1510/0x1510 [ 297.520709][T13725] handle_mm_fault+0xf6c/0x4140 [ 297.525564][T13725] ? finish_fault+0x230/0x230 [ 297.530236][T13725] ? selinux_socket_sendmsg+0x10b/0x320 [ 297.535793][T13725] ? down_read_trylock+0x17a/0x1d0 [ 297.540900][T13725] do_user_addr_fault+0x48a/0x9f0 [ 297.545908][T13725] page_fault+0x2f/0x40 [ 297.550082][T13725] RIP: 0010:__put_user_4+0x1c/0x30 [ 297.555188][T13725] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ed 01 00 48 8b 9b 58 0b 00 00 48 83 eb 03 48 39 d9 73 3f 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 297.574791][T13725] RSP: 0018:ffff88819801fa78 EFLAGS: 00010293 [ 297.580848][T13725] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020007ff8 [ 297.588811][T13725] RDX: 0000000020007fc0 RSI: 000000000000027e RDI: 000000000000027f [ 297.596786][T13725] RBP: ffff88819801fee0 R08: ffffffff831f4eff R09: ffffffff835dc46b [ 297.604754][T13725] R10: ffff8881c9481f00 R11: 0000000000000002 R12: 1ffff11033003f74 [ 297.612715][T13725] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000040000 [ 297.620765][T13725] ? udp_sendmsg+0x75b/0x2e80 [ 297.625425][T13725] ? __sys_sendmmsg+0x46f/0x680 [ 297.630281][T13725] __sys_sendmmsg+0x48e/0x680 [ 297.635010][T13725] ? __ia32_sys_sendmsg+0x90/0x90 [ 297.640041][T13725] ? __rcu_read_lock+0x50/0x50 [ 297.644856][T13725] ? __kasan_slab_free+0x1e2/0x220 [ 297.649973][T13725] ? __kasan_slab_free+0x168/0x220 [ 297.655063][T13725] ? slab_free_freelist_hook+0xd0/0x150 [ 297.660590][T13725] ? kmem_cache_free+0xac/0x5c0 [ 297.665595][T13725] ? do_sys_open+0x4a3/0x620 [ 297.670182][T13725] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 297.676230][T13725] ? do_sys_open+0x2fc/0x620 [ 297.680835][T13725] ? proc_fail_nth_write+0x166/0x200 [ 297.686100][T13725] ? proc_fail_nth_read+0x1c0/0x1c0 [ 297.691301][T13725] ? ip4_datagram_release_cb+0x864/0xde0 [ 297.696940][T13725] ? proc_fail_nth_read+0x1c0/0x1c0 [ 297.702142][T13725] ? memset+0x1f/0x40 [ 297.706116][T13725] ? fsnotify+0x13a0/0x1460 [ 297.710601][T13725] ? __kernel_write+0x340/0x340 [ 297.715445][T13725] ? fsnotify+0x13a0/0x1460 [ 297.719930][T13725] ? security_file_permission+0x128/0x300 [ 297.725728][T13725] ? __sb_end_write+0xa4/0xf0 [ 297.730415][T13725] ? vfs_write+0x427/0x4f0 [ 297.734853][T13725] ? ksys_write+0x237/0x2a0 [ 297.739357][T13725] ? __ia32_sys_read+0x80/0x80 [ 297.744113][T13725] __x64_sys_sendmmsg+0x9c/0xb0 [ 297.748952][T13725] do_syscall_64+0xcb/0x150 [ 297.753472][T13725] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 297.759353][T13725] RIP: 0033:0x45de59 [ 297.763266][T13725] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.782853][T13725] RSP: 002b:00007f1ca0cfac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 297.791276][T13725] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 297.799264][T13725] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 297.807228][T13725] RBP: 00007f1ca0cfaca0 R08: 0000000000000000 R09: 0000000000000000 [ 297.815191][T13725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 13:13:44 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x1200, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:44 executing program 0 (fault-call:6 fault-nth:5): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 297.823291][T13725] R13: 00007ffed48b412f R14: 00007f1ca0cfb9c0 R15: 000000000118bfd4 [ 297.851121][T13724] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 297.861124][T13724] EXT4-fs (loop2): group descriptors corrupted! 13:13:44 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000240)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}, {0x306, @multicast}, 0x48, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 'ip_vti0\x00'}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) link(&(0x7f0000000140)='./file1\x00', &(0x7f0000000200)='./file1\x00') getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)={0xfffffffffffffffb, 0x9}) [ 297.883006][T13728] FAT-fs (loop5): Unrecognized mount option "18446744073709551615(aElRÕ²–µ¹±Ù=åc7Ór#À„Éž Ë4²1(²Ã017777777777777777777770x0000000000000000" or missing value [ 297.917626][T13737] FAULT_INJECTION: forcing a failure. [ 297.917626][T13737] name failslab, interval 1, probability 0, space 0, times 0 [ 297.930435][T13737] CPU: 0 PID: 13737 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 297.940572][T13737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.950629][T13737] Call Trace: [ 297.953915][T13737] dump_stack+0x1b0/0x21e [ 297.958224][T13737] ? devkmsg_release+0x11c/0x11c [ 297.963146][T13737] ? show_regs_print_info+0x12/0x12 [ 297.968427][T13737] should_fail+0x6fb/0x860 [ 297.972825][T13737] ? setup_fault_attr+0x2b0/0x2b0 [ 297.977835][T13737] ? alloc_skb_with_frags+0xb1/0x580 [ 297.983230][T13737] should_failslab+0x5/0x20 [ 297.987720][T13737] __kmalloc_track_caller+0x5d/0x2b0 [ 297.993092][T13737] ? kmem_cache_alloc+0x1d5/0x250 [ 297.998544][T13737] ? netif_rx+0x157/0x2b0 [ 298.002854][T13737] ? alloc_skb_with_frags+0xb1/0x580 [ 298.008151][T13737] __alloc_skb+0xd1/0x4d0 [ 298.012481][T13737] alloc_skb_with_frags+0xb1/0x580 [ 298.017576][T13737] ? __rmqueue_cma+0x570/0x570 [ 298.022340][T13737] sock_alloc_send_pskb+0x87e/0xcc0 [ 298.027524][T13737] ? sock_kzfree_s+0x50/0x50 [ 298.032147][T13737] __ip_append_data+0x1fbd/0x31b0 [ 298.037156][T13737] ? __memcg_kmem_charge_memcg+0x130/0x130 [ 298.042961][T13737] ? ip_do_fragment+0x2290/0x2290 [ 298.047972][T13737] ? ip_setup_cork+0x810/0x810 [ 298.052803][T13737] ? ipv4_mtu+0x212/0x2c0 [ 298.057113][T13737] ? ip_setup_cork+0x46b/0x810 [ 298.061871][T13737] ip_make_skb+0x1c9/0x4d0 [ 298.066277][T13737] ? ip_do_fragment+0x2290/0x2290 [ 298.071281][T13737] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 298.076893][T13737] ? __sk_dst_check+0x1b0/0x1b0 [ 298.081732][T13737] udp_sendmsg+0x1d1b/0x2e80 [ 298.086320][T13737] ? ip_do_fragment+0x2290/0x2290 [ 298.091321][T13737] ? udp_cmsg_send+0x340/0x340 [ 298.096080][T13737] ? __up_read+0x6f/0x1b0 [ 298.100417][T13737] ? __down_read+0x210/0x210 [ 298.105011][T13737] ? selinux_socket_sendmsg+0x10b/0x320 [ 298.110534][T13737] ? selinux_socket_accept+0x580/0x580 [ 298.115988][T13737] ? rw_copy_check_uvector+0x6b/0x310 [ 298.121357][T13737] ? inet_send_prepare+0x1b7/0x470 [ 298.126543][T13737] ? inet_send_prepare+0x470/0x470 [ 298.131634][T13737] ____sys_sendmsg+0x56f/0x860 [ 298.136397][T13737] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 298.141574][T13737] ? udp_sendmsg+0x75b/0x2e80 [ 298.146256][T13737] ? __sys_sendmmsg+0x46f/0x680 [ 298.151088][T13737] __sys_sendmmsg+0x338/0x680 [ 298.155749][T13737] ? __ia32_sys_sendmsg+0x90/0x90 [ 298.160758][T13737] ? __rcu_read_lock+0x50/0x50 [ 298.165604][T13737] ? __kasan_slab_free+0x1e2/0x220 [ 298.170691][T13737] ? __kasan_slab_free+0x168/0x220 [ 298.175807][T13737] ? slab_free_freelist_hook+0xd0/0x150 [ 298.181432][T13737] ? kmem_cache_free+0xac/0x5c0 [ 298.186289][T13737] ? do_sys_open+0x4a3/0x620 [ 298.190880][T13737] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 298.196958][T13737] ? do_sys_open+0x2fc/0x620 [ 298.201552][T13737] ? proc_fail_nth_write+0x166/0x200 [ 298.206830][T13737] ? proc_fail_nth_read+0x1c0/0x1c0 [ 298.212025][T13737] ? ip4_datagram_release_cb+0x864/0xde0 [ 298.217653][T13737] ? proc_fail_nth_read+0x1c0/0x1c0 [ 298.222850][T13737] ? memset+0x1f/0x40 [ 298.226827][T13737] ? fsnotify+0x13a0/0x1460 [ 298.231310][T13737] ? __kernel_write+0x340/0x340 [ 298.236176][T13737] ? fsnotify+0x13a0/0x1460 [ 298.240671][T13737] ? security_file_permission+0x128/0x300 [ 298.246372][T13737] ? __sb_end_write+0xa4/0xf0 [ 298.251027][T13737] ? vfs_write+0x427/0x4f0 [ 298.255422][T13737] ? ksys_write+0x237/0x2a0 [ 298.259912][T13737] ? __ia32_sys_read+0x80/0x80 [ 298.264662][T13737] __x64_sys_sendmmsg+0x9c/0xb0 [ 298.269492][T13737] do_syscall_64+0xcb/0x150 [ 298.274236][T13737] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 298.280257][T13737] RIP: 0033:0x45de59 [ 298.284168][T13737] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.303930][T13737] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 298.312368][T13737] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 298.320528][T13737] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 298.328499][T13737] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 298.336450][T13737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 298.344409][T13737] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:45 executing program 0 (fault-call:6 fault-nth:6): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x402, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 298.521611][T13728] FAT-fs (loop5): Unrecognized mount option "18446744073709551615(aElRÕ²–µ¹±Ù=åc7Ór#À„Éž Ë4²1(²Ã017777777777777777777770x0000000000000000" or missing value [ 298.539837][T13753] FAULT_INJECTION: forcing a failure. [ 298.539837][T13753] name failslab, interval 1, probability 0, space 0, times 0 [ 298.552473][T13753] CPU: 1 PID: 13753 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 298.562615][T13753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.572656][T13753] Call Trace: [ 298.575932][T13753] dump_stack+0x1b0/0x21e [ 298.580255][T13753] ? devkmsg_release+0x11c/0x11c [ 298.585168][T13753] ? show_regs_print_info+0x12/0x12 [ 298.590354][T13753] should_fail+0x6fb/0x860 [ 298.594750][T13753] ? setup_fault_attr+0x2b0/0x2b0 [ 298.600365][T13753] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 298.605718][T13753] ? skb_clone+0x1b2/0x370 [ 298.610116][T13753] should_failslab+0x5/0x20 [ 298.614884][T13753] kmem_cache_alloc+0x36/0x250 [ 298.619651][T13753] skb_clone+0x1b2/0x370 [ 298.623910][T13753] dev_queue_xmit_nit+0x279/0x9e0 [ 298.628916][T13753] xmit_one+0x7b/0x460 [ 298.632968][T13753] __dev_queue_xmit+0x1858/0x25d0 [ 298.637987][T13753] ? dev_queue_xmit+0x20/0x20 [ 298.642645][T13753] ? ip_finish_output2+0x936/0x1810 [ 298.647829][T13753] ip_finish_output2+0xbdf/0x1810 [ 298.652834][T13753] ? ip_fragment+0x210/0x210 [ 298.657401][T13753] ? __ip_finish_output+0x4e1/0x6d0 [ 298.663185][T13753] ip_output+0x318/0x400 [ 298.667415][T13753] ? ip_finish_output+0x1d0/0x1d0 [ 298.672478][T13753] ? ip_mc_finish_output+0x3a0/0x3a0 [ 298.677928][T13753] ? udp4_hwcsum+0x26b/0x430 [ 298.682511][T13753] ip_send_skb+0xaa/0x140 [ 298.686819][T13753] udp_send_skb+0x8e9/0x1100 [ 298.691397][T13753] udp_sendmsg+0x1d45/0x2e80 [ 298.695979][T13753] ? ip_do_fragment+0x2290/0x2290 [ 298.700991][T13753] ? udp_cmsg_send+0x340/0x340 [ 298.705731][T13753] ? __up_read+0x6f/0x1b0 [ 298.710040][T13753] ? __down_read+0x210/0x210 [ 298.714619][T13753] ? selinux_socket_sendmsg+0x10b/0x320 [ 298.720144][T13753] ? selinux_socket_accept+0x580/0x580 [ 298.725585][T13753] ? rw_copy_check_uvector+0x6b/0x310 [ 298.730949][T13753] ? inet_send_prepare+0x1b7/0x470 [ 298.736094][T13753] ? inet_send_prepare+0x470/0x470 [ 298.741208][T13753] ____sys_sendmsg+0x56f/0x860 [ 298.745969][T13753] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 298.751154][T13753] ? udp_sendmsg+0x75b/0x2e80 [ 298.755928][T13753] ? __sys_sendmmsg+0x46f/0x680 [ 298.761049][T13753] __sys_sendmmsg+0x338/0x680 [ 298.765728][T13753] ? __ia32_sys_sendmsg+0x90/0x90 [ 298.770744][T13753] ? __rcu_read_lock+0x50/0x50 [ 298.775495][T13753] ? __kasan_slab_free+0x1e2/0x220 [ 298.780577][T13753] ? __kasan_slab_free+0x168/0x220 [ 298.785685][T13753] ? slab_free_freelist_hook+0xd0/0x150 [ 298.791209][T13753] ? kmem_cache_free+0xac/0x5c0 [ 298.796032][T13753] ? do_sys_open+0x4a3/0x620 [ 298.800669][T13753] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 298.806837][T13753] ? do_sys_open+0x2fc/0x620 [ 298.811441][T13753] ? proc_fail_nth_write+0x166/0x200 [ 298.816832][T13753] ? proc_fail_nth_read+0x1c0/0x1c0 [ 298.822052][T13753] ? ip4_datagram_release_cb+0x864/0xde0 [ 298.827687][T13753] ? proc_fail_nth_read+0x1c0/0x1c0 [ 298.832890][T13753] ? memset+0x1f/0x40 [ 298.836854][T13753] ? fsnotify+0x13a0/0x1460 [ 298.841360][T13753] ? __kernel_write+0x340/0x340 [ 298.846197][T13753] ? fsnotify+0x13a0/0x1460 [ 298.850720][T13753] ? security_file_permission+0x128/0x300 [ 298.856419][T13753] ? __sb_end_write+0xa4/0xf0 [ 298.861089][T13753] ? vfs_write+0x427/0x4f0 [ 298.865477][T13753] ? ksys_write+0x237/0x2a0 [ 298.869953][T13753] ? __ia32_sys_read+0x80/0x80 [ 298.874691][T13753] __x64_sys_sendmmsg+0x9c/0xb0 [ 298.879529][T13753] do_syscall_64+0xcb/0x150 [ 298.884028][T13753] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 298.889907][T13753] RIP: 0033:0x45de59 [ 298.893799][T13753] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.913584][T13753] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 298.921979][T13753] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 298.929952][T13753] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 298.937907][T13753] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 298.945876][T13753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 298.954352][T13753] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 298.979376][T13757] FAULT_INJECTION: forcing a failure. [ 298.979376][T13757] name failslab, interval 1, probability 0, space 0, times 0 [ 298.992332][T13757] CPU: 0 PID: 13757 Comm: syz-executor.1 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 299.002486][T13757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.012640][T13757] Call Trace: [ 299.015951][T13757] dump_stack+0x1b0/0x21e [ 299.020568][T13757] ? devkmsg_release+0x11c/0x11c [ 299.025596][T13757] ? avc_has_perm+0x15f/0x260 [ 299.030279][T13757] ? show_regs_print_info+0x12/0x12 [ 299.035453][T13757] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 299.040840][T13757] ? filename_lookup+0x4e6/0x6c0 [ 299.045769][T13757] should_fail+0x6fb/0x860 [ 299.050161][T13757] ? setup_fault_attr+0x2b0/0x2b0 [ 299.055159][T13757] ? selinux_mount+0x3e6/0x550 [ 299.059921][T13757] ? alloc_fs_context+0x61/0x650 [ 299.064837][T13757] should_failslab+0x5/0x20 [ 299.069366][T13757] kmem_cache_alloc_trace+0x39/0x270 [ 299.074887][T13757] alloc_fs_context+0x61/0x650 [ 299.079660][T13757] ? _raw_read_unlock+0xe/0x30 [ 299.084403][T13757] ? get_fs_type+0x410/0x490 [ 299.088975][T13757] do_mount+0x12a4/0x2630 [ 299.093307][T13757] ? copy_mount_string+0x30/0x30 [ 299.098226][T13757] ? page_fault+0x2f/0x40 [ 299.102565][T13757] ? copy_mount_options+0x1e8/0x320 [ 299.107860][T13757] ? copy_mount_options+0x293/0x320 [ 299.113099][T13757] ksys_mount+0xc2/0xf0 [ 299.117258][T13757] __x64_sys_mount+0xb1/0xc0 [ 299.121853][T13757] do_syscall_64+0xcb/0x150 [ 299.126343][T13757] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 299.132220][T13757] RIP: 0033:0x45de59 [ 299.136148][T13757] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.155732][T13757] RSP: 002b:00007f59655f7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 299.164129][T13757] RAX: ffffffffffffffda RBX: 0000000000021a00 RCX: 000000000045de59 [ 299.172079][T13757] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000400000 13:13:46 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, 0x0, 0xb, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFTA_COMPAT_NAME={0xc, 0x1, '\'%/#\'/}\x00'}, @NFTA_COMPAT_NAME={0x7, 0x1, '.[\x00'}, @NFTA_COMPAT_TYPE={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x200040c1}, 0x8000) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) mkdir(&(0x7f0000000100)='./file1/file0\x00', 0x4) ioctl$FITRIM(r3, 0x82307201, &(0x7f00000001c0)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) move_mount(r0, &(0x7f0000000300)='./file1\x00', r5, &(0x7f0000000340)='./file1/file1\x00', 0x40) syz_open_dev$hiddev(&(0x7f00000002c0)='/dev/usb/hiddev#\x00', 0x7, 0x229a00) r6 = accept$unix(r5, &(0x7f0000000400)=@abs, &(0x7f0000000380)=0x6e) fgetxattr(r6, &(0x7f0000000480)=@random={'user.', '/dev/usb/hiddev#\x00'}, &(0x7f00000004c0)=""/72, 0x48) [ 299.180037][T13757] RBP: 00007f59655f7ca0 R08: 0000000020000100 R09: 0000000000000000 [ 299.187991][T13757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 299.195958][T13757] R13: 00007fff5c787dcf R14: 00007f59655f89c0 R15: 000000000118bfd4 13:13:46 executing program 0 (fault-call:6 fault-nth:7): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:46 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x7ff, 0x501820) syz_open_dev$binderN(&(0x7f0000000300)='/dev/binder#\x00', 0x0, 0x800) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x220050d0}, 0xc0) bind(0xffffffffffffffff, &(0x7f00000001c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18fa8ff89740001c2f9fa0b3836005404b0e0301a4ce875f2e31760163ee34004000000000000000000010101013c5811039e1577501eecce66fd6e2bbf0e5bf5ff1b0816f3f6db1c0001000000000000003a09ffc2c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="c70800002a00fb490ddcff5489814856af999f5b", @ANYRES32=r4], 0x2}}, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f00000001c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18fa8ff89740001c2f9fa0b3836005404b0e0301a4ce875f2e31760163ee34004000000000000000000010101013c5811039e1577501eecce66fd6e2bbf0e5bf5ff1b0816f3f6db1c0001000000000000003a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="c70800002a00fb490ddcff5489814856af999f5b", @ANYRES32=r6], 0x2}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000480)={'syztnl1\x00', &(0x7f0000000400)={'syztnl1\x00', 0x0, 0x29, 0x4, 0x4, 0x7, 0x2, @dev={0xfe, 0x80, [], 0x1e}, @private1={0xfc, 0x1, [], 0x1}, 0x80, 0x7, 0x80000000, 0x1}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000680)={&(0x7f00000004c0)={0x17c, 0x0, 0x10, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x4}, 0x4040) [ 299.272966][T13749] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 299.297793][T13749] EXT4-fs (loop2): group descriptors corrupted! [ 299.307624][T13765] FAULT_INJECTION: forcing a failure. [ 299.307624][T13765] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 299.321765][T13765] CPU: 1 PID: 13765 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 299.331930][T13765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.341996][T13765] Call Trace: [ 299.345287][T13765] dump_stack+0x1b0/0x21e [ 299.349822][T13765] ? devkmsg_release+0x11c/0x11c [ 299.354784][T13765] ? show_regs_print_info+0x12/0x12 [ 299.360049][T13765] ? ip_finish_output2+0x936/0x1810 [ 299.365263][T13765] should_fail+0x6fb/0x860 [ 299.369657][T13765] ? setup_fault_attr+0x2b0/0x2b0 [ 299.374658][T13765] __alloc_pages_nodemask+0x1ee/0x7c0 [ 299.380007][T13765] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 299.385584][T13765] ? ip_mc_finish_output+0x3a0/0x3a0 [ 299.390852][T13765] ? udp4_hwcsum+0x26b/0x430 [ 299.395422][T13765] wp_page_copy+0x1a4/0x15a0 [ 299.399989][T13765] ? ip_send_skb+0x11e/0x140 [ 299.404696][T13765] ? add_mm_rss_vec+0x270/0x270 [ 299.409553][T13765] ? vm_normal_page+0x1c9/0x1d0 [ 299.414379][T13765] do_wp_page+0x48d/0x14b0 [ 299.418774][T13765] ? _raw_spin_lock+0xa1/0x170 [ 299.423516][T13765] ? do_swap_page+0x1510/0x1510 [ 299.428343][T13765] handle_mm_fault+0xf6c/0x4140 [ 299.433363][T13765] ? finish_fault+0x230/0x230 [ 299.438033][T13765] ? selinux_socket_sendmsg+0x10b/0x320 [ 299.443569][T13765] ? down_read_trylock+0x17a/0x1d0 [ 299.448662][T13765] do_user_addr_fault+0x48a/0x9f0 [ 299.453667][T13765] page_fault+0x2f/0x40 [ 299.457807][T13765] RIP: 0010:__put_user_4+0x1c/0x30 [ 299.462917][T13765] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ed 01 00 48 8b 9b 58 0b 00 00 48 83 eb 03 48 39 d9 73 3f 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 299.482515][T13765] RSP: 0018:ffff8881cfa67a78 EFLAGS: 00010293 [ 299.488575][T13765] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020008038 [ 299.496524][T13765] RDX: 0000000020008000 RSI: 00000000000004ae RDI: 00000000000004af [ 299.505270][T13765] RBP: ffff8881cfa67ee0 R08: ffffffff831f4eff R09: ffffffff835dc46b [ 299.513377][T13765] R10: ffff8881d054ec80 R11: 0000000000000002 R12: 1ffff11039f4cf74 [ 299.521327][T13765] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000040000 [ 299.529291][T13765] ? udp_sendmsg+0x75b/0x2e80 [ 299.534400][T13765] ? __sys_sendmmsg+0x46f/0x680 [ 299.539233][T13765] __sys_sendmmsg+0x48e/0x680 [ 299.544055][T13765] ? __ia32_sys_sendmsg+0x90/0x90 [ 299.549101][T13765] ? __rcu_read_lock+0x50/0x50 [ 299.553946][T13765] ? __kasan_slab_free+0x1e2/0x220 [ 299.559058][T13765] ? __kasan_slab_free+0x168/0x220 [ 299.564159][T13765] ? slab_free_freelist_hook+0xd0/0x150 [ 299.569721][T13765] ? kmem_cache_free+0xac/0x5c0 [ 299.574574][T13765] ? do_sys_open+0x4a3/0x620 [ 299.579148][T13765] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 299.585545][T13765] ? do_sys_open+0x2fc/0x620 [ 299.590479][T13765] ? proc_fail_nth_write+0x166/0x200 [ 299.595748][T13765] ? proc_fail_nth_read+0x1c0/0x1c0 [ 299.600948][T13765] ? ip4_datagram_release_cb+0x864/0xde0 [ 299.606927][T13765] ? proc_fail_nth_read+0x1c0/0x1c0 [ 299.612097][T13765] ? memset+0x1f/0x40 [ 299.616052][T13765] ? fsnotify+0x13a0/0x1460 [ 299.620532][T13765] ? __kernel_write+0x340/0x340 [ 299.625530][T13765] ? fsnotify+0x13a0/0x1460 [ 299.630098][T13765] ? security_file_permission+0x128/0x300 [ 299.635791][T13765] ? __sb_end_write+0xa4/0xf0 [ 299.641572][T13765] ? vfs_write+0x427/0x4f0 [ 299.645962][T13765] ? ksys_write+0x237/0x2a0 [ 299.651740][T13765] ? __ia32_sys_read+0x80/0x80 [ 299.656477][T13765] __x64_sys_sendmmsg+0x9c/0xb0 [ 299.661315][T13765] do_syscall_64+0xcb/0x150 [ 299.665805][T13765] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 299.671683][T13765] RIP: 0033:0x45de59 [ 299.675561][T13765] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.698887][T13765] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 299.707273][T13765] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 299.715740][T13765] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 299.723755][T13765] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 299.731980][T13765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 299.739960][T13765] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:46 executing program 1 (fault-call:3 fault-nth:5): syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:13:46 executing program 0 (fault-call:6 fault-nth:8): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:46 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x1300, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x403, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 300.015078][T13771] FAULT_INJECTION: forcing a failure. [ 300.015078][T13771] name failslab, interval 1, probability 0, space 0, times 0 [ 300.027912][T13771] CPU: 1 PID: 13771 Comm: syz-executor.1 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 300.038050][T13771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.048265][T13771] Call Trace: [ 300.051543][T13771] dump_stack+0x1b0/0x21e [ 300.055862][T13771] ? devkmsg_release+0x11c/0x11c [ 300.060792][T13771] ? show_regs_print_info+0x12/0x12 [ 300.065981][T13771] ? avc_has_perm+0x15f/0x260 [ 300.070655][T13771] should_fail+0x6fb/0x860 [ 300.075046][T13771] ? setup_fault_attr+0x2b0/0x2b0 [ 300.080052][T13771] ? setup_fault_attr+0x2b0/0x2b0 [ 300.085057][T13771] ? selinux_mount+0x3e6/0x550 [ 300.089793][T13771] ? legacy_init_fs_context+0x4d/0xc0 [ 300.095139][T13771] should_failslab+0x5/0x20 [ 300.099661][T13771] kmem_cache_alloc_trace+0x39/0x270 [ 300.104942][T13771] legacy_init_fs_context+0x4d/0xc0 [ 300.110129][T13771] alloc_fs_context+0x50c/0x650 [ 300.114956][T13771] do_mount+0x12a4/0x2630 [ 300.119364][T13771] ? copy_mount_string+0x30/0x30 [ 300.124285][T13771] ? page_fault+0x2f/0x40 [ 300.128594][T13771] ? copy_mount_options+0x1e8/0x320 [ 300.133771][T13771] ? copy_mount_options+0x293/0x320 [ 300.139044][T13771] ksys_mount+0xc2/0xf0 [ 300.143176][T13771] __x64_sys_mount+0xb1/0xc0 [ 300.147738][T13771] do_syscall_64+0xcb/0x150 [ 300.152217][T13771] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 300.158091][T13771] RIP: 0033:0x45de59 [ 300.161970][T13771] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.181866][T13771] RSP: 002b:00007f59655f7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 300.190273][T13771] RAX: ffffffffffffffda RBX: 0000000000021a00 RCX: 000000000045de59 [ 300.198238][T13771] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000400000 [ 300.206202][T13771] RBP: 00007f59655f7ca0 R08: 0000000020000100 R09: 0000000000000000 13:13:47 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8e0", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_KEEPCAPS(0x8, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000200)='./file1\x00') chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) accept$inet(r1, &(0x7f0000000100)={0x2, 0x0, @empty}, &(0x7f0000000140)=0x10) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) [ 300.214384][T13771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 300.222337][T13771] R13: 00007fff5c787dcf R14: 00007f59655f89c0 R15: 000000000118bfd4 [ 300.277368][T13784] FAULT_INJECTION: forcing a failure. [ 300.277368][T13784] name failslab, interval 1, probability 0, space 0, times 0 [ 300.290462][T13784] CPU: 0 PID: 13784 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 300.300959][T13784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.310998][T13784] Call Trace: [ 300.314293][T13784] dump_stack+0x1b0/0x21e [ 300.318644][T13784] ? devkmsg_release+0x11c/0x11c [ 300.323581][T13784] ? show_regs_print_info+0x12/0x12 [ 300.328772][T13784] should_fail+0x6fb/0x860 [ 300.333175][T13784] ? setup_fault_attr+0x2b0/0x2b0 [ 300.338215][T13784] ? __alloc_skb+0x88/0x4d0 [ 300.342801][T13784] should_failslab+0x5/0x20 [ 300.347305][T13784] kmem_cache_alloc+0x36/0x250 [ 300.352052][T13784] ? netif_rx+0x157/0x2b0 [ 300.356371][T13784] __alloc_skb+0x88/0x4d0 [ 300.360701][T13784] alloc_skb_with_frags+0xb1/0x580 [ 300.365799][T13784] ? __rmqueue_cma+0x570/0x570 [ 300.370822][T13784] sock_alloc_send_pskb+0x87e/0xcc0 [ 300.376004][T13784] ? sock_kzfree_s+0x50/0x50 [ 300.380590][T13784] __ip_append_data+0x1fbd/0x31b0 [ 300.385620][T13784] ? __memcg_kmem_charge_memcg+0x130/0x130 [ 300.391417][T13784] ? ip_do_fragment+0x2290/0x2290 [ 300.396451][T13784] ? ip_setup_cork+0x810/0x810 [ 300.401207][T13784] ? ipv4_mtu+0x212/0x2c0 [ 300.405524][T13784] ? ip_setup_cork+0x46b/0x810 [ 300.410266][T13784] ip_make_skb+0x1c9/0x4d0 [ 300.414675][T13784] ? ip_do_fragment+0x2290/0x2290 [ 300.419680][T13784] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 300.425295][T13784] ? __sk_dst_check+0x1b0/0x1b0 [ 300.430123][T13784] udp_sendmsg+0x1d1b/0x2e80 [ 300.435057][T13784] ? ip_do_fragment+0x2290/0x2290 [ 300.440060][T13784] ? udp_cmsg_send+0x340/0x340 [ 300.444812][T13784] ? selinux_socket_sendmsg+0x10b/0x320 [ 300.450429][T13784] ? selinux_socket_accept+0x580/0x580 [ 300.455888][T13784] ? rw_copy_check_uvector+0x6b/0x310 [ 300.461278][T13784] ? inet_send_prepare+0x1b7/0x470 [ 300.466371][T13784] ? inet_send_prepare+0x470/0x470 [ 300.471483][T13784] ____sys_sendmsg+0x56f/0x860 [ 300.476255][T13784] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 300.481434][T13784] ? udp_sendmsg+0x75b/0x2e80 [ 300.486091][T13784] ? __sys_sendmmsg+0x46f/0x680 [ 300.490942][T13784] __sys_sendmmsg+0x338/0x680 [ 300.496389][T13784] ? __ia32_sys_sendmsg+0x90/0x90 [ 300.501396][T13784] ? __rcu_read_lock+0x50/0x50 [ 300.506142][T13784] ? __kasan_slab_free+0x1e2/0x220 [ 300.511235][T13784] ? __kasan_slab_free+0x168/0x220 [ 300.516337][T13784] ? slab_free_freelist_hook+0xd0/0x150 [ 300.521860][T13784] ? kmem_cache_free+0xac/0x5c0 [ 300.526692][T13784] ? do_sys_open+0x4a3/0x620 [ 300.531262][T13784] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 300.537310][T13784] ? do_sys_open+0x2fc/0x620 [ 300.541899][T13784] ? proc_fail_nth_write+0x166/0x200 [ 300.547165][T13784] ? proc_fail_nth_read+0x1c0/0x1c0 [ 300.552346][T13784] ? ip4_datagram_release_cb+0x864/0xde0 [ 300.557968][T13784] ? proc_fail_nth_read+0x1c0/0x1c0 [ 300.563149][T13784] ? memset+0x1f/0x40 [ 300.567196][T13784] ? fsnotify+0x13a0/0x1460 [ 300.571683][T13784] ? __kernel_write+0x340/0x340 [ 300.576524][T13784] ? fsnotify+0x13a0/0x1460 [ 300.581013][T13784] ? security_file_permission+0x128/0x300 [ 300.586714][T13784] ? __sb_end_write+0xa4/0xf0 [ 300.591384][T13784] ? vfs_write+0x427/0x4f0 [ 300.595782][T13784] ? ksys_write+0x237/0x2a0 [ 300.600262][T13784] ? __ia32_sys_read+0x80/0x80 [ 300.605007][T13784] __x64_sys_sendmmsg+0x9c/0xb0 [ 300.609968][T13784] do_syscall_64+0xcb/0x150 [ 300.614471][T13784] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 300.620341][T13784] RIP: 0033:0x45de59 [ 300.624218][T13784] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.644419][T13784] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 300.652836][T13784] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 300.660802][T13784] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 300.668765][T13784] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 13:13:47 executing program 1 (fault-call:3 fault-nth:6): syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 300.676728][T13784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 300.684679][T13784] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:47 executing program 0 (fault-call:6 fault-nth:9): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:47 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x2000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 300.806037][T13782] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 300.823551][T13782] EXT4-fs (loop2): group descriptors corrupted! [ 300.858697][T13799] FAULT_INJECTION: forcing a failure. [ 300.858697][T13799] name failslab, interval 1, probability 0, space 0, times 0 [ 300.872018][T13799] CPU: 0 PID: 13799 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 300.882163][T13799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.892283][T13799] Call Trace: [ 300.895556][T13799] dump_stack+0x1b0/0x21e [ 300.899882][T13799] ? devkmsg_release+0x11c/0x11c [ 300.904907][T13799] ? show_regs_print_info+0x12/0x12 [ 300.910179][T13799] should_fail+0x6fb/0x860 [ 300.914575][T13799] ? setup_fault_attr+0x2b0/0x2b0 [ 300.919786][T13799] ? alloc_skb_with_frags+0xb1/0x580 [ 300.925047][T13799] should_failslab+0x5/0x20 [ 300.929893][T13799] __kmalloc_track_caller+0x5d/0x2b0 [ 300.935174][T13799] ? kmem_cache_alloc+0x1d5/0x250 [ 300.936534][T13802] FAULT_INJECTION: forcing a failure. [ 300.936534][T13802] name failslab, interval 1, probability 0, space 0, times 0 [ 300.940187][T13799] ? netif_rx+0x157/0x2b0 [ 300.940199][T13799] ? alloc_skb_with_frags+0xb1/0x580 [ 300.940207][T13799] __alloc_skb+0xd1/0x4d0 [ 300.940223][T13799] alloc_skb_with_frags+0xb1/0x580 [ 300.971768][T13799] ? __rmqueue_cma+0x570/0x570 [ 300.976514][T13799] sock_alloc_send_pskb+0x87e/0xcc0 [ 300.981701][T13799] ? find_next_and_bit+0x169/0x1b0 [ 300.986809][T13799] ? sock_kzfree_s+0x50/0x50 [ 300.991385][T13799] ? smp_call_function_many+0x263/0x8b0 [ 300.996926][T13799] ? native_flush_tlb_others+0x2d0/0x2d0 [ 301.002543][T13799] __ip_append_data+0x1fbd/0x31b0 [ 301.007594][T13799] ? native_flush_tlb_others+0x2d0/0x2d0 [ 301.013306][T13799] ? flush_tlb_func_remote+0x60/0x60 [ 301.018574][T13799] ? ip_do_fragment+0x2290/0x2290 [ 301.023580][T13799] ? ip_setup_cork+0x810/0x810 [ 301.028322][T13799] ? ipv4_mtu+0x212/0x2c0 [ 301.032649][T13799] ? ip_setup_cork+0x46b/0x810 [ 301.037397][T13799] ip_make_skb+0x1c9/0x4d0 [ 301.041818][T13799] ? ip_do_fragment+0x2290/0x2290 [ 301.046828][T13799] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 301.052444][T13799] ? __sk_dst_check+0x1b0/0x1b0 [ 301.057633][T13799] udp_sendmsg+0x1d1b/0x2e80 [ 301.062215][T13799] ? ip_do_fragment+0x2290/0x2290 [ 301.067244][T13799] ? udp_cmsg_send+0x340/0x340 [ 301.073036][T13799] ? selinux_socket_sendmsg+0x10b/0x320 [ 301.078586][T13799] ? selinux_socket_accept+0x580/0x580 [ 301.084042][T13799] ? rw_copy_check_uvector+0x6b/0x310 [ 301.089424][T13799] ? inet_send_prepare+0x1b7/0x470 [ 301.094893][T13799] ? inet_send_prepare+0x470/0x470 [ 301.099989][T13799] ____sys_sendmsg+0x56f/0x860 [ 301.104741][T13799] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 301.109949][T13799] ? udp_sendmsg+0x75b/0x2e80 [ 301.114611][T13799] ? __sys_sendmmsg+0x46f/0x680 [ 301.119448][T13799] __sys_sendmmsg+0x338/0x680 [ 301.124111][T13799] ? __ia32_sys_sendmsg+0x90/0x90 [ 301.129132][T13799] ? __rcu_read_lock+0x50/0x50 [ 301.133896][T13799] ? __kasan_slab_free+0x1e2/0x220 [ 301.139001][T13799] ? __kasan_slab_free+0x168/0x220 [ 301.144095][T13799] ? slab_free_freelist_hook+0xd0/0x150 [ 301.149645][T13799] ? kmem_cache_free+0xac/0x5c0 [ 301.154494][T13799] ? do_sys_open+0x4a3/0x620 [ 301.159073][T13799] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 301.165147][T13799] ? do_sys_open+0x2fc/0x620 [ 301.169739][T13799] ? proc_fail_nth_write+0x166/0x200 [ 301.175016][T13799] ? proc_fail_nth_read+0x1c0/0x1c0 [ 301.180204][T13799] ? ip4_datagram_release_cb+0x864/0xde0 [ 301.185825][T13799] ? proc_fail_nth_read+0x1c0/0x1c0 [ 301.191012][T13799] ? memset+0x1f/0x40 [ 301.194978][T13799] ? fsnotify+0x13a0/0x1460 [ 301.199467][T13799] ? __kernel_write+0x340/0x340 [ 301.204299][T13799] ? fsnotify+0x13a0/0x1460 [ 301.208805][T13799] ? security_file_permission+0x128/0x300 [ 301.214513][T13799] ? __sb_end_write+0xa4/0xf0 [ 301.219347][T13799] ? vfs_write+0x427/0x4f0 [ 301.223745][T13799] ? ksys_write+0x237/0x2a0 [ 301.228251][T13799] ? __ia32_sys_read+0x80/0x80 [ 301.233435][T13799] __x64_sys_sendmmsg+0x9c/0xb0 [ 301.238287][T13799] do_syscall_64+0xcb/0x150 [ 301.242781][T13799] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 301.248676][T13799] RIP: 0033:0x45de59 [ 301.252556][T13799] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.272173][T13799] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 301.280969][T13799] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 301.288950][T13799] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 301.296931][T13799] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 301.304896][T13799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 301.313052][T13799] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 301.321026][T13802] CPU: 1 PID: 13802 Comm: syz-executor.1 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 301.331179][T13802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.341221][T13802] Call Trace: [ 301.344495][T13802] dump_stack+0x1b0/0x21e [ 301.348841][T13802] ? devkmsg_release+0x11c/0x11c [ 301.353785][T13802] ? show_regs_print_info+0x12/0x12 [ 301.358999][T13802] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 301.364355][T13802] ? slab_free_freelist_hook+0xd0/0x150 [ 301.369894][T13802] should_fail+0x6fb/0x860 [ 301.374291][T13802] ? setup_fault_attr+0x2b0/0x2b0 [ 301.379297][T13802] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 301.384651][T13802] ? filename_lookup+0x4e6/0x6c0 [ 301.389602][T13802] ? should_fail+0x182/0x860 [ 301.394176][T13802] ? vfs_parse_fs_string+0x171/0x280 [ 301.399449][T13802] should_failslab+0x5/0x20 [ 301.403938][T13802] __kmalloc_track_caller+0x5d/0x2b0 [ 301.409204][T13802] ? setup_fault_attr+0x2b0/0x2b0 [ 301.414208][T13802] kmemdup_nul+0x27/0xa0 [ 301.418432][T13802] vfs_parse_fs_string+0x171/0x280 [ 301.423544][T13802] ? logfc+0x710/0x710 [ 301.428554][T13802] ? __module_put_and_exit+0x20/0x20 [ 301.433822][T13802] ? alloc_fs_context+0x520/0x650 [ 301.438829][T13802] do_mount+0x13bc/0x2630 [ 301.443241][T13802] ? copy_mount_string+0x30/0x30 [ 301.448164][T13802] ? page_fault+0x2f/0x40 [ 301.452475][T13802] ? copy_mount_options+0x1e8/0x320 [ 301.457664][T13802] ? copy_mount_options+0x293/0x320 [ 301.462848][T13802] ksys_mount+0xc2/0xf0 [ 301.467001][T13802] __x64_sys_mount+0xb1/0xc0 [ 301.471574][T13802] do_syscall_64+0xcb/0x150 [ 301.476251][T13802] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 301.482136][T13802] RIP: 0033:0x45de59 [ 301.486012][T13802] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:13:48 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[@ANYRESOCT=0x0]) chdir(&(0x7f0000000000)='./file1\x00') getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000400)={@broadcast, @multicast1}, &(0x7f0000000440)=0x8) r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept(r0, &(0x7f00000002c0)=@ax25={{0x3, @bcast}, [@default, @default, @netrom, @netrom, @null, @default, @bcast, @null]}, &(0x7f0000000340)=0x80) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_buf(r2, 0x29, 0x15, &(0x7f0000000200)="6d4dc3c47084c6012f58bbc3d4ee25b8ca81f37c215bfa62ccbf84b71329c16fb5751bff01392ed7ed5becc8c7e8c07bc618f197dd243d8ae3a21a3203c0d189576aa053ce5510b90c790c119430f676674ec985155d2237c1495d18ad87577db22f08b4f94c8b55cfa1edee56de3d95a83ee9871b34fad437bb2d17342b9e321e85ead25c1208b9517184e2090c68d9ee83e4ab7982", 0x96) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3f) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000380)={'batadv_slave_1\x00', 0x2}) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) [ 301.505663][T13802] RSP: 002b:00007f59655f7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 301.514276][T13802] RAX: ffffffffffffffda RBX: 0000000000021a00 RCX: 000000000045de59 [ 301.522263][T13802] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000400000 [ 301.530235][T13802] RBP: 00007f59655f7ca0 R08: 0000000020000100 R09: 0000000000000000 [ 301.538211][T13802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 301.546282][T13802] R13: 00007fff5c787dcf R14: 00007f59655f89c0 R15: 000000000118bfd4 13:13:48 executing program 0 (fault-call:6 fault-nth:10): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 301.575631][T13800] FAT-fs (loop5): count of clusters too big (114686) [ 301.582625][T13800] FAT-fs (loop5): Can't find a valid FAT filesystem 13:13:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x404, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 301.728235][T13814] FAULT_INJECTION: forcing a failure. [ 301.728235][T13814] name failslab, interval 1, probability 0, space 0, times 0 [ 301.741849][T13814] CPU: 1 PID: 13814 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 301.752018][T13814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.762101][T13814] Call Trace: [ 301.765534][T13814] dump_stack+0x1b0/0x21e [ 301.769957][T13814] ? devkmsg_release+0x11c/0x11c [ 301.774885][T13814] ? show_regs_print_info+0x12/0x12 [ 301.780194][T13814] should_fail+0x6fb/0x860 [ 301.784718][T13814] ? setup_fault_attr+0x2b0/0x2b0 [ 301.789742][T13814] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 301.795118][T13814] ? skb_clone+0x1b2/0x370 [ 301.799517][T13814] should_failslab+0x5/0x20 [ 301.803999][T13814] kmem_cache_alloc+0x36/0x250 [ 301.808747][T13814] skb_clone+0x1b2/0x370 [ 301.812969][T13814] dev_queue_xmit_nit+0x279/0x9e0 [ 301.817983][T13814] xmit_one+0x7b/0x460 [ 301.822034][T13814] __dev_queue_xmit+0x1858/0x25d0 [ 301.827220][T13814] ? dev_queue_xmit+0x20/0x20 [ 301.831892][T13814] ? ip_finish_output2+0x936/0x1810 [ 301.837080][T13814] ip_finish_output2+0xbdf/0x1810 [ 301.842106][T13814] ? ip_fragment+0x210/0x210 [ 301.846679][T13814] ? __ip_finish_output+0x4e1/0x6d0 [ 301.851865][T13814] ip_output+0x318/0x400 [ 301.856107][T13814] ? ip_finish_output+0x1d0/0x1d0 [ 301.861119][T13814] ? ip_mc_finish_output+0x3a0/0x3a0 [ 301.866436][T13814] ? udp4_hwcsum+0x26b/0x430 [ 301.871129][T13814] ip_send_skb+0xaa/0x140 [ 301.875482][T13814] udp_send_skb+0x8e9/0x1100 [ 301.880053][T13814] udp_sendmsg+0x1d45/0x2e80 [ 301.884731][T13814] ? ip_do_fragment+0x2290/0x2290 [ 301.889744][T13814] ? udp_cmsg_send+0x340/0x340 [ 301.894508][T13814] ? selinux_socket_sendmsg+0x10b/0x320 [ 301.900049][T13814] ? selinux_socket_accept+0x580/0x580 [ 301.905503][T13814] ? rw_copy_check_uvector+0x6b/0x310 [ 301.910865][T13814] ? inet_send_prepare+0x1b7/0x470 [ 301.915957][T13814] ? inet_send_prepare+0x470/0x470 [ 301.921062][T13814] ____sys_sendmsg+0x56f/0x860 [ 301.925808][T13814] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 301.930983][T13814] ? udp_sendmsg+0x75b/0x2e80 [ 301.935638][T13814] ? __sys_sendmmsg+0x46f/0x680 [ 301.940486][T13814] __sys_sendmmsg+0x338/0x680 [ 301.945159][T13814] ? __ia32_sys_sendmsg+0x90/0x90 [ 301.950163][T13814] ? __rcu_read_lock+0x50/0x50 [ 301.954905][T13814] ? __kasan_slab_free+0x1e2/0x220 [ 301.960006][T13814] ? __kasan_slab_free+0x168/0x220 [ 301.965103][T13814] ? slab_free_freelist_hook+0xd0/0x150 [ 301.970658][T13814] ? kmem_cache_free+0xac/0x5c0 [ 301.975484][T13814] ? do_sys_open+0x4a3/0x620 [ 301.980063][T13814] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 301.986105][T13814] ? do_sys_open+0x2fc/0x620 [ 301.990676][T13814] ? proc_fail_nth_write+0x166/0x200 [ 301.995954][T13814] ? proc_fail_nth_read+0x1c0/0x1c0 [ 302.001143][T13814] ? ip4_datagram_release_cb+0x864/0xde0 [ 302.007099][T13814] ? proc_fail_nth_read+0x1c0/0x1c0 [ 302.012275][T13814] ? memset+0x1f/0x40 [ 302.016283][T13814] ? fsnotify+0x13a0/0x1460 [ 302.020766][T13814] ? __kernel_write+0x340/0x340 [ 302.025601][T13814] ? fsnotify+0x13a0/0x1460 [ 302.030434][T13814] ? security_file_permission+0x128/0x300 [ 302.036128][T13814] ? __sb_end_write+0xa4/0xf0 [ 302.040780][T13814] ? vfs_write+0x427/0x4f0 [ 302.045184][T13814] ? ksys_write+0x237/0x2a0 [ 302.049671][T13814] ? __ia32_sys_read+0x80/0x80 [ 302.054444][T13814] __x64_sys_sendmmsg+0x9c/0xb0 [ 302.059277][T13814] do_syscall_64+0xcb/0x150 [ 302.063770][T13814] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 302.069640][T13814] RIP: 0033:0x45de59 [ 302.073511][T13814] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.093121][T13814] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 302.101525][T13814] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 302.109476][T13814] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 302.118294][T13814] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 302.126246][T13814] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 302.134226][T13814] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:48 executing program 1 (fault-call:3 fault-nth:7): syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:13:49 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x1002, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r6, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x28, r7, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r9}, @void}}, [@NL80211_ATTR_KEY={0xc, 0x50, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}]}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r4, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r5, 0x800, 0x70bd28, 0x25dfdbff, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0x2, 0x4a}}}}, [@NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x1, 0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x20008080) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:13:49 executing program 0 (fault-call:6 fault-nth:11): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 302.369551][T13822] FAULT_INJECTION: forcing a failure. [ 302.369551][T13822] name failslab, interval 1, probability 0, space 0, times 0 [ 302.382260][T13822] CPU: 0 PID: 13822 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 302.392411][T13822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.402460][T13822] Call Trace: [ 302.405741][T13822] dump_stack+0x1b0/0x21e [ 302.410070][T13822] ? devkmsg_release+0x11c/0x11c [ 302.414995][T13822] ? show_regs_print_info+0x12/0x12 [ 302.420182][T13822] should_fail+0x6fb/0x860 [ 302.424594][T13822] ? setup_fault_attr+0x2b0/0x2b0 [ 302.429594][T13822] ? update_load_avg+0x410/0x8f0 [ 302.434528][T13822] ? switch_mm_irqs_off+0x46e/0x870 [ 302.439720][T13822] ? __alloc_skb+0x88/0x4d0 [ 302.444222][T13822] should_failslab+0x5/0x20 [ 302.448727][T13822] kmem_cache_alloc+0x36/0x250 [ 302.453524][T13822] __alloc_skb+0x88/0x4d0 [ 302.458022][T13822] alloc_skb_with_frags+0xb1/0x580 [ 302.463126][T13822] sock_alloc_send_pskb+0x87e/0xcc0 [ 302.468334][T13822] ? sock_kzfree_s+0x50/0x50 [ 302.472924][T13822] ? ___preempt_schedule+0x16/0x20 [ 302.478731][T13822] ? __kfree_skb_flush+0x48/0xc0 [ 302.483648][T13822] ? __local_bh_enable_ip+0xb1/0x170 [ 302.488913][T13822] __ip_append_data+0x1fbd/0x31b0 [ 302.493943][T13822] ? ip_do_fragment+0x2290/0x2290 [ 302.498947][T13822] ? ip_output+0x318/0x400 [ 302.503345][T13822] ? ip_setup_cork+0x810/0x810 [ 302.508101][T13822] ? ipv4_mtu+0x212/0x2c0 [ 302.512442][T13822] ? ip_setup_cork+0x46b/0x810 [ 302.517194][T13822] ip_make_skb+0x1c9/0x4d0 [ 302.521709][T13822] ? ip_do_fragment+0x2290/0x2290 [ 302.526732][T13822] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 302.532360][T13822] ? __sk_dst_check+0x1b0/0x1b0 [ 302.537224][T13822] udp_sendmsg+0x1d1b/0x2e80 [ 302.541797][T13822] ? ip_do_fragment+0x2290/0x2290 [ 302.546803][T13822] ? udp_cmsg_send+0x340/0x340 [ 302.551542][T13822] ? selinux_socket_sendmsg+0x10b/0x320 [ 302.557078][T13822] ? selinux_socket_accept+0x580/0x580 [ 302.562515][T13822] ? rw_copy_check_uvector+0x6b/0x310 [ 302.567866][T13822] ? inet_send_prepare+0x1b7/0x470 [ 302.572952][T13822] ? inet_send_prepare+0x470/0x470 [ 302.578041][T13822] ____sys_sendmsg+0x56f/0x860 [ 302.582788][T13822] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 302.587967][T13822] ? udp_sendmsg+0x75b/0x2e80 [ 302.592644][T13822] ? __sys_sendmmsg+0x46f/0x680 [ 302.597491][T13822] __sys_sendmmsg+0x338/0x680 [ 302.602178][T13822] ? __ia32_sys_sendmsg+0x90/0x90 [ 302.607196][T13822] ? __rcu_read_lock+0x50/0x50 [ 302.611945][T13822] ? __kasan_slab_free+0x1e2/0x220 [ 302.617035][T13822] ? __kasan_slab_free+0x168/0x220 [ 302.622140][T13822] ? slab_free_freelist_hook+0xd0/0x150 [ 302.627670][T13822] ? kmem_cache_free+0xac/0x5c0 [ 302.632556][T13822] ? do_sys_open+0x4a3/0x620 [ 302.637120][T13822] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 302.643169][T13822] ? do_sys_open+0x2fc/0x620 [ 302.647910][T13822] ? proc_fail_nth_write+0x166/0x200 [ 302.653228][T13822] ? proc_fail_nth_read+0x1c0/0x1c0 [ 302.658462][T13822] ? ip4_datagram_release_cb+0x864/0xde0 [ 302.664085][T13822] ? proc_fail_nth_read+0x1c0/0x1c0 [ 302.669269][T13822] ? memset+0x1f/0x40 [ 302.673246][T13822] ? fsnotify+0x13a0/0x1460 [ 302.677732][T13822] ? __kernel_write+0x340/0x340 [ 302.682554][T13822] ? fsnotify+0x13a0/0x1460 [ 302.687064][T13822] ? security_file_permission+0x128/0x300 [ 302.692847][T13822] ? __sb_end_write+0xa4/0xf0 [ 302.697526][T13822] ? vfs_write+0x427/0x4f0 [ 302.701918][T13822] ? ksys_write+0x237/0x2a0 [ 302.706396][T13822] ? __ia32_sys_read+0x80/0x80 [ 302.711150][T13822] __x64_sys_sendmmsg+0x9c/0xb0 [ 302.715974][T13822] do_syscall_64+0xcb/0x150 [ 302.720452][T13822] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 302.726318][T13822] RIP: 0033:0x45de59 [ 302.730188][T13822] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.749780][T13822] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 302.758172][T13822] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 302.766210][T13822] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 302.774176][T13822] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 302.782143][T13822] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b [ 302.790108][T13822] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:49 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x2400, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:49 executing program 0 (fault-call:6 fault-nth:12): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 302.820225][T13818] FAT-fs (loop3): Unrecognized mount option "00000000000000000000000" or missing value [ 302.832309][T13817] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 302.841723][T13817] EXT4-fs (loop2): group descriptors corrupted! 13:13:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x405, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 302.907211][T13840] FAULT_INJECTION: forcing a failure. [ 302.907211][T13840] name failslab, interval 1, probability 0, space 0, times 0 [ 302.920141][T13840] CPU: 0 PID: 13840 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 302.930306][T13840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.940362][T13840] Call Trace: [ 302.943641][T13840] dump_stack+0x1b0/0x21e [ 302.948077][T13840] ? devkmsg_release+0x11c/0x11c [ 302.953036][T13840] ? show_regs_print_info+0x12/0x12 [ 302.958231][T13840] should_fail+0x6fb/0x860 [ 302.962646][T13840] ? setup_fault_attr+0x2b0/0x2b0 [ 302.967664][T13840] ? update_load_avg+0x410/0x8f0 [ 302.972602][T13840] ? switch_mm_irqs_off+0x46e/0x870 [ 302.977798][T13840] ? alloc_skb_with_frags+0xb1/0x580 [ 302.983064][T13840] should_failslab+0x5/0x20 [ 302.987592][T13840] __kmalloc_track_caller+0x5d/0x2b0 [ 302.992878][T13840] ? kmem_cache_alloc+0x1d5/0x250 [ 302.997894][T13840] ? alloc_skb_with_frags+0xb1/0x580 [ 303.003183][T13840] __alloc_skb+0xd1/0x4d0 [ 303.007504][T13840] alloc_skb_with_frags+0xb1/0x580 [ 303.012613][T13840] sock_alloc_send_pskb+0x87e/0xcc0 [ 303.017791][T13840] ? sock_kzfree_s+0x50/0x50 [ 303.022360][T13840] ? ___preempt_schedule+0x16/0x20 [ 303.027465][T13840] ? __kfree_skb_flush+0x48/0xc0 [ 303.032450][T13840] ? __local_bh_enable_ip+0xb1/0x170 [ 303.037720][T13840] __ip_append_data+0x1fbd/0x31b0 [ 303.042935][T13840] ? ip_do_fragment+0x2290/0x2290 [ 303.047953][T13840] ? ip_output+0x318/0x400 [ 303.052347][T13840] ? ip_setup_cork+0x810/0x810 [ 303.057083][T13840] ? ipv4_mtu+0x212/0x2c0 [ 303.061401][T13840] ? ip_setup_cork+0x46b/0x810 [ 303.066141][T13840] ip_make_skb+0x1c9/0x4d0 [ 303.070551][T13840] ? ip_do_fragment+0x2290/0x2290 [ 303.075612][T13840] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 303.081235][T13840] ? __sk_dst_check+0x1b0/0x1b0 [ 303.086278][T13840] udp_sendmsg+0x1d1b/0x2e80 [ 303.090866][T13840] ? ip_do_fragment+0x2290/0x2290 [ 303.095867][T13840] ? udp_cmsg_send+0x340/0x340 [ 303.100614][T13840] ? selinux_socket_sendmsg+0x10b/0x320 [ 303.106176][T13840] ? selinux_socket_accept+0x580/0x580 [ 303.111631][T13840] ? rw_copy_check_uvector+0x6b/0x310 [ 303.117004][T13840] ? inet_send_prepare+0x1b7/0x470 [ 303.122101][T13840] ? inet_send_prepare+0x470/0x470 [ 303.127214][T13840] ____sys_sendmsg+0x56f/0x860 [ 303.131963][T13840] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 303.137181][T13840] ? udp_sendmsg+0x75b/0x2e80 [ 303.141871][T13840] ? __sys_sendmmsg+0x46f/0x680 [ 303.146699][T13840] __sys_sendmmsg+0x338/0x680 [ 303.151352][T13840] ? __ia32_sys_sendmsg+0x90/0x90 [ 303.156352][T13840] ? __rcu_read_lock+0x50/0x50 [ 303.161089][T13840] ? __kasan_slab_free+0x1e2/0x220 [ 303.166189][T13840] ? __kasan_slab_free+0x168/0x220 [ 303.171314][T13840] ? slab_free_freelist_hook+0xd0/0x150 [ 303.176836][T13840] ? kmem_cache_free+0xac/0x5c0 [ 303.181662][T13840] ? do_sys_open+0x4a3/0x620 [ 303.186245][T13840] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 303.192287][T13840] ? do_sys_open+0x2fc/0x620 [ 303.196865][T13840] ? proc_fail_nth_write+0x166/0x200 [ 303.202259][T13840] ? proc_fail_nth_read+0x1c0/0x1c0 [ 303.207466][T13840] ? ip4_datagram_release_cb+0x864/0xde0 [ 303.213100][T13840] ? proc_fail_nth_read+0x1c0/0x1c0 [ 303.218283][T13840] ? memset+0x1f/0x40 [ 303.222244][T13840] ? fsnotify+0x13a0/0x1460 [ 303.226740][T13840] ? __kernel_write+0x340/0x340 [ 303.231573][T13840] ? fsnotify+0x13a0/0x1460 [ 303.236050][T13840] ? security_file_permission+0x128/0x300 [ 303.241764][T13840] ? __sb_end_write+0xa4/0xf0 [ 303.246439][T13840] ? vfs_write+0x427/0x4f0 [ 303.251164][T13840] ? ksys_write+0x237/0x2a0 [ 303.256004][T13840] ? __ia32_sys_read+0x80/0x80 [ 303.260754][T13840] __x64_sys_sendmmsg+0x9c/0xb0 [ 303.265592][T13840] do_syscall_64+0xcb/0x150 [ 303.270083][T13840] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 303.275975][T13840] RIP: 0033:0x45de59 [ 303.279878][T13840] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.299573][T13840] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 303.307966][T13840] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 303.316010][T13840] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 303.324063][T13840] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 303.332015][T13840] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c [ 303.340192][T13840] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:50 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x103000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) [ 303.364738][T13844] FAULT_INJECTION: forcing a failure. [ 303.364738][T13844] name failslab, interval 1, probability 0, space 0, times 0 [ 303.382594][T13818] FAT-fs (loop3): Unrecognized mount option "00000000000000000000000" or missing value 13:13:50 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x26cb, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 303.416955][T13844] CPU: 1 PID: 13844 Comm: syz-executor.1 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 303.427126][T13844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.437185][T13844] Call Trace: [ 303.440474][T13844] dump_stack+0x1b0/0x21e [ 303.444785][T13844] ? devkmsg_release+0x11c/0x11c [ 303.449770][T13844] ? do_syscall_64+0xcb/0x150 [ 303.454447][T13844] ? show_regs_print_info+0x12/0x12 [ 303.459631][T13844] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 303.464977][T13844] should_fail+0x6fb/0x860 [ 303.469368][T13844] ? setup_fault_attr+0x2b0/0x2b0 [ 303.474479][T13844] ? selinux_fs_context_parse_param+0xe4/0x150 [ 303.480630][T13844] ? selinux_fs_context_dup+0x270/0x270 [ 303.486183][T13844] ? alloc_super+0x56/0x760 [ 303.490659][T13844] should_failslab+0x5/0x20 [ 303.495166][T13844] kmem_cache_alloc_trace+0x39/0x270 [ 303.500425][T13844] ? _raw_spin_trylock_bh+0x190/0x190 [ 303.505769][T13844] alloc_super+0x56/0x760 [ 303.510079][T13844] sget+0x20e/0x4e0 [ 303.513867][T13844] ? free_anon_bdev+0x20/0x20 [ 303.518517][T13844] ? ovl_mount+0x30/0x30 [ 303.522756][T13844] mount_nodev+0x2c/0xe0 [ 303.526979][T13844] legacy_get_tree+0xde/0x170 [ 303.531638][T13844] ? fuse_emit+0x7d0/0x7d0 [ 303.536038][T13844] vfs_get_tree+0x85/0x260 [ 303.540794][T13844] do_mount+0x1883/0x2630 [ 303.545106][T13844] ? copy_mount_string+0x30/0x30 [ 303.550036][T13844] ? page_fault+0x2f/0x40 [ 303.554352][T13844] ? copy_mount_options+0x1e8/0x320 [ 303.559537][T13844] ? copy_mount_options+0x293/0x320 [ 303.564743][T13844] ksys_mount+0xc2/0xf0 [ 303.568900][T13844] __x64_sys_mount+0xb1/0xc0 [ 303.573470][T13844] do_syscall_64+0xcb/0x150 [ 303.577974][T13844] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 303.583856][T13844] RIP: 0033:0x45de59 [ 303.587735][T13844] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.607495][T13844] RSP: 002b:00007f59655f7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 13:13:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:13:50 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x10000, 0x0) sendmsg$IPVS_CMD_SET_DEST(r3, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x54, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x22, 0x20}}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x30, 0x1}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x14, 0x1}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x24000006}, 0x8001) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:50 executing program 0 (fault-call:6 fault-nth:13): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 303.615883][T13844] RAX: ffffffffffffffda RBX: 0000000000021a00 RCX: 000000000045de59 [ 303.623834][T13844] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000400000 [ 303.632132][T13844] RBP: 00007f59655f7ca0 R08: 0000000020000100 R09: 0000000000000000 [ 303.640087][T13844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 303.648053][T13844] R13: 00007fff5c787dcf R14: 00007f59655f89c0 R15: 000000000118bfd4 [ 303.702190][T13852] FAULT_INJECTION: forcing a failure. [ 303.702190][T13852] name failslab, interval 1, probability 0, space 0, times 0 [ 303.714829][T13852] CPU: 0 PID: 13852 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 303.724979][T13852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.735220][T13852] Call Trace: [ 303.738523][T13852] dump_stack+0x1b0/0x21e [ 303.742852][T13852] ? devkmsg_release+0x11c/0x11c [ 303.747771][T13852] ? show_regs_print_info+0x12/0x12 [ 303.752974][T13852] ? __copy_skb_header+0x429/0x560 [ 303.758092][T13852] should_fail+0x6fb/0x860 [ 303.762503][T13852] ? setup_fault_attr+0x2b0/0x2b0 [ 303.767701][T13852] ? eth_type_trans+0x2a3/0x680 [ 303.772727][T13852] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 303.778147][T13852] ? skb_clone+0x1b2/0x370 [ 303.782557][T13852] should_failslab+0x5/0x20 [ 303.787057][T13852] kmem_cache_alloc+0x36/0x250 [ 303.791819][T13852] skb_clone+0x1b2/0x370 [ 303.796286][T13852] dev_queue_xmit_nit+0x279/0x9e0 [ 303.801294][T13852] xmit_one+0x7b/0x460 [ 303.805373][T13852] __dev_queue_xmit+0x1858/0x25d0 [ 303.810375][T13852] ? dev_queue_xmit+0x20/0x20 [ 303.815034][T13852] ? ip_finish_output2+0x936/0x1810 [ 303.820210][T13852] ip_finish_output2+0xbdf/0x1810 [ 303.825219][T13852] ? ip_fragment+0x210/0x210 [ 303.829932][T13852] ? __ip_finish_output+0x4e1/0x6d0 [ 303.835105][T13852] ip_output+0x318/0x400 [ 303.839349][T13852] ? ip_finish_output+0x1d0/0x1d0 [ 303.844364][T13852] ? ip_mc_finish_output+0x3a0/0x3a0 [ 303.849633][T13852] ? udp4_hwcsum+0x26b/0x430 [ 303.854206][T13852] ip_send_skb+0xaa/0x140 [ 303.858514][T13852] udp_send_skb+0x8e9/0x1100 [ 303.863106][T13852] udp_sendmsg+0x1d45/0x2e80 [ 303.867701][T13852] ? ip_do_fragment+0x2290/0x2290 [ 303.872724][T13852] ? udp_cmsg_send+0x340/0x340 [ 303.877476][T13852] ? update_load_avg+0x410/0x8f0 [ 303.882497][T13852] ? switch_mm_irqs_off+0x46e/0x870 [ 303.887671][T13852] ? selinux_socket_sendmsg+0x10b/0x320 [ 303.893212][T13852] ? _raw_spin_unlock_irq+0x5/0x20 [ 303.898300][T13852] ? selinux_socket_accept+0x580/0x580 [ 303.903739][T13852] ? rw_copy_check_uvector+0x6b/0x310 [ 303.909105][T13852] ? __schedule+0x8ae/0xe30 [ 303.913588][T13852] ? inet_send_prepare+0x1b7/0x470 [ 303.918698][T13852] ? inet_send_prepare+0x470/0x470 [ 303.923793][T13852] ____sys_sendmsg+0x56f/0x860 [ 303.928539][T13852] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 303.933716][T13852] ? udp_sendmsg+0x75b/0x2e80 [ 303.938369][T13852] ? __sys_sendmmsg+0x27c/0x680 [ 303.943204][T13852] __sys_sendmmsg+0x338/0x680 [ 303.947878][T13852] ? __ia32_sys_sendmsg+0x90/0x90 [ 303.952883][T13852] ? __rcu_read_lock+0x50/0x50 [ 303.957807][T13852] ? __kasan_slab_free+0x1e2/0x220 [ 303.963233][T13852] ? __kasan_slab_free+0x168/0x220 [ 303.968436][T13852] ? slab_free_freelist_hook+0xd0/0x150 [ 303.974218][T13852] ? kmem_cache_free+0xac/0x5c0 [ 303.979656][T13852] ? do_sys_open+0x4a3/0x620 [ 303.984242][T13852] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 303.990293][T13852] ? do_sys_open+0x2fc/0x620 [ 303.994863][T13852] ? proc_fail_nth_write+0x166/0x200 [ 304.000222][T13852] ? proc_fail_nth_read+0x1c0/0x1c0 [ 304.005420][T13852] ? ip4_datagram_release_cb+0x864/0xde0 [ 304.011029][T13852] ? proc_fail_nth_read+0x1c0/0x1c0 [ 304.016217][T13852] ? memset+0x1f/0x40 [ 304.020188][T13852] ? fsnotify+0x13a0/0x1460 [ 304.024681][T13852] ? __kernel_write+0x340/0x340 [ 304.029606][T13852] ? fsnotify+0x13a0/0x1460 [ 304.034086][T13852] ? security_file_permission+0x128/0x300 [ 304.040560][T13852] ? __sb_end_write+0xa4/0xf0 [ 304.045211][T13852] ? vfs_write+0x427/0x4f0 [ 304.049616][T13852] ? ksys_write+0x237/0x2a0 [ 304.054103][T13852] ? __ia32_sys_read+0x80/0x80 [ 304.058840][T13852] __x64_sys_sendmmsg+0x9c/0xb0 [ 304.063680][T13852] do_syscall_64+0xcb/0x150 [ 304.070220][T13852] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 304.076274][T13852] RIP: 0033:0x45de59 [ 304.080141][T13852] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.099840][T13852] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 304.108254][T13852] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 304.116315][T13852] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 304.124268][T13852] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 304.132436][T13852] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d [ 304.140575][T13852] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:51 executing program 0 (fault-call:6 fault-nth:14): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 304.235571][T13849] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 304.245004][T13849] EXT4-fs (loop2): group descriptors corrupted! 13:13:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x406, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 304.387774][T13861] overlayfs: failed to resolve './file1': -2 [ 304.450321][T13866] FAULT_INJECTION: forcing a failure. [ 304.450321][T13866] name failslab, interval 1, probability 0, space 0, times 0 [ 304.478424][T13866] CPU: 0 PID: 13866 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 304.489222][T13866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 13:13:51 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_SET_WDS_PEER(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r3, 0x10, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x0, 0x31}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @random="548e285c9832"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x68}, 0x1, 0x0, 0x0, 0x24000804}, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) [ 304.499271][T13866] Call Trace: [ 304.502567][T13866] dump_stack+0x1b0/0x21e [ 304.506895][T13866] ? devkmsg_release+0x11c/0x11c [ 304.511858][T13866] ? show_regs_print_info+0x12/0x12 [ 304.517057][T13866] should_fail+0x6fb/0x860 [ 304.521508][T13866] ? setup_fault_attr+0x2b0/0x2b0 [ 304.526522][T13866] ? eth_get_headlen+0x240/0x240 [ 304.531556][T13866] ? sock_def_write_space+0x1b9/0x2a0 [ 304.537035][T13866] ? __alloc_skb+0x88/0x4d0 [ 304.541528][T13866] should_failslab+0x5/0x20 [ 304.546034][T13866] kmem_cache_alloc+0x36/0x250 [ 304.550780][T13866] ? netif_rx+0x157/0x2b0 [ 304.558571][T13866] __alloc_skb+0x88/0x4d0 [ 304.562883][T13866] ? dev_queue_xmit_nit+0x946/0x9e0 [ 304.568079][T13866] alloc_skb_with_frags+0xb1/0x580 [ 304.573193][T13866] ? _local_bh_enable+0x30/0x30 [ 304.578026][T13866] sock_alloc_send_pskb+0x87e/0xcc0 [ 304.583215][T13866] ? sock_kzfree_s+0x50/0x50 [ 304.587963][T13866] __ip_append_data+0x1fbd/0x31b0 [ 304.592978][T13866] ? ip_do_fragment+0x2290/0x2290 [ 304.598003][T13866] ? ip_output+0x318/0x400 [ 304.602408][T13866] ? ip_setup_cork+0x810/0x810 [ 304.607153][T13866] ? ipv4_mtu+0x212/0x2c0 [ 304.611466][T13866] ? ip_setup_cork+0x46b/0x810 [ 304.616250][T13866] ip_make_skb+0x1c9/0x4d0 [ 304.620793][T13866] ? ip_do_fragment+0x2290/0x2290 [ 304.625827][T13866] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 304.631456][T13866] ? __sk_dst_check+0x1b0/0x1b0 [ 304.636302][T13866] udp_sendmsg+0x1d1b/0x2e80 [ 304.640891][T13866] ? ip_do_fragment+0x2290/0x2290 [ 304.645899][T13866] ? udp_cmsg_send+0x340/0x340 [ 304.650647][T13866] ? selinux_socket_sendmsg+0x10b/0x320 [ 304.656351][T13866] ? selinux_socket_accept+0x580/0x580 [ 304.662931][T13866] ? rw_copy_check_uvector+0x6b/0x310 [ 304.668328][T13866] ? inet_send_prepare+0x1b7/0x470 [ 304.673444][T13866] ? inet_send_prepare+0x470/0x470 [ 304.678544][T13866] ____sys_sendmsg+0x56f/0x860 [ 304.683291][T13866] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 304.688648][T13866] ? udp_sendmsg+0x75b/0x2e80 [ 304.693411][T13866] ? __sys_sendmmsg+0x46f/0x680 [ 304.698258][T13866] __sys_sendmmsg+0x338/0x680 [ 304.702927][T13866] ? __ia32_sys_sendmsg+0x90/0x90 [ 304.707935][T13866] ? __rcu_read_lock+0x50/0x50 [ 304.712691][T13866] ? __kasan_slab_free+0x1e2/0x220 [ 304.717784][T13866] ? __kasan_slab_free+0x168/0x220 [ 304.722915][T13866] ? slab_free_freelist_hook+0xd0/0x150 [ 304.728452][T13866] ? kmem_cache_free+0xac/0x5c0 [ 304.733309][T13866] ? do_sys_open+0x4a3/0x620 [ 304.737896][T13866] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 304.743952][T13866] ? do_sys_open+0x2fc/0x620 [ 304.748620][T13866] ? proc_fail_nth_write+0x166/0x200 [ 304.753994][T13866] ? proc_fail_nth_read+0x1c0/0x1c0 [ 304.759175][T13866] ? ip4_datagram_release_cb+0x864/0xde0 [ 304.764806][T13866] ? proc_fail_nth_read+0x1c0/0x1c0 [ 304.770010][T13866] ? memset+0x1f/0x40 [ 304.774000][T13866] ? fsnotify+0x13a0/0x1460 [ 304.778526][T13866] ? __kernel_write+0x340/0x340 [ 304.783805][T13866] ? fsnotify+0x13a0/0x1460 [ 304.788299][T13866] ? security_file_permission+0x128/0x300 [ 304.794000][T13866] ? __sb_end_write+0xa4/0xf0 [ 304.798659][T13866] ? vfs_write+0x427/0x4f0 [ 304.803086][T13866] ? ksys_write+0x237/0x2a0 [ 304.807574][T13866] ? __ia32_sys_read+0x80/0x80 [ 304.812327][T13866] __x64_sys_sendmmsg+0x9c/0xb0 [ 304.817701][T13866] do_syscall_64+0xcb/0x150 [ 304.822379][T13866] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 304.828343][T13866] RIP: 0033:0x45de59 [ 304.832324][T13866] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.852104][T13866] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 304.860506][T13866] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 304.868554][T13866] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 304.876607][T13866] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 304.884995][T13866] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000e [ 304.892952][T13866] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x200000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:13:51 executing program 0 (fault-call:6 fault-nth:15): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:51 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x3f00, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 304.932919][T13871] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 304.942672][T13871] EXT4-fs (loop2): group descriptors corrupted! 13:13:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0xa00, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 305.064311][T13886] FAULT_INJECTION: forcing a failure. [ 305.064311][T13886] name failslab, interval 1, probability 0, space 0, times 0 [ 305.077079][T13886] CPU: 1 PID: 13886 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 305.087226][T13886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.097428][T13886] Call Trace: [ 305.100956][T13886] dump_stack+0x1b0/0x21e [ 305.105283][T13886] ? devkmsg_release+0x11c/0x11c [ 305.110215][T13886] ? show_regs_print_info+0x12/0x12 [ 305.115388][T13886] should_fail+0x6fb/0x860 [ 305.119782][T13886] ? setup_fault_attr+0x2b0/0x2b0 [ 305.124788][T13886] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 305.130131][T13886] ? ___slab_alloc+0x2e0/0x450 [ 305.135399][T13886] ? skb_clone+0x1b2/0x370 [ 305.139785][T13886] should_failslab+0x5/0x20 [ 305.144284][T13886] kmem_cache_alloc+0x36/0x250 [ 305.149031][T13886] skb_clone+0x1b2/0x370 [ 305.153266][T13886] dev_queue_xmit_nit+0x279/0x9e0 [ 305.158276][T13886] xmit_one+0x7b/0x460 [ 305.162328][T13886] __dev_queue_xmit+0x1858/0x25d0 [ 305.167342][T13886] ? dev_queue_xmit+0x20/0x20 [ 305.172003][T13886] ? ip_finish_output2+0x936/0x1810 [ 305.177228][T13886] ip_finish_output2+0xbdf/0x1810 [ 305.182236][T13886] ? ip_fragment+0x210/0x210 [ 305.186825][T13886] ? __ip_finish_output+0x4e1/0x6d0 [ 305.192011][T13886] ip_output+0x318/0x400 [ 305.196243][T13886] ? ip_finish_output+0x1d0/0x1d0 [ 305.201238][T13886] ? ip_mc_finish_output+0x3a0/0x3a0 [ 305.206500][T13886] ? udp4_hwcsum+0x26b/0x430 [ 305.211087][T13886] ip_send_skb+0xaa/0x140 [ 305.215402][T13886] udp_send_skb+0x8e9/0x1100 [ 305.219977][T13886] udp_sendmsg+0x1d45/0x2e80 [ 305.224724][T13886] ? ip_do_fragment+0x2290/0x2290 [ 305.229728][T13886] ? udp_cmsg_send+0x340/0x340 [ 305.235315][T13886] ? selinux_socket_sendmsg+0x10b/0x320 [ 305.242057][T13886] ? selinux_socket_accept+0x580/0x580 [ 305.247509][T13886] ? rw_copy_check_uvector+0x6b/0x310 [ 305.255315][T13886] ? inet_send_prepare+0x1b7/0x470 [ 305.260467][T13886] ? inet_send_prepare+0x470/0x470 [ 305.265577][T13886] ____sys_sendmsg+0x56f/0x860 [ 305.270344][T13886] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 305.275520][T13886] ? udp_sendmsg+0x75b/0x2e80 [ 305.280201][T13886] ? __sys_sendmmsg+0x46f/0x680 [ 305.285060][T13886] __sys_sendmmsg+0x338/0x680 [ 305.289731][T13886] ? __ia32_sys_sendmsg+0x90/0x90 [ 305.294765][T13886] ? __rcu_read_lock+0x50/0x50 [ 305.299519][T13886] ? __kasan_slab_free+0x1e2/0x220 [ 305.304720][T13886] ? __kasan_slab_free+0x168/0x220 [ 305.309897][T13886] ? slab_free_freelist_hook+0xd0/0x150 [ 305.315424][T13886] ? kmem_cache_free+0xac/0x5c0 [ 305.320271][T13886] ? do_sys_open+0x4a3/0x620 [ 305.324867][T13886] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 305.331047][T13886] ? do_sys_open+0x2fc/0x620 [ 305.336570][T13886] ? proc_fail_nth_write+0x166/0x200 [ 305.342801][T13886] ? proc_fail_nth_read+0x1c0/0x1c0 [ 305.348089][T13886] ? ip4_datagram_release_cb+0x864/0xde0 [ 305.354001][T13886] ? proc_fail_nth_read+0x1c0/0x1c0 [ 305.359292][T13886] ? memset+0x1f/0x40 [ 305.363257][T13886] ? fsnotify+0x13a0/0x1460 [ 305.368023][T13886] ? __kernel_write+0x340/0x340 [ 305.372902][T13886] ? fsnotify+0x13a0/0x1460 [ 305.377408][T13886] ? security_file_permission+0x128/0x300 [ 305.383278][T13886] ? __sb_end_write+0xa4/0xf0 [ 305.387929][T13886] ? vfs_write+0x427/0x4f0 [ 305.392340][T13886] ? ksys_write+0x237/0x2a0 [ 305.397004][T13886] ? __ia32_sys_read+0x80/0x80 [ 305.402283][T13886] __x64_sys_sendmmsg+0x9c/0xb0 [ 305.407122][T13886] do_syscall_64+0xcb/0x150 [ 305.411614][T13886] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 305.417814][T13886] RIP: 0033:0x45de59 [ 305.421695][T13886] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.441581][T13886] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 305.450039][T13886] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 305.458092][T13886] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 305.466333][T13886] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 305.474307][T13886] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000f [ 305.482267][T13886] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:52 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:13:52 executing program 0 (fault-call:6 fault-nth:16): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 305.529925][T13894] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 305.539224][T13894] EXT4-fs (loop2): group descriptors corrupted! 13:13:52 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="05003689e0e9e38f2278e2a667", 0xd}], 0x0, &(0x7f0000000100)=ANY=[@ANYRESOCT, @ANYBLOB="95e05f16f0fe585caca81e58131a575424850f1a53521a0e011232235ede4e8298b06dbb88371533a849c1f078fc16735e93243449a4f75996da9fa6bb2f3a9b30b17081b6f80c50a2969419011203649f687824"]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) open$dir(&(0x7f0000000200)='./file1\x00', 0x220000, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:13:52 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:13:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x26c8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 305.643500][T13903] FAULT_INJECTION: forcing a failure. [ 305.643500][T13903] name failslab, interval 1, probability 0, space 0, times 0 [ 305.656526][T13903] CPU: 1 PID: 13903 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 305.666754][T13903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.677555][T13903] Call Trace: [ 305.680940][T13903] dump_stack+0x1b0/0x21e [ 305.685272][T13903] ? devkmsg_release+0x11c/0x11c [ 305.690195][T13903] ? show_regs_print_info+0x12/0x12 [ 305.695519][T13903] ? __copy_skb_header+0x429/0x560 [ 305.700618][T13903] should_fail+0x6fb/0x860 [ 305.705095][T13903] ? setup_fault_attr+0x2b0/0x2b0 [ 305.710111][T13903] ? eth_type_trans+0x2a3/0x680 [ 305.714960][T13903] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 305.720323][T13903] ? skb_clone+0x1b2/0x370 [ 305.724721][T13903] should_failslab+0x5/0x20 [ 305.729212][T13903] kmem_cache_alloc+0x36/0x250 [ 305.734508][T13903] skb_clone+0x1b2/0x370 [ 305.738725][T13903] dev_queue_xmit_nit+0x279/0x9e0 [ 305.743755][T13903] xmit_one+0x7b/0x460 [ 305.748417][T13903] __dev_queue_xmit+0x1858/0x25d0 [ 305.753955][T13903] ? dev_queue_xmit+0x20/0x20 [ 305.758710][T13903] ? ip_finish_output2+0x936/0x1810 [ 305.764165][T13903] ip_finish_output2+0xbdf/0x1810 [ 305.769173][T13903] ? ip_fragment+0x210/0x210 [ 305.773751][T13903] ? __ip_finish_output+0x4e1/0x6d0 [ 305.778937][T13903] ip_output+0x318/0x400 [ 305.783169][T13903] ? ip_finish_output+0x1d0/0x1d0 [ 305.788166][T13903] ? ip_mc_finish_output+0x3a0/0x3a0 [ 305.793425][T13903] ? udp4_hwcsum+0x26b/0x430 [ 305.798198][T13903] ip_send_skb+0xaa/0x140 [ 305.802507][T13903] udp_send_skb+0x8e9/0x1100 [ 305.807076][T13903] udp_sendmsg+0x1d45/0x2e80 [ 305.811660][T13903] ? ip_do_fragment+0x2290/0x2290 [ 305.816656][T13903] ? udp_cmsg_send+0x340/0x340 [ 305.821407][T13903] ? selinux_socket_sendmsg+0x10b/0x320 [ 305.827171][T13903] ? selinux_socket_accept+0x580/0x580 [ 305.832803][T13903] ? rw_copy_check_uvector+0x6b/0x310 [ 305.838160][T13903] ? inet_send_prepare+0x1b7/0x470 [ 305.843268][T13903] ? inet_send_prepare+0x470/0x470 [ 305.848692][T13903] ____sys_sendmsg+0x56f/0x860 [ 305.854415][T13903] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 305.861881][T13903] ? udp_sendmsg+0x75b/0x2e80 [ 305.867372][T13903] ? __sys_sendmmsg+0x46f/0x680 [ 305.872792][T13903] __sys_sendmmsg+0x338/0x680 [ 305.877737][T13903] ? __ia32_sys_sendmsg+0x90/0x90 [ 305.882749][T13903] ? __rcu_read_lock+0x50/0x50 [ 305.887493][T13903] ? __kasan_slab_free+0x1e2/0x220 [ 305.892702][T13903] ? __kasan_slab_free+0x168/0x220 [ 305.897790][T13903] ? slab_free_freelist_hook+0xd0/0x150 [ 305.903309][T13903] ? kmem_cache_free+0xac/0x5c0 [ 305.908134][T13903] ? do_sys_open+0x4a3/0x620 [ 305.912745][T13903] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 305.918807][T13903] ? do_sys_open+0x2fc/0x620 [ 305.923495][T13903] ? proc_fail_nth_write+0x166/0x200 [ 305.928770][T13903] ? proc_fail_nth_read+0x1c0/0x1c0 [ 305.933946][T13903] ? ip4_datagram_release_cb+0x864/0xde0 [ 305.939550][T13903] ? proc_fail_nth_read+0x1c0/0x1c0 [ 305.944744][T13903] ? memset+0x1f/0x40 [ 305.948713][T13903] ? fsnotify+0x13a0/0x1460 [ 305.953194][T13903] ? __kernel_write+0x340/0x340 [ 305.958016][T13903] ? fsnotify+0x13a0/0x1460 [ 305.962516][T13903] ? security_file_permission+0x128/0x300 [ 305.968260][T13903] ? __sb_end_write+0xa4/0xf0 [ 305.972921][T13903] ? vfs_write+0x427/0x4f0 [ 305.977312][T13903] ? ksys_write+0x237/0x2a0 [ 305.981807][T13903] ? __ia32_sys_read+0x80/0x80 [ 305.986566][T13903] __x64_sys_sendmmsg+0x9c/0xb0 [ 305.991419][T13903] do_syscall_64+0xcb/0x150 [ 305.995918][T13903] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 306.001875][T13903] RIP: 0033:0x45de59 [ 306.005764][T13903] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.025344][T13903] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 306.033745][T13903] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 306.041712][T13903] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 306.049669][T13903] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 306.057625][T13903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 306.065637][T13903] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:52 executing program 0 (fault-call:6 fault-nth:17): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:52 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x4000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:53 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000140)='./file1/file0\x00', 0xfdffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000080)=ANY=[]) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f00000000c0)={'batadv_slave_0\x00', 0xe2}) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000200)={0x4188, {{0xa, 0x4e21, 0x7, @mcast1, 0x100000}}}, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x21) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) [ 306.177702][T13911] FAT-fs (loop5): Unrecognized mount option "01777777777777777777777•à_ðþX\¬¨XWT$…SR2#^ÞN‚˜°m»ˆ73¨IÁðxüs^“$4I¤÷Y–ÚŸ¦»/:›0±p¶ø P¢–”dŸhx$" or missing value [ 306.210910][T13916] FAULT_INJECTION: forcing a failure. [ 306.210910][T13916] name failslab, interval 1, probability 0, space 0, times 0 [ 306.224149][T13916] CPU: 1 PID: 13916 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 306.234285][T13916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.244506][T13916] Call Trace: [ 306.247789][T13916] dump_stack+0x1b0/0x21e [ 306.252120][T13916] ? devkmsg_release+0x11c/0x11c [ 306.257057][T13916] ? show_regs_print_info+0x12/0x12 [ 306.262277][T13916] should_fail+0x6fb/0x860 [ 306.266695][T13916] ? setup_fault_attr+0x2b0/0x2b0 [ 306.271710][T13916] ? eth_get_headlen+0x240/0x240 [ 306.276632][T13916] ? sock_def_write_space+0x1b9/0x2a0 [ 306.281986][T13916] ? __alloc_skb+0x88/0x4d0 [ 306.286469][T13916] should_failslab+0x5/0x20 [ 306.290954][T13916] kmem_cache_alloc+0x36/0x250 [ 306.296024][T13916] ? netif_rx+0x157/0x2b0 [ 306.300337][T13916] __alloc_skb+0x88/0x4d0 [ 306.304667][T13916] ? dev_queue_xmit_nit+0x946/0x9e0 [ 306.309858][T13916] alloc_skb_with_frags+0xb1/0x580 [ 306.314966][T13916] ? _local_bh_enable+0x30/0x30 [ 306.319800][T13916] sock_alloc_send_pskb+0x87e/0xcc0 [ 306.324983][T13916] ? sock_kzfree_s+0x50/0x50 [ 306.329674][T13916] __ip_append_data+0x1fbd/0x31b0 [ 306.334681][T13916] ? ip_do_fragment+0x2290/0x2290 [ 306.339706][T13916] ? ip_output+0x318/0x400 [ 306.344098][T13916] ? ip_setup_cork+0x810/0x810 [ 306.348835][T13916] ? ipv4_mtu+0x212/0x2c0 [ 306.353144][T13916] ? ip_setup_cork+0x46b/0x810 [ 306.357919][T13916] ip_make_skb+0x1c9/0x4d0 [ 306.362425][T13916] ? ip_do_fragment+0x2290/0x2290 [ 306.367445][T13916] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 306.373093][T13916] ? __sk_dst_check+0x1b0/0x1b0 [ 306.377930][T13916] udp_sendmsg+0x1d1b/0x2e80 [ 306.382522][T13916] ? ip_do_fragment+0x2290/0x2290 [ 306.387532][T13916] ? udp_cmsg_send+0x340/0x340 [ 306.392276][T13916] ? selinux_socket_sendmsg+0x10b/0x320 [ 306.397794][T13916] ? selinux_socket_accept+0x580/0x580 [ 306.403233][T13916] ? rw_copy_check_uvector+0x6b/0x310 [ 306.408587][T13916] ? inet_send_prepare+0x1b7/0x470 [ 306.413680][T13916] ? inet_send_prepare+0x470/0x470 [ 306.418785][T13916] ____sys_sendmsg+0x56f/0x860 [ 306.423530][T13916] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 306.428700][T13916] ? udp_sendmsg+0x75b/0x2e80 [ 306.433350][T13916] ? __sys_sendmmsg+0x46f/0x680 [ 306.438285][T13916] __sys_sendmmsg+0x338/0x680 [ 306.442935][T13916] ? __ia32_sys_sendmsg+0x90/0x90 [ 306.447936][T13916] ? __rcu_read_lock+0x50/0x50 [ 306.452674][T13916] ? __kasan_slab_free+0x1e2/0x220 [ 306.457759][T13916] ? __kasan_slab_free+0x168/0x220 [ 306.462844][T13916] ? slab_free_freelist_hook+0xd0/0x150 [ 306.468560][T13916] ? kmem_cache_free+0xac/0x5c0 [ 306.474603][T13916] ? do_sys_open+0x4a3/0x620 [ 306.479172][T13916] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 306.485215][T13916] ? do_sys_open+0x2fc/0x620 [ 306.489812][T13916] ? proc_fail_nth_write+0x166/0x200 [ 306.495075][T13916] ? proc_fail_nth_read+0x1c0/0x1c0 [ 306.500280][T13916] ? ip4_datagram_release_cb+0x864/0xde0 [ 306.505917][T13916] ? proc_fail_nth_read+0x1c0/0x1c0 [ 306.511087][T13916] ? memset+0x1f/0x40 [ 306.515061][T13916] ? fsnotify+0x13a0/0x1460 [ 306.519595][T13916] ? __kernel_write+0x340/0x340 [ 306.524442][T13916] ? fsnotify+0x13a0/0x1460 [ 306.528948][T13916] ? security_file_permission+0x128/0x300 [ 306.534682][T13916] ? __sb_end_write+0xa4/0xf0 [ 306.539358][T13916] ? vfs_write+0x427/0x4f0 [ 306.543775][T13916] ? ksys_write+0x237/0x2a0 [ 306.548260][T13916] ? __ia32_sys_read+0x80/0x80 [ 306.553048][T13916] __x64_sys_sendmmsg+0x9c/0xb0 [ 306.557892][T13916] do_syscall_64+0xcb/0x150 [ 306.562396][T13916] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 306.568273][T13916] RIP: 0033:0x45de59 [ 306.572237][T13916] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.591845][T13916] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 306.600254][T13916] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 306.608204][T13916] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 306.616185][T13916] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 306.624154][T13916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000011 [ 306.632605][T13916] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 306.646733][T13925] overlayfs: workdir and upperdir must be separate subtrees 13:13:53 executing program 0 (fault-call:6 fault-nth:18): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 306.722972][T13909] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 306.736913][T13911] FAT-fs (loop5): Unrecognized mount option "01777777777777777777777•à_ðþX\¬¨XWT$…SR2#^ÞN‚˜°m»ˆ73¨IÁðxüs^“$4I¤÷Y–ÚŸ¦»/:›0±p¶ø P¢–”dŸhx$" or missing value [ 306.756988][T13931] FAULT_INJECTION: forcing a failure. [ 306.756988][T13931] name failslab, interval 1, probability 0, space 0, times 0 [ 306.770175][T13931] CPU: 0 PID: 13931 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 306.780331][T13931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.790994][T13931] Call Trace: [ 306.794289][T13931] dump_stack+0x1b0/0x21e [ 306.798629][T13931] ? devkmsg_release+0x11c/0x11c [ 306.803714][T13931] ? show_regs_print_info+0x12/0x12 [ 306.808941][T13931] should_fail+0x6fb/0x860 [ 306.813352][T13931] ? setup_fault_attr+0x2b0/0x2b0 [ 306.818362][T13931] ? eth_get_headlen+0x240/0x240 [ 306.823823][T13931] ? sock_def_write_space+0x1b9/0x2a0 [ 306.829209][T13931] ? alloc_skb_with_frags+0xb1/0x580 [ 306.834475][T13931] should_failslab+0x5/0x20 [ 306.838970][T13931] __kmalloc_track_caller+0x5d/0x2b0 [ 306.844236][T13931] ? kmem_cache_alloc+0x1d5/0x250 [ 306.849477][T13931] ? netif_rx+0x157/0x2b0 [ 306.854328][T13931] ? alloc_skb_with_frags+0xb1/0x580 [ 306.860304][T13931] __alloc_skb+0xd1/0x4d0 [ 306.864649][T13931] alloc_skb_with_frags+0xb1/0x580 13:13:53 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400003, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 306.870526][T13931] ? _local_bh_enable+0x30/0x30 [ 306.875904][T13931] sock_alloc_send_pskb+0x87e/0xcc0 [ 306.881692][T13931] ? sock_kzfree_s+0x50/0x50 [ 306.886263][T13931] __ip_append_data+0x1fbd/0x31b0 [ 306.887824][T13925] overlayfs: filesystem on './file1' not supported [ 306.891365][T13931] ? ip_do_fragment+0x2290/0x2290 [ 306.891377][T13931] ? ip_output+0x318/0x400 [ 306.891392][T13931] ? ip_setup_cork+0x810/0x810 [ 306.912172][T13931] ? ipv4_mtu+0x212/0x2c0 [ 306.916478][T13931] ? ip_setup_cork+0x46b/0x810 [ 306.921218][T13931] ip_make_skb+0x1c9/0x4d0 [ 306.925716][T13931] ? ip_do_fragment+0x2290/0x2290 [ 306.930756][T13931] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 306.936370][T13931] ? __sk_dst_check+0x1b0/0x1b0 [ 306.941215][T13931] udp_sendmsg+0x1d1b/0x2e80 [ 306.945785][T13931] ? ip_do_fragment+0x2290/0x2290 [ 306.951231][T13931] ? udp_cmsg_send+0x340/0x340 [ 306.955974][T13931] ? selinux_socket_sendmsg+0x10b/0x320 [ 306.961493][T13931] ? selinux_socket_accept+0x580/0x580 [ 306.967030][T13931] ? rw_copy_check_uvector+0x6b/0x310 [ 306.972379][T13931] ? inet_send_prepare+0x1b7/0x470 [ 306.977463][T13931] ? inet_send_prepare+0x470/0x470 [ 306.982547][T13931] ____sys_sendmsg+0x56f/0x860 [ 306.987287][T13931] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 306.992798][T13931] ? udp_sendmsg+0x75b/0x2e80 [ 306.997451][T13931] ? __sys_sendmmsg+0x46f/0x680 [ 307.003253][T13931] __sys_sendmmsg+0x338/0x680 [ 307.007926][T13931] ? __ia32_sys_sendmsg+0x90/0x90 [ 307.013084][T13931] ? __rcu_read_lock+0x50/0x50 [ 307.018398][T13931] ? __kasan_slab_free+0x1e2/0x220 [ 307.023491][T13931] ? __kasan_slab_free+0x168/0x220 [ 307.028740][T13931] ? slab_free_freelist_hook+0xd0/0x150 [ 307.034262][T13931] ? kmem_cache_free+0xac/0x5c0 [ 307.039190][T13931] ? do_sys_open+0x4a3/0x620 [ 307.043760][T13931] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 307.049996][T13931] ? do_sys_open+0x2fc/0x620 [ 307.054917][T13931] ? proc_fail_nth_write+0x166/0x200 [ 307.060235][T13931] ? proc_fail_nth_read+0x1c0/0x1c0 [ 307.065655][T13931] ? ip4_datagram_release_cb+0x864/0xde0 [ 307.071267][T13931] ? proc_fail_nth_read+0x1c0/0x1c0 [ 307.076449][T13931] ? memset+0x1f/0x40 [ 307.080410][T13931] ? fsnotify+0x13a0/0x1460 [ 307.084921][T13931] ? __kernel_write+0x340/0x340 [ 307.089753][T13931] ? fsnotify+0x13a0/0x1460 [ 307.094232][T13931] ? security_file_permission+0x128/0x300 [ 307.099922][T13931] ? __sb_end_write+0xa4/0xf0 [ 307.104594][T13931] ? vfs_write+0x427/0x4f0 [ 307.108996][T13931] ? ksys_write+0x237/0x2a0 [ 307.113486][T13931] ? __ia32_sys_read+0x80/0x80 [ 307.118222][T13931] __x64_sys_sendmmsg+0x9c/0xb0 [ 307.123056][T13931] do_syscall_64+0xcb/0x150 [ 307.127574][T13931] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 307.133474][T13931] RIP: 0033:0x45de59 [ 307.137361][T13931] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.156965][T13931] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 307.165349][T13931] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 307.173294][T13931] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 307.181240][T13931] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 307.189196][T13931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000012 [ 307.197159][T13931] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:54 executing program 0 (fault-call:6 fault-nth:19): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:54 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x16}, &(0x7f00000000c0)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)) preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000340)=""/202, 0xca}], 0x1, 0x0, 0x0) timer_delete(r1) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000440)={0xc8, r4, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x30, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_NET={0x38, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x992}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4a0}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6831a031}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xffffff7f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x400}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x840}, 0x40015) r5 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r5, 0x82307201, &(0x7f00000001c0)) [ 307.289611][T13939] FAULT_INJECTION: forcing a failure. [ 307.289611][T13939] name failslab, interval 1, probability 0, space 0, times 0 [ 307.304939][T13939] CPU: 1 PID: 13939 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 307.315111][T13939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.325143][T13939] Call Trace: [ 307.328434][T13939] dump_stack+0x1b0/0x21e [ 307.332774][T13939] ? devkmsg_release+0x11c/0x11c [ 307.337746][T13939] ? show_regs_print_info+0x12/0x12 [ 307.342946][T13939] should_fail+0x6fb/0x860 [ 307.347358][T13939] ? setup_fault_attr+0x2b0/0x2b0 [ 307.352417][T13939] ? eth_get_headlen+0x240/0x240 [ 307.357333][T13939] ? sock_def_write_space+0x1b9/0x2a0 [ 307.362923][T13939] ? __alloc_skb+0x88/0x4d0 [ 307.368097][T13939] should_failslab+0x5/0x20 [ 307.373901][T13939] kmem_cache_alloc+0x36/0x250 [ 307.378670][T13939] ? netif_rx+0x157/0x2b0 [ 307.382979][T13939] __alloc_skb+0x88/0x4d0 [ 307.387287][T13939] ? dev_queue_xmit_nit+0x946/0x9e0 [ 307.392546][T13939] alloc_skb_with_frags+0xb1/0x580 [ 307.397698][T13939] ? _local_bh_enable+0x30/0x30 [ 307.402536][T13939] sock_alloc_send_pskb+0x87e/0xcc0 [ 307.407737][T13939] ? sock_kzfree_s+0x50/0x50 [ 307.412321][T13939] __ip_append_data+0x1fbd/0x31b0 [ 307.417333][T13939] ? ip_do_fragment+0x2290/0x2290 [ 307.422354][T13939] ? ip_output+0x318/0x400 [ 307.426751][T13939] ? ip_setup_cork+0x810/0x810 [ 307.431507][T13939] ? ipv4_mtu+0x212/0x2c0 [ 307.435828][T13939] ? ip_setup_cork+0x46b/0x810 [ 307.440565][T13939] ip_make_skb+0x1c9/0x4d0 [ 307.444965][T13939] ? ip_do_fragment+0x2290/0x2290 [ 307.449966][T13939] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 307.455598][T13939] ? __sk_dst_check+0x1b0/0x1b0 [ 307.460432][T13939] udp_sendmsg+0x1d1b/0x2e80 [ 307.465007][T13939] ? ip_do_fragment+0x2290/0x2290 [ 307.470015][T13939] ? udp_cmsg_send+0x340/0x340 [ 307.474769][T13939] ? selinux_socket_sendmsg+0x10b/0x320 [ 307.480319][T13939] ? selinux_socket_accept+0x580/0x580 [ 307.486017][T13939] ? rw_copy_check_uvector+0x6b/0x310 [ 307.491834][T13939] ? inet_send_prepare+0x1b7/0x470 [ 307.497104][T13939] ? inet_send_prepare+0x470/0x470 [ 307.502189][T13939] ____sys_sendmsg+0x56f/0x860 [ 307.506943][T13939] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 307.512136][T13939] ? udp_sendmsg+0x75b/0x2e80 [ 307.516876][T13939] ? __sys_sendmmsg+0x46f/0x680 [ 307.521710][T13939] __sys_sendmmsg+0x338/0x680 [ 307.526376][T13939] ? __ia32_sys_sendmsg+0x90/0x90 [ 307.531634][T13939] ? __rcu_read_lock+0x50/0x50 [ 307.536368][T13939] ? __kasan_slab_free+0x1e2/0x220 [ 307.541467][T13939] ? __kasan_slab_free+0x168/0x220 [ 307.546601][T13939] ? slab_free_freelist_hook+0xd0/0x150 [ 307.552121][T13939] ? kmem_cache_free+0xac/0x5c0 [ 307.556944][T13939] ? do_sys_open+0x4a3/0x620 [ 307.561524][T13939] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 307.567564][T13939] ? do_sys_open+0x2fc/0x620 [ 307.572162][T13939] ? proc_fail_nth_write+0x166/0x200 [ 307.577434][T13939] ? _raw_spin_lock+0x170/0x170 [ 307.582261][T13939] ? proc_fail_nth_read+0x1c0/0x1c0 [ 307.587434][T13939] ? proc_fail_nth_read+0x1c0/0x1c0 [ 307.592607][T13939] ? memset+0x1f/0x40 [ 307.596590][T13939] ? fsnotify+0x13a0/0x1460 [ 307.601082][T13939] ? __kernel_write+0x340/0x340 [ 307.605906][T13939] ? fsnotify+0x13a0/0x1460 [ 307.610406][T13939] ? security_file_permission+0x128/0x300 [ 307.616118][T13939] ? __sb_end_write+0xa4/0xf0 [ 307.621388][T13939] ? vfs_write+0x427/0x4f0 [ 307.625790][T13939] ? ksys_write+0x237/0x2a0 [ 307.630268][T13939] ? __ia32_sys_read+0x80/0x80 [ 307.635005][T13939] __x64_sys_sendmmsg+0x9c/0xb0 [ 307.640985][T13939] do_syscall_64+0xcb/0x150 [ 307.645478][T13939] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 307.651353][T13939] RIP: 0033:0x45de59 [ 307.655219][T13939] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.674797][T13939] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 307.683192][T13939] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 13:13:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x26cf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:13:54 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x8004, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:54 executing program 0 (fault-call:6 fault-nth:20): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 307.691309][T13939] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 307.699259][T13939] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 307.707255][T13939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 307.715564][T13939] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:54 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000100)=ANY=[@ANYRESOCT=0x0]) chdir(&(0x7f0000000200)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) open$dir(&(0x7f0000000140)='./file1\x00', 0x400, 0x20) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(0xffffffffffffff9c, &(0x7f0000000000)=""/28, 0x1c) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) [ 307.783337][T13947] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 307.792559][T13952] FAULT_INJECTION: forcing a failure. [ 307.792559][T13952] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 307.805856][T13952] CPU: 0 PID: 13952 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 307.815979][T13952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.826198][T13952] Call Trace: [ 307.829472][T13952] dump_stack+0x1b0/0x21e [ 307.833777][T13952] ? devkmsg_release+0x11c/0x11c [ 307.838706][T13952] ? show_regs_print_info+0x12/0x12 [ 307.844107][T13952] should_fail+0x6fb/0x860 [ 307.848512][T13952] ? setup_fault_attr+0x2b0/0x2b0 [ 307.853526][T13952] ? ip_finish_output2+0xbdf/0x1810 [ 307.858755][T13952] ? udp_sendmsg+0x1d45/0x2e80 [ 307.863495][T13952] ? __sys_sendmmsg+0x338/0x680 [ 307.868773][T13952] __alloc_pages_nodemask+0x1ee/0x7c0 [ 307.874144][T13952] ? alloc_skb_with_frags+0xb1/0x580 [ 307.879416][T13952] ? sock_alloc_send_pskb+0x87e/0xcc0 [ 307.884763][T13952] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 307.890294][T13952] ? __sys_sendmmsg+0x338/0x680 [ 307.895638][T13952] ? skb_copy_bits+0x7e/0x7c0 [ 307.900291][T13952] alloc_slab_page+0x3a/0x390 [ 307.904942][T13952] new_slab+0x97/0x450 [ 307.908983][T13952] ? should_fail+0x182/0x860 [ 307.913563][T13952] ___slab_alloc+0x2e0/0x450 [ 307.918133][T13952] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 307.923487][T13952] ? skb_clone+0x1b2/0x370 [ 307.927883][T13952] ? skb_clone+0x1b2/0x370 [ 307.933935][T13952] kmem_cache_alloc+0x230/0x250 [ 307.938775][T13952] skb_clone+0x1b2/0x370 [ 307.943041][T13952] dev_queue_xmit_nit+0x279/0x9e0 [ 307.949360][T13952] xmit_one+0x7b/0x460 [ 307.953438][T13952] __dev_queue_xmit+0x1858/0x25d0 [ 307.958450][T13952] ? dev_queue_xmit+0x20/0x20 [ 307.963110][T13952] ? ip_finish_output2+0x936/0x1810 [ 307.968375][T13952] ip_finish_output2+0xbdf/0x1810 [ 307.973395][T13952] ? ip_fragment+0x210/0x210 [ 307.977954][T13952] ? __ip_finish_output+0x4e1/0x6d0 [ 307.983135][T13952] ip_output+0x318/0x400 [ 307.987361][T13952] ? ip_finish_output+0x1d0/0x1d0 [ 307.992360][T13952] ? ip_mc_finish_output+0x3a0/0x3a0 [ 307.997802][T13952] ? udp4_hwcsum+0x26b/0x430 [ 308.002522][T13952] ip_send_skb+0xaa/0x140 [ 308.006828][T13952] udp_send_skb+0x8e9/0x1100 [ 308.011409][T13952] udp_sendmsg+0x1d45/0x2e80 [ 308.015979][T13952] ? ip_do_fragment+0x2290/0x2290 [ 308.021890][T13952] ? udp_cmsg_send+0x340/0x340 [ 308.026645][T13952] ? selinux_socket_sendmsg+0x10b/0x320 [ 308.032185][T13952] ? selinux_socket_accept+0x580/0x580 [ 308.037626][T13952] ? rw_copy_check_uvector+0x6b/0x310 [ 308.042995][T13952] ? inet_send_prepare+0x1b7/0x470 [ 308.048483][T13952] ? inet_send_prepare+0x470/0x470 [ 308.053573][T13952] ____sys_sendmsg+0x56f/0x860 [ 308.058317][T13952] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 308.063526][T13952] ? udp_sendmsg+0x75b/0x2e80 [ 308.068214][T13952] ? __sys_sendmmsg+0x46f/0x680 [ 308.073040][T13952] __sys_sendmmsg+0x338/0x680 [ 308.077690][T13952] ? __ia32_sys_sendmsg+0x90/0x90 [ 308.082735][T13952] ? __rcu_read_lock+0x50/0x50 [ 308.087479][T13952] ? __kasan_slab_free+0x1e2/0x220 [ 308.092572][T13952] ? __kasan_slab_free+0x168/0x220 [ 308.097671][T13952] ? slab_free_freelist_hook+0xd0/0x150 [ 308.103196][T13952] ? kmem_cache_free+0xac/0x5c0 [ 308.108041][T13952] ? do_sys_open+0x4a3/0x620 [ 308.112621][T13952] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 308.118675][T13952] ? do_sys_open+0x2fc/0x620 [ 308.123385][T13952] ? proc_fail_nth_write+0x166/0x200 [ 308.128780][T13952] ? _raw_spin_lock+0x170/0x170 [ 308.133622][T13952] ? proc_fail_nth_read+0x1c0/0x1c0 [ 308.138811][T13952] ? proc_fail_nth_read+0x1c0/0x1c0 [ 308.143986][T13952] ? memset+0x1f/0x40 [ 308.147964][T13952] ? fsnotify+0x13a0/0x1460 [ 308.152445][T13952] ? __kernel_write+0x340/0x340 [ 308.157272][T13952] ? fsnotify+0x13a0/0x1460 [ 308.162059][T13952] ? security_file_permission+0x128/0x300 [ 308.167758][T13952] ? __sb_end_write+0xa4/0xf0 [ 308.172442][T13952] ? vfs_write+0x427/0x4f0 [ 308.177062][T13952] ? ksys_write+0x237/0x2a0 [ 308.181538][T13952] ? __ia32_sys_read+0x80/0x80 [ 308.186275][T13952] __x64_sys_sendmmsg+0x9c/0xb0 [ 308.191129][T13952] do_syscall_64+0xcb/0x150 [ 308.195617][T13952] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 308.201492][T13952] RIP: 0033:0x45de59 [ 308.205378][T13952] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.224980][T13952] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 308.233368][T13952] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 308.241353][T13952] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 308.249331][T13952] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 308.257293][T13952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 308.265246][T13952] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0xb400, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 308.303136][T13951] FAT-fs (loop3): Unrecognized mount option "00000000000000000000000" or missing value [ 308.312981][T13946] FAT-fs (loop5): Unrecognized mount option "" or missing value 13:13:55 executing program 0 (fault-call:6 fault-nth:21): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:55 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400004, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:13:55 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000240)='./file1\x00', 0x5e, 0x2, &(0x7f0000000380)=[{&(0x7f0000000280)="d025a35979005c711a01b64d4242ba32fd856613dbd015827a02f664f07ec407335739f9d2bf05fc14848d99d3a95fbf3495977129d67ad132f3d25a9cd141b3ef487e7e9d0bba65f7982616db468a4deffaa8850225293081d22fe74c8ce5b2ab3304e3f41c0d3b802caec45f8fbb936c99abd263aed2828940cc57fce43b90b69325e2c660b85f085f067fa98ded96b40e5f5b9fcf1ca04bdd7dbfc16e358854b3e264eee79093f6dde5510a232a475e966c7e4b3c12a4d4ef4040fb86fde5faef93", 0xc3, 0x2}, {&(0x7f0000000400)="d18a49f7e09ae7dc03d344a60acb6cdd88787e440fc6c40e18f3ff23cf7880cb9a93cfc4f8004f51f8285f94a035e49ba4be41506913640ff46f6d640901870921a55c65bcf80314711c11d02b0c19ea5124085ba3900ca81210b32b00ec2d76ab", 0x61, 0x2}], 0x80000, &(0x7f0000000480)=ANY=[]) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') ioctl$KDADDIO(r1, 0x4b34, 0x8) r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = getpid() r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r5, 0xc0505405, &(0x7f0000000500)={{0xffffffffffffffff, 0x3, 0x7, 0x0, 0x1}, 0x0, 0xf79, 0x9}) capset(&(0x7f0000000100)={0x20071026, r3}, &(0x7f0000000140)={0x0, 0xffffffff, 0x1000, 0x3, 0x6, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket(0x27, 0x3, 0x5) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) [ 308.398306][T13963] overlayfs: filesystem on './file1' not supported [ 308.411680][T13959] overlayfs: filesystem on './file1' not supported [ 308.429193][T13951] FAT-fs (loop3): Unrecognized mount option "00000000000000000000000" or missing value [ 308.467966][T13971] FAULT_INJECTION: forcing a failure. [ 308.467966][T13971] name failslab, interval 1, probability 0, space 0, times 0 [ 308.480982][T13971] CPU: 1 PID: 13971 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 308.491142][T13971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.501199][T13971] Call Trace: [ 308.504496][T13971] dump_stack+0x1b0/0x21e [ 308.508832][T13971] ? devkmsg_release+0x11c/0x11c [ 308.513773][T13971] ? show_regs_print_info+0x12/0x12 [ 308.518970][T13971] should_fail+0x6fb/0x860 [ 308.523385][T13971] ? setup_fault_attr+0x2b0/0x2b0 [ 308.528406][T13971] ? eth_get_headlen+0x240/0x240 [ 308.533343][T13971] ? sock_def_write_space+0x1b9/0x2a0 [ 308.538716][T13971] ? alloc_skb_with_frags+0xb1/0x580 [ 308.544004][T13971] should_failslab+0x5/0x20 [ 308.548496][T13971] __kmalloc_track_caller+0x5d/0x2b0 [ 308.553759][T13971] ? kmem_cache_alloc+0x1d5/0x250 [ 308.558778][T13971] ? netif_rx+0x157/0x2b0 [ 308.563214][T13971] ? alloc_skb_with_frags+0xb1/0x580 [ 308.568485][T13971] __alloc_skb+0xd1/0x4d0 [ 308.572806][T13971] alloc_skb_with_frags+0xb1/0x580 [ 308.577912][T13971] ? _local_bh_enable+0x30/0x30 [ 308.582733][T13971] sock_alloc_send_pskb+0x87e/0xcc0 [ 308.587910][T13971] ? sock_kzfree_s+0x50/0x50 [ 308.592482][T13971] __ip_append_data+0x1fbd/0x31b0 [ 308.597553][T13971] ? ip_do_fragment+0x2290/0x2290 [ 308.602561][T13971] ? ip_output+0x318/0x400 [ 308.606975][T13971] ? ip_setup_cork+0x810/0x810 [ 308.611729][T13971] ? ipv4_mtu+0x212/0x2c0 [ 308.616035][T13971] ? ip_setup_cork+0x46b/0x810 [ 308.620792][T13971] ip_make_skb+0x1c9/0x4d0 [ 308.625200][T13971] ? ip_do_fragment+0x2290/0x2290 [ 308.630227][T13971] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 308.635915][T13971] ? __sk_dst_check+0x1b0/0x1b0 [ 308.640785][T13971] udp_sendmsg+0x1d1b/0x2e80 [ 308.645372][T13971] ? ip_do_fragment+0x2290/0x2290 [ 308.650377][T13971] ? udp_cmsg_send+0x340/0x340 [ 308.655173][T13971] ? selinux_socket_sendmsg+0x10b/0x320 [ 308.660717][T13971] ? selinux_socket_accept+0x580/0x580 [ 308.666168][T13971] ? rw_copy_check_uvector+0x6b/0x310 [ 308.671601][T13971] ? inet_send_prepare+0x1b7/0x470 [ 308.676762][T13971] ? inet_send_prepare+0x470/0x470 [ 308.681861][T13971] ____sys_sendmsg+0x56f/0x860 [ 308.686708][T13971] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 308.691888][T13971] ? udp_sendmsg+0x75b/0x2e80 [ 308.696565][T13971] ? __sys_sendmmsg+0x46f/0x680 [ 308.701420][T13971] __sys_sendmmsg+0x338/0x680 [ 308.706145][T13971] ? __ia32_sys_sendmsg+0x90/0x90 [ 308.711149][T13971] ? __rcu_read_lock+0x50/0x50 [ 308.715925][T13971] ? __kasan_slab_free+0x1e2/0x220 [ 308.721037][T13971] ? __kasan_slab_free+0x168/0x220 [ 308.726130][T13971] ? slab_free_freelist_hook+0xd0/0x150 [ 308.731716][T13971] ? kmem_cache_free+0xac/0x5c0 [ 308.736560][T13971] ? do_sys_open+0x4a3/0x620 [ 308.741143][T13971] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 308.747184][T13971] ? do_sys_open+0x2fc/0x620 [ 308.751763][T13971] ? proc_fail_nth_write+0x166/0x200 [ 308.757170][T13971] ? proc_fail_nth_read+0x1c0/0x1c0 [ 308.762348][T13971] ? ip4_datagram_release_cb+0x864/0xde0 [ 308.767971][T13971] ? proc_fail_nth_read+0x1c0/0x1c0 [ 308.773164][T13971] ? memset+0x1f/0x40 [ 308.777136][T13971] ? fsnotify+0x13a0/0x1460 [ 308.781616][T13971] ? __kernel_write+0x340/0x340 [ 308.786438][T13971] ? fsnotify+0x13a0/0x1460 [ 308.790934][T13971] ? security_file_permission+0x128/0x300 [ 308.796623][T13971] ? __sb_end_write+0xa4/0xf0 [ 308.801291][T13971] ? vfs_write+0x427/0x4f0 [ 308.805873][T13971] ? ksys_write+0x237/0x2a0 [ 308.810365][T13971] ? __ia32_sys_read+0x80/0x80 [ 308.815113][T13971] __x64_sys_sendmmsg+0x9c/0xb0 [ 308.819933][T13971] do_syscall_64+0xcb/0x150 [ 308.824415][T13971] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 308.830284][T13971] RIP: 0033:0x45de59 [ 308.834152][T13971] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.853752][T13971] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 308.862137][T13971] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 308.870102][T13971] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 308.878053][T13971] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 308.886008][T13971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 308.893958][T13971] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:55 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xc000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:55 executing program 0 (fault-call:6 fault-nth:22): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:55 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000200)='./file1\x00', 0x10001, 0x0, 0x0, 0x402, &(0x7f0000000240)={[{@utf8no='utf8=0'}, {@utf8='utf8=1'}, {@rodir='rodir'}, {@utf8='utf8=1'}, {@utf8no='utf8=0'}, {@uni_xlateno='uni_xlate=0'}, {@uni_xlate='uni_xlate=1'}, {@uni_xlateno='uni_xlate=0'}], [{@audit='audit'}, {@audit='audit'}, {@euid_lt={'euid<', r0}}, {@subj_role={'subj_role'}}, {@seclabel='seclabel'}, {@measure='measure'}]}) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_mount_image$f2fs(&(0x7f0000001680)='f2fs\x00', &(0x7f00000016c0)='./file1\x00', 0x5, 0x5, &(0x7f0000001ac0)=[{&(0x7f0000001700)="38cdde5d1266c202aa30442dbc598dc51e6b50164c792133483f0d5e88e191117a11cff2fb4de5ba67a4e81b4e876ad2e8822d3cb8eaf4d645fc4ff37b88d10bcf2d1cec3be4e5c60499668b6089422a441a078684e0b8f1fcfafbe1ed24303928c4467d7a47113ed5ae7cbe3886398d93b2c482f52b01c3e6b63cf5a2ce2f6175bdc5c2e2862f26c7851ee75bd40d120fe1ae4ec61ab92505af11a436042f8c6b30300527af9c54b8905d181ec5251aea0c1890586f266710808df12da52218259e99d10bb93943667697cae80ebcef43e845e7a79d175668c8e257c0fb788e2c681e17267eb16e279ba3046fb933fba9600a25a7710a8d", 0xf8, 0x80000000}, {&(0x7f0000001800)="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", 0xfd, 0x177}, {&(0x7f0000001900)="c295c13b7c1009255cb4f874c738b0a91c6625e90423b6fe14ce194250a8ea1503d497e1a1f1eb16cc75dbc6f1861defd6f48744ca508a0df74212d5b53c81f10bcd11a49cd350959185888e6d47131fa3df4ba860a5e132d1f0041ea3c0558adc0f6d7bc244c726aeed0619b14f3c4cc51a86ecdf191ee9a555fce2737c178c30d75d6cba7629356d8343d9baf9840d5d0168ef65871d158727cc73", 0x9c, 0x7}, {&(0x7f00000019c0)="58ff09deaf558bbce8753a58353d481ed10c7f0ad8d1bd14cdd57394fff78d6d67804eb06c", 0x25, 0x1}, {&(0x7f0000001a00)="a9969579cf46a94fdb431a4fe4c232ae63808435e7f39680f8e9b43b840153388a404bbf591aaef041b82ae9fac0d2a849e069a158b8188e5e94f4f288d9996ff51d5087efe19f282ec4f685032e017b1720b4310ef8c013fae759b6c1e067fe53dee52c58dc1a7f187feb8d0144a2f5448a79f8f6fefd4b336e0167b946c0c929bb7739b8c013a44d843128b95b14e0072865697aa7c6468524aca77ad06832bc87279ac00ef4449c5dea200ac209b9b79ca5ff", 0xb4, 0xb4}], 0x30080, &(0x7f0000001b40)={[{@norecovery='norecovery'}, {@background_gc_on='background_gc=on'}, {@nolazytime='nolazytime'}, {@jqfmt_vfsv1='jqfmt=vfsv1'}, {@alloc_mode_def='alloc_mode=default'}, {@fsync_mode_strict='fsync_mode=strict'}, {@inline_dentry='inline_dentry'}], [{@fsmagic={'fsmagic', 0x3d, 0x6}}, {@subj_type={'subj_type', 0x3d, 'measure'}}, {@subj_type={'subj_type', 0x3d, '*\''}}, {@fsmagic={'fsmagic', 0x3d, 0x8001}}]}) ioctl$FIBMAP(r3, 0x1, &(0x7f0000001c00)=0x4) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000340)) getdents(r1, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r1, 0x82307201, &(0x7f00000001c0)) [ 308.929003][T13970] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 308.980511][T13981] FAULT_INJECTION: forcing a failure. [ 308.980511][T13981] name failslab, interval 1, probability 0, space 0, times 0 [ 308.993171][T13981] CPU: 1 PID: 13981 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 309.003554][T13981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.013582][T13981] Call Trace: [ 309.016850][T13981] dump_stack+0x1b0/0x21e [ 309.021160][T13981] ? devkmsg_release+0x11c/0x11c [ 309.026092][T13981] ? show_regs_print_info+0x12/0x12 [ 309.031263][T13981] ? _raw_spin_lock+0xa1/0x170 [ 309.036016][T13981] should_fail+0x6fb/0x860 [ 309.040420][T13981] ? setup_fault_attr+0x2b0/0x2b0 [ 309.045439][T13981] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 309.050803][T13981] ? _raw_spin_unlock+0x5/0x20 [ 309.055546][T13981] ? skb_clone+0x1b2/0x370 [ 309.059933][T13981] should_failslab+0x5/0x20 [ 309.064408][T13981] kmem_cache_alloc+0x36/0x250 [ 309.069231][T13981] skb_clone+0x1b2/0x370 [ 309.073459][T13981] dev_queue_xmit_nit+0x279/0x9e0 [ 309.078497][T13981] xmit_one+0x7b/0x460 [ 309.082549][T13981] __dev_queue_xmit+0x1858/0x25d0 [ 309.087566][T13981] ? dev_queue_xmit+0x20/0x20 [ 309.092235][T13981] ? ip_finish_output2+0x936/0x1810 [ 309.097407][T13981] ip_finish_output2+0xbdf/0x1810 [ 309.102416][T13981] ? ip_fragment+0x210/0x210 [ 309.106989][T13981] ? __ip_finish_output+0x4e1/0x6d0 [ 309.112157][T13981] ip_output+0x318/0x400 [ 309.116395][T13981] ? ip_finish_output+0x1d0/0x1d0 [ 309.121393][T13981] ? ip_mc_finish_output+0x3a0/0x3a0 [ 309.126656][T13981] ? udp4_hwcsum+0x26b/0x430 [ 309.131024][T13984] capability: warning: `syz-executor.5' uses deprecated v2 capabilities in a way that may be insecure [ 309.131253][T13981] ip_send_skb+0xaa/0x140 [ 309.146507][T13981] udp_send_skb+0x8e9/0x1100 [ 309.151114][T13981] udp_sendmsg+0x1d45/0x2e80 [ 309.155715][T13981] ? ip_do_fragment+0x2290/0x2290 [ 309.160759][T13981] ? udp_cmsg_send+0x340/0x340 [ 309.165514][T13981] ? selinux_socket_sendmsg+0x10b/0x320 [ 309.171032][T13981] ? selinux_socket_accept+0x580/0x580 [ 309.176463][T13981] ? rw_copy_check_uvector+0x6b/0x310 [ 309.181900][T13981] ? inet_send_prepare+0x1b7/0x470 [ 309.187080][T13981] ? inet_send_prepare+0x470/0x470 [ 309.192192][T13981] ____sys_sendmsg+0x56f/0x860 [ 309.196951][T13981] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 309.202128][T13981] ? udp_sendmsg+0x75b/0x2e80 [ 309.206794][T13981] ? __sys_sendmmsg+0x46f/0x680 [ 309.211638][T13981] __sys_sendmmsg+0x338/0x680 [ 309.216296][T13981] ? __ia32_sys_sendmsg+0x90/0x90 [ 309.221295][T13981] ? __rcu_read_lock+0x50/0x50 [ 309.226262][T13981] ? __kasan_slab_free+0x1e2/0x220 [ 309.231355][T13981] ? __kasan_slab_free+0x168/0x220 [ 309.236492][T13981] ? slab_free_freelist_hook+0xd0/0x150 [ 309.242022][T13981] ? kmem_cache_free+0xac/0x5c0 [ 309.246853][T13981] ? do_sys_open+0x4a3/0x620 [ 309.251432][T13981] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 309.257485][T13981] ? do_sys_open+0x2fc/0x620 [ 309.262371][T13981] ? proc_fail_nth_write+0x166/0x200 [ 309.268098][T13981] ? proc_fail_nth_read+0x1c0/0x1c0 [ 309.273423][T13981] ? ip4_datagram_release_cb+0x864/0xde0 [ 309.279044][T13981] ? proc_fail_nth_read+0x1c0/0x1c0 [ 309.284217][T13981] ? memset+0x1f/0x40 [ 309.288187][T13981] ? fsnotify+0x13a0/0x1460 [ 309.292681][T13981] ? __kernel_write+0x340/0x340 [ 309.297511][T13981] ? fsnotify+0x13a0/0x1460 [ 309.302008][T13981] ? security_file_permission+0x128/0x300 [ 309.307716][T13981] ? __sb_end_write+0xa4/0xf0 [ 309.312390][T13981] ? vfs_write+0x427/0x4f0 [ 309.316797][T13981] ? ksys_write+0x237/0x2a0 [ 309.321289][T13981] ? __ia32_sys_read+0x80/0x80 [ 309.326033][T13981] __x64_sys_sendmmsg+0x9c/0xb0 [ 309.330862][T13981] do_syscall_64+0xcb/0x150 [ 309.335445][T13981] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 309.341325][T13981] RIP: 0033:0x45de59 [ 309.345211][T13981] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.364897][T13981] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 309.373294][T13981] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 309.381241][T13981] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 309.389995][T13981] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 309.397951][T13981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 309.406163][T13981] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 309.426861][T13986] overlayfs: failed to resolve './file1': -2 13:13:56 executing program 0 (fault-call:6 fault-nth:23): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x40000, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 309.547141][T13994] FAULT_INJECTION: forcing a failure. [ 309.547141][T13994] name failslab, interval 1, probability 0, space 0, times 0 [ 309.559846][T13994] CPU: 1 PID: 13994 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 309.569972][T13994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.580020][T13994] Call Trace: [ 309.583314][T13994] dump_stack+0x1b0/0x21e [ 309.587625][T13994] ? devkmsg_release+0x11c/0x11c [ 309.592545][T13994] ? show_regs_print_info+0x12/0x12 [ 309.597721][T13994] should_fail+0x6fb/0x860 [ 309.602150][T13994] ? setup_fault_attr+0x2b0/0x2b0 [ 309.607160][T13994] ? eth_get_headlen+0x240/0x240 [ 309.612075][T13994] ? sock_def_write_space+0x1b9/0x2a0 [ 309.617425][T13994] ? __alloc_skb+0x88/0x4d0 [ 309.621905][T13994] should_failslab+0x5/0x20 [ 309.626390][T13994] kmem_cache_alloc+0x36/0x250 [ 309.631146][T13994] ? netif_rx+0x157/0x2b0 [ 309.635471][T13994] __alloc_skb+0x88/0x4d0 [ 309.639796][T13994] ? dev_queue_xmit_nit+0x946/0x9e0 [ 309.645049][T13994] alloc_skb_with_frags+0xb1/0x580 [ 309.650151][T13994] ? _local_bh_enable+0x30/0x30 [ 309.654979][T13994] sock_alloc_send_pskb+0x87e/0xcc0 [ 309.660183][T13994] ? sock_kzfree_s+0x50/0x50 [ 309.664910][T13994] __ip_append_data+0x1fbd/0x31b0 [ 309.669935][T13994] ? ip_do_fragment+0x2290/0x2290 [ 309.674937][T13994] ? ip_output+0x318/0x400 [ 309.679360][T13994] ? ip_setup_cork+0x810/0x810 [ 309.684102][T13994] ? ipv4_mtu+0x212/0x2c0 [ 309.688410][T13994] ? ip_setup_cork+0x46b/0x810 [ 309.693167][T13994] ip_make_skb+0x1c9/0x4d0 [ 309.697562][T13994] ? ip_do_fragment+0x2290/0x2290 [ 309.704917][T13994] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 309.710544][T13994] ? __sk_dst_check+0x1b0/0x1b0 [ 309.715390][T13994] udp_sendmsg+0x1d1b/0x2e80 [ 309.719965][T13994] ? ip_do_fragment+0x2290/0x2290 [ 309.724966][T13994] ? udp_cmsg_send+0x340/0x340 [ 309.729738][T13994] ? selinux_socket_sendmsg+0x10b/0x320 [ 309.735290][T13994] ? selinux_socket_accept+0x580/0x580 [ 309.740752][T13994] ? rw_copy_check_uvector+0x6b/0x310 [ 309.746137][T13994] ? inet_send_prepare+0x1b7/0x470 [ 309.751230][T13994] ? inet_send_prepare+0x470/0x470 [ 309.756369][T13994] ____sys_sendmsg+0x56f/0x860 [ 309.761131][T13994] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 309.766317][T13994] ? udp_sendmsg+0x75b/0x2e80 [ 309.770975][T13994] ? __sys_sendmmsg+0x46f/0x680 [ 309.775820][T13994] __sys_sendmmsg+0x338/0x680 [ 309.780481][T13994] ? __ia32_sys_sendmsg+0x90/0x90 [ 309.785575][T13994] ? __rcu_read_lock+0x50/0x50 [ 309.790322][T13994] ? __kasan_slab_free+0x1e2/0x220 [ 309.795434][T13994] ? __kasan_slab_free+0x168/0x220 [ 309.800525][T13994] ? slab_free_freelist_hook+0xd0/0x150 [ 309.806069][T13994] ? kmem_cache_free+0xac/0x5c0 [ 309.810899][T13994] ? do_sys_open+0x4a3/0x620 [ 309.815516][T13994] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 309.821564][T13994] ? do_sys_open+0x2fc/0x620 [ 309.826179][T13994] ? proc_fail_nth_write+0x166/0x200 [ 309.831441][T13994] ? _raw_spin_lock+0x170/0x170 [ 309.836297][T13994] ? proc_fail_nth_read+0x1c0/0x1c0 [ 309.841477][T13994] ? proc_fail_nth_read+0x1c0/0x1c0 [ 309.846661][T13994] ? memset+0x1f/0x40 [ 309.850654][T13994] ? fsnotify+0x13a0/0x1460 [ 309.855150][T13994] ? __kernel_write+0x340/0x340 [ 309.860002][T13994] ? fsnotify+0x13a0/0x1460 [ 309.864484][T13994] ? security_file_permission+0x128/0x300 [ 309.870195][T13994] ? __sb_end_write+0xa4/0xf0 [ 309.874845][T13994] ? vfs_write+0x427/0x4f0 [ 309.879244][T13994] ? ksys_write+0x237/0x2a0 [ 309.883723][T13994] ? __ia32_sys_read+0x80/0x80 [ 309.888472][T13994] __x64_sys_sendmmsg+0x9c/0xb0 [ 309.893312][T13994] do_syscall_64+0xcb/0x150 [ 309.897810][T13994] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 309.903687][T13994] RIP: 0033:0x45de59 [ 309.907575][T13994] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.927169][T13994] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 309.935561][T13994] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 309.943514][T13994] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 309.951458][T13994] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 309.959416][T13994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 309.967362][T13994] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 309.985345][T13986] overlayfs: filesystem on './file1' not supported 13:13:56 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xcb26, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:56 executing program 0 (fault-call:6 fault-nth:24): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400005, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:13:56 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NL80211_CMD_GET_INTERFACE(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x28, 0x0, 0x300, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x2, 0xa}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x200480c0}, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) [ 310.105312][T14008] FAULT_INJECTION: forcing a failure. [ 310.105312][T14008] name failslab, interval 1, probability 0, space 0, times 0 [ 310.118248][T14008] CPU: 1 PID: 14008 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 310.128399][T14008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.138466][T14008] Call Trace: [ 310.141792][T14008] dump_stack+0x1b0/0x21e [ 310.146121][T14008] ? devkmsg_release+0x11c/0x11c [ 310.151054][T14008] ? show_regs_print_info+0x12/0x12 [ 310.156255][T14008] should_fail+0x6fb/0x860 [ 310.160706][T14008] ? setup_fault_attr+0x2b0/0x2b0 [ 310.166074][T14008] ? eth_get_headlen+0x240/0x240 [ 310.171003][T14008] ? sock_def_write_space+0x1b9/0x2a0 [ 310.176374][T14008] ? alloc_skb_with_frags+0xb1/0x580 [ 310.181659][T14008] should_failslab+0x5/0x20 [ 310.186163][T14008] __kmalloc_track_caller+0x5d/0x2b0 [ 310.191451][T14008] ? kmem_cache_alloc+0x1d5/0x250 [ 310.196481][T14008] ? netif_rx+0x157/0x2b0 [ 310.200817][T14008] ? alloc_skb_with_frags+0xb1/0x580 [ 310.206106][T14008] __alloc_skb+0xd1/0x4d0 [ 310.210448][T14008] alloc_skb_with_frags+0xb1/0x580 [ 310.215746][T14008] ? _local_bh_enable+0x30/0x30 [ 310.220598][T14008] sock_alloc_send_pskb+0x87e/0xcc0 [ 310.225806][T14008] ? sock_kzfree_s+0x50/0x50 [ 310.230413][T14008] __ip_append_data+0x1fbd/0x31b0 [ 310.235449][T14008] ? ip_do_fragment+0x2290/0x2290 [ 310.240477][T14008] ? ip_output+0x318/0x400 [ 310.244900][T14008] ? ip_setup_cork+0x810/0x810 [ 310.249672][T14008] ? ipv4_mtu+0x212/0x2c0 [ 310.254013][T14008] ? ip_setup_cork+0x46b/0x810 [ 310.258775][T14008] ip_make_skb+0x1c9/0x4d0 [ 310.263194][T14008] ? ip_do_fragment+0x2290/0x2290 [ 310.268310][T14008] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 310.273941][T14008] ? __sk_dst_check+0x1b0/0x1b0 [ 310.278789][T14008] udp_sendmsg+0x1d1b/0x2e80 [ 310.283386][T14008] ? ip_do_fragment+0x2290/0x2290 [ 310.288408][T14008] ? udp_cmsg_send+0x340/0x340 [ 310.293164][T14008] ? selinux_socket_sendmsg+0x10b/0x320 [ 310.298708][T14008] ? selinux_socket_accept+0x580/0x580 [ 310.304169][T14008] ? rw_copy_check_uvector+0x6b/0x310 [ 310.309543][T14008] ? inet_send_prepare+0x1b7/0x470 [ 310.314669][T14008] ? inet_send_prepare+0x470/0x470 [ 310.319776][T14008] ____sys_sendmsg+0x56f/0x860 [ 310.324546][T14008] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 310.329742][T14008] ? udp_sendmsg+0x75b/0x2e80 [ 310.334412][T14008] ? __sys_sendmmsg+0x46f/0x680 [ 310.339260][T14008] __sys_sendmmsg+0x338/0x680 [ 310.343955][T14008] ? __ia32_sys_sendmsg+0x90/0x90 [ 310.348979][T14008] ? __rcu_read_lock+0x50/0x50 [ 310.353745][T14008] ? __kasan_slab_free+0x1e2/0x220 [ 310.358856][T14008] ? __kasan_slab_free+0x168/0x220 [ 310.363973][T14008] ? slab_free_freelist_hook+0xd0/0x150 [ 310.369524][T14008] ? kmem_cache_free+0xac/0x5c0 [ 310.374370][T14008] ? do_sys_open+0x4a3/0x620 [ 310.378983][T14008] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 310.385042][T14008] ? do_sys_open+0x2fc/0x620 [ 310.389628][T14008] ? proc_fail_nth_write+0x166/0x200 [ 310.394925][T14008] ? proc_fail_nth_read+0x1c0/0x1c0 [ 310.400152][T14008] ? ip4_datagram_release_cb+0x864/0xde0 [ 310.405783][T14008] ? proc_fail_nth_read+0x1c0/0x1c0 [ 310.410981][T14008] ? memset+0x1f/0x40 [ 310.414953][T14008] ? fsnotify+0x13a0/0x1460 [ 310.419453][T14008] ? __kernel_write+0x340/0x340 [ 310.424299][T14008] ? fsnotify+0x13a0/0x1460 [ 310.428802][T14008] ? security_file_permission+0x128/0x300 [ 310.434525][T14008] ? __sb_end_write+0xa4/0xf0 [ 310.439210][T14008] ? vfs_write+0x427/0x4f0 [ 310.443649][T14008] ? ksys_write+0x237/0x2a0 [ 310.448150][T14008] ? __ia32_sys_read+0x80/0x80 [ 310.452932][T14008] __x64_sys_sendmmsg+0x9c/0xb0 [ 310.457788][T14008] do_syscall_64+0xcb/0x150 [ 310.462297][T14008] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 310.468191][T14008] RIP: 0033:0x45de59 [ 310.472089][T14008] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.492243][T14008] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 310.500670][T14008] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 310.508662][T14008] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 310.516633][T14008] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 310.524611][T14008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000018 [ 310.532593][T14008] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:57 executing program 0 (fault-call:6 fault-nth:25): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 310.562826][T14010] overlayfs: failed to resolve './file1': -2 13:13:57 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xf504, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 310.718494][T14010] overlayfs: filesystem on './file1' not supported [ 310.786646][T14021] FAULT_INJECTION: forcing a failure. [ 310.786646][T14021] name failslab, interval 1, probability 0, space 0, times 0 [ 310.799309][T14021] CPU: 0 PID: 14021 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 310.809458][T14021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.819518][T14021] Call Trace: [ 310.822810][T14021] dump_stack+0x1b0/0x21e [ 310.827135][T14021] ? devkmsg_release+0x11c/0x11c [ 310.832095][T14021] ? show_regs_print_info+0x12/0x12 [ 310.837303][T14021] ? __copy_skb_header+0x429/0x560 [ 310.842422][T14021] should_fail+0x6fb/0x860 [ 310.846843][T14021] ? setup_fault_attr+0x2b0/0x2b0 [ 310.851866][T14021] ? eth_type_trans+0x2a3/0x680 [ 310.856725][T14021] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 310.862108][T14021] ? skb_clone+0x1b2/0x370 [ 310.866528][T14021] should_failslab+0x5/0x20 [ 310.871032][T14021] kmem_cache_alloc+0x36/0x250 [ 310.875790][T14021] skb_clone+0x1b2/0x370 [ 310.880029][T14021] dev_queue_xmit_nit+0x279/0x9e0 [ 310.885052][T14021] xmit_one+0x7b/0x460 [ 310.889115][T14021] __dev_queue_xmit+0x1858/0x25d0 [ 310.894142][T14021] ? dev_queue_xmit+0x20/0x20 [ 310.898857][T14021] ? ip_finish_output2+0x936/0x1810 [ 310.904052][T14021] ip_finish_output2+0xbdf/0x1810 [ 310.909082][T14021] ? ip_fragment+0x210/0x210 [ 310.913676][T14021] ? __ip_finish_output+0x4e1/0x6d0 [ 310.918870][T14021] ip_output+0x318/0x400 [ 310.923113][T14021] ? ip_finish_output+0x1d0/0x1d0 [ 310.928176][T14021] ? ip_mc_finish_output+0x3a0/0x3a0 [ 310.933452][T14021] ? udp4_hwcsum+0x26b/0x430 [ 310.938036][T14021] ip_send_skb+0xaa/0x140 [ 310.942360][T14021] udp_send_skb+0x8e9/0x1100 [ 310.946945][T14021] udp_sendmsg+0x1d45/0x2e80 [ 310.951535][T14021] ? ip_do_fragment+0x2290/0x2290 [ 310.956565][T14021] ? udp_cmsg_send+0x340/0x340 [ 310.961324][T14021] ? selinux_socket_sendmsg+0x10b/0x320 [ 310.966863][T14021] ? selinux_socket_accept+0x580/0x580 [ 310.972353][T14021] ? rw_copy_check_uvector+0x6b/0x310 [ 310.977754][T14021] ? inet_send_prepare+0x1b7/0x470 13:13:57 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000480)={&(0x7f0000000580)={0x88, 0x0, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x4698}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x6}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x200}}]}, 0x88}, 0x1, 0x0, 0x0, 0x2000c891}, 0xc000) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, 0x0, 0x8, 0x70bd25, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x1}, {0x6, 0x11, 0x3}}]}, 0x48}, 0x1, 0x0, 0x0, 0x44}, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)={0x200, 0x0, 0x4, 0x70bd25, 0x25dfdbfc, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x4}, {0xc, 0x90, 0x80000000}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc, 0x90, 0x4}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}, {0xc, 0x8f, 0x8}, {0xc, 0x90, 0x6}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x3}, {0xc}, {0xc}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc, 0x8f, 0x8046}, {0xc, 0x90, 0x5d47}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}, {0xc, 0x8f, 0x20}, {0xc}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc, 0x8f, 0xbb}, {0xc, 0x90, 0x2}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x3}, {0xc}, {0xc, 0x90, 0x7}}]}, 0x200}, 0x1, 0x0, 0x0, 0xc881}, 0x20000004) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x84, 0x0, 0x0, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}, {0x6, 0x11, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x3}, {0x6}}]}, 0x84}, 0x1, 0x0, 0x0, 0x40}, 0x81) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)={0x180, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x7ff}, {0x6, 0x11, 0xffff}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}, {0x6, 0x11, 0x9}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0xfffffff7}, {0x6, 0x11, 0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x3}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfff}, {0x6, 0x11, 0xf52}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x2}, {0x6}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x400}, {0x6, 0x11, 0xaa4}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x10, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x1}, {0x6, 0x11, 0x100}}]}, 0x180}, 0x1, 0x0, 0x0, 0x50844}, 0x4) ioctl$EVIOCGKEYCODE(r5, 0x80084504, &(0x7f0000000200)=""/203) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f0000000100)={0x2, 'batadv_slave_1\x00', {0x1000}, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) [ 310.982872][T14021] ? inet_send_prepare+0x470/0x470 [ 310.987987][T14021] ____sys_sendmsg+0x56f/0x860 [ 310.992754][T14021] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 310.997954][T14021] ? udp_sendmsg+0x75b/0x2e80 [ 311.002626][T14021] ? __sys_sendmmsg+0x46f/0x680 [ 311.007472][T14021] __sys_sendmmsg+0x338/0x680 [ 311.012147][T14021] ? __ia32_sys_sendmsg+0x90/0x90 [ 311.017182][T14021] ? __rcu_read_lock+0x50/0x50 [ 311.021945][T14021] ? __kasan_slab_free+0x1e2/0x220 [ 311.027059][T14021] ? __kasan_slab_free+0x168/0x220 [ 311.032193][T14021] ? slab_free_freelist_hook+0xd0/0x150 [ 311.037750][T14021] ? kmem_cache_free+0xac/0x5c0 [ 311.042635][T14021] ? do_sys_open+0x4a3/0x620 [ 311.047232][T14021] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 311.053302][T14021] ? do_sys_open+0x2fc/0x620 [ 311.057927][T14021] ? proc_fail_nth_write+0x166/0x200 [ 311.063225][T14021] ? proc_fail_nth_read+0x1c0/0x1c0 [ 311.068435][T14021] ? ip4_datagram_release_cb+0x864/0xde0 [ 311.074082][T14021] ? proc_fail_nth_read+0x1c0/0x1c0 [ 311.079287][T14021] ? memset+0x1f/0x40 [ 311.083269][T14021] ? fsnotify+0x13a0/0x1460 13:13:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="040000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 311.087775][T14021] ? __kernel_write+0x340/0x340 [ 311.092624][T14021] ? fsnotify+0x13a0/0x1460 [ 311.097129][T14021] ? security_file_permission+0x128/0x300 [ 311.102850][T14021] ? __sb_end_write+0xa4/0xf0 [ 311.107533][T14021] ? vfs_write+0x427/0x4f0 [ 311.111951][T14021] ? ksys_write+0x237/0x2a0 [ 311.116457][T14021] ? __ia32_sys_read+0x80/0x80 [ 311.121273][T14021] __x64_sys_sendmmsg+0x9c/0xb0 [ 311.126137][T14021] do_syscall_64+0xcb/0x150 [ 311.130674][T14021] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 311.136566][T14021] RIP: 0033:0x45de59 [ 311.140459][T14021] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.160086][T14021] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 311.168498][T14021] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 311.176476][T14021] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 311.184448][T14021] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 311.192429][T14021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 311.200403][T14021] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:58 executing program 0 (fault-call:6 fault-nth:26): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 311.293843][T14029] EXT4-fs (loop2): inodes count not valid: 4 vs 32 13:13:58 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xff0f, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:13:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="080000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 311.377161][T14040] FAULT_INJECTION: forcing a failure. [ 311.377161][T14040] name failslab, interval 1, probability 0, space 0, times 0 [ 311.413658][T14034] overlayfs: filesystem on './file1' not supported [ 311.431276][T14040] CPU: 0 PID: 14040 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 311.441546][T14040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.451602][T14040] Call Trace: [ 311.454907][T14040] dump_stack+0x1b0/0x21e [ 311.455124][T14041] overlayfs: filesystem on './file1' not supported [ 311.459264][T14040] ? devkmsg_release+0x11c/0x11c [ 311.459276][T14040] ? show_regs_print_info+0x12/0x12 [ 311.459286][T14040] should_fail+0x6fb/0x860 13:13:58 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) 13:13:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400007, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 311.459300][T14040] ? setup_fault_attr+0x2b0/0x2b0 [ 311.485406][T14040] ? eth_get_headlen+0x240/0x240 [ 311.490374][T14040] ? sock_def_write_space+0x1b9/0x2a0 [ 311.495746][T14040] ? __alloc_skb+0x88/0x4d0 [ 311.500242][T14040] should_failslab+0x5/0x20 [ 311.504738][T14040] kmem_cache_alloc+0x36/0x250 [ 311.509500][T14040] ? netif_rx+0x157/0x2b0 [ 311.513825][T14040] __alloc_skb+0x88/0x4d0 [ 311.518181][T14040] ? dev_queue_xmit_nit+0x946/0x9e0 [ 311.523378][T14040] alloc_skb_with_frags+0xb1/0x580 [ 311.528607][T14040] ? _local_bh_enable+0x30/0x30 [ 311.533454][T14040] sock_alloc_send_pskb+0x87e/0xcc0 [ 311.538644][T14040] ? sock_kzfree_s+0x50/0x50 [ 311.543226][T14040] __ip_append_data+0x1fbd/0x31b0 [ 311.548250][T14040] ? ip_do_fragment+0x2290/0x2290 [ 311.553302][T14040] ? ip_output+0x318/0x400 [ 311.557729][T14040] ? ip_setup_cork+0x810/0x810 [ 311.562488][T14040] ? ipv4_mtu+0x212/0x2c0 [ 311.566817][T14040] ? ip_setup_cork+0x46b/0x810 [ 311.571657][T14040] ip_make_skb+0x1c9/0x4d0 [ 311.576089][T14040] ? ip_do_fragment+0x2290/0x2290 [ 311.581101][T14040] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 311.586726][T14040] ? __sk_dst_check+0x1b0/0x1b0 [ 311.591583][T14040] udp_sendmsg+0x1d1b/0x2e80 [ 311.597132][T14040] ? ip_do_fragment+0x2290/0x2290 [ 311.602157][T14040] ? udp_cmsg_send+0x340/0x340 [ 311.606938][T14040] ? selinux_socket_sendmsg+0x10b/0x320 [ 311.612510][T14040] ? selinux_socket_accept+0x580/0x580 [ 311.617969][T14040] ? rw_copy_check_uvector+0x6b/0x310 [ 311.623335][T14040] ? inet_send_prepare+0x1b7/0x470 [ 311.628439][T14040] ? inet_send_prepare+0x470/0x470 [ 311.633553][T14040] ____sys_sendmsg+0x56f/0x860 [ 311.638311][T14040] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 311.643502][T14040] ? udp_sendmsg+0x75b/0x2e80 [ 311.648170][T14040] ? __sys_sendmmsg+0x46f/0x680 [ 311.653015][T14040] __sys_sendmmsg+0x338/0x680 [ 311.657687][T14040] ? __ia32_sys_sendmsg+0x90/0x90 [ 311.662726][T14040] ? __rcu_read_lock+0x50/0x50 [ 311.667481][T14040] ? __kasan_slab_free+0x1e2/0x220 [ 311.672582][T14040] ? __kasan_slab_free+0x168/0x220 [ 311.677685][T14040] ? slab_free_freelist_hook+0xd0/0x150 [ 311.683226][T14040] ? kmem_cache_free+0xac/0x5c0 [ 311.688112][T14040] ? do_sys_open+0x4a3/0x620 [ 311.692723][T14040] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 311.698804][T14040] ? do_sys_open+0x2fc/0x620 [ 311.703386][T14040] ? proc_fail_nth_write+0x166/0x200 [ 311.708663][T14040] ? proc_fail_nth_read+0x1c0/0x1c0 [ 311.713852][T14040] ? ip4_datagram_release_cb+0x864/0xde0 [ 311.719480][T14040] ? proc_fail_nth_read+0x1c0/0x1c0 [ 311.724681][T14040] ? memset+0x1f/0x40 [ 311.728668][T14040] ? fsnotify+0x13a0/0x1460 [ 311.733184][T14040] ? __kernel_write+0x340/0x340 [ 311.738037][T14040] ? fsnotify+0x13a0/0x1460 [ 311.742547][T14040] ? security_file_permission+0x128/0x300 [ 311.748291][T14040] ? __sb_end_write+0xa4/0xf0 [ 311.752969][T14040] ? vfs_write+0x427/0x4f0 [ 311.757389][T14040] ? ksys_write+0x237/0x2a0 [ 311.761894][T14040] ? __ia32_sys_read+0x80/0x80 [ 311.766693][T14040] __x64_sys_sendmmsg+0x9c/0xb0 [ 311.771557][T14040] do_syscall_64+0xcb/0x150 [ 311.776064][T14040] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 311.781957][T14040] RIP: 0033:0x45de59 [ 311.785974][T14040] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.805578][T14040] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 311.814015][T14040] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 311.821997][T14040] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 13:13:58 executing program 0 (fault-call:6 fault-nth:27): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 311.830088][T14040] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 311.838069][T14040] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001a [ 311.846060][T14040] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:58 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x80040, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 311.921762][T14057] FAULT_INJECTION: forcing a failure. [ 311.921762][T14057] name failslab, interval 1, probability 0, space 0, times 0 [ 311.952876][T14049] EXT4-fs (loop2): inodes count not valid: 8 vs 32 [ 311.969010][T14057] CPU: 0 PID: 14057 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 311.979184][T14057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.989262][T14057] Call Trace: [ 311.992579][T14057] dump_stack+0x1b0/0x21e [ 311.996902][T14057] ? devkmsg_release+0x11c/0x11c [ 312.001835][T14057] ? show_regs_print_info+0x12/0x12 [ 312.007031][T14057] should_fail+0x6fb/0x860 [ 312.011892][T14057] ? setup_fault_attr+0x2b0/0x2b0 [ 312.017007][T14057] ? eth_get_headlen+0x240/0x240 [ 312.021937][T14057] ? sock_def_write_space+0x1b9/0x2a0 [ 312.027305][T14057] ? alloc_skb_with_frags+0xb1/0x580 [ 312.032588][T14057] should_failslab+0x5/0x20 [ 312.037124][T14057] __kmalloc_track_caller+0x5d/0x2b0 [ 312.042420][T14057] ? kmem_cache_alloc+0x1d5/0x250 [ 312.047437][T14057] ? netif_rx+0x157/0x2b0 [ 312.051763][T14057] ? alloc_skb_with_frags+0xb1/0x580 [ 312.057044][T14057] __alloc_skb+0xd1/0x4d0 [ 312.061376][T14057] alloc_skb_with_frags+0xb1/0x580 [ 312.066481][T14057] ? _local_bh_enable+0x30/0x30 [ 312.071328][T14057] sock_alloc_send_pskb+0x87e/0xcc0 [ 312.076523][T14057] ? sock_kzfree_s+0x50/0x50 [ 312.081107][T14057] __ip_append_data+0x1fbd/0x31b0 [ 312.086158][T14057] ? ip_do_fragment+0x2290/0x2290 [ 312.091187][T14057] ? ip_output+0x318/0x400 [ 312.095627][T14057] ? ip_setup_cork+0x810/0x810 [ 312.100410][T14057] ? ipv4_mtu+0x212/0x2c0 [ 312.104738][T14057] ? ip_setup_cork+0x46b/0x810 [ 312.109491][T14057] ip_make_skb+0x1c9/0x4d0 [ 312.113934][T14057] ? ip_do_fragment+0x2290/0x2290 [ 312.118952][T14057] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 312.124589][T14057] ? __sk_dst_check+0x1b0/0x1b0 [ 312.129441][T14057] udp_sendmsg+0x1d1b/0x2e80 [ 312.134064][T14057] ? ip_do_fragment+0x2290/0x2290 [ 312.139082][T14057] ? udp_cmsg_send+0x340/0x340 [ 312.143840][T14057] ? selinux_socket_sendmsg+0x10b/0x320 [ 312.149374][T14057] ? selinux_socket_accept+0x580/0x580 [ 312.154835][T14057] ? rw_copy_check_uvector+0x6b/0x310 [ 312.160237][T14057] ? inet_send_prepare+0x1b7/0x470 [ 312.165356][T14057] ? inet_send_prepare+0x470/0x470 [ 312.170551][T14057] ____sys_sendmsg+0x56f/0x860 [ 312.175312][T14057] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 312.180503][T14057] ? udp_sendmsg+0x75b/0x2e80 [ 312.185176][T14057] ? __sys_sendmmsg+0x46f/0x680 [ 312.190070][T14057] __sys_sendmmsg+0x338/0x680 [ 312.194741][T14057] ? __ia32_sys_sendmsg+0x90/0x90 [ 312.199762][T14057] ? __rcu_read_lock+0x50/0x50 [ 312.204540][T14057] ? __kasan_slab_free+0x1e2/0x220 [ 312.209639][T14057] ? __kasan_slab_free+0x168/0x220 [ 312.214748][T14057] ? slab_free_freelist_hook+0xd0/0x150 [ 312.220316][T14057] ? kmem_cache_free+0xac/0x5c0 [ 312.225172][T14057] ? do_sys_open+0x4a3/0x620 [ 312.229761][T14057] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 312.235835][T14057] ? do_sys_open+0x2fc/0x620 [ 312.240423][T14057] ? proc_fail_nth_write+0x166/0x200 [ 312.245710][T14057] ? proc_fail_nth_read+0x1c0/0x1c0 [ 312.250923][T14057] ? ip4_datagram_release_cb+0x864/0xde0 [ 312.256567][T14057] ? proc_fail_nth_read+0x1c0/0x1c0 [ 312.261769][T14057] ? memset+0x1f/0x40 [ 312.265749][T14057] ? fsnotify+0x13a0/0x1460 [ 312.270261][T14057] ? __kernel_write+0x340/0x340 [ 312.275106][T14057] ? fsnotify+0x13a0/0x1460 [ 312.279615][T14057] ? security_file_permission+0x128/0x300 [ 312.285347][T14057] ? __sb_end_write+0xa4/0xf0 [ 312.290019][T14057] ? vfs_write+0x427/0x4f0 [ 312.294429][T14057] ? ksys_write+0x237/0x2a0 [ 312.298929][T14057] ? __ia32_sys_read+0x80/0x80 [ 312.303693][T14057] __x64_sys_sendmmsg+0x9c/0xb0 [ 312.308565][T14057] do_syscall_64+0xcb/0x150 [ 312.313080][T14057] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 312.318971][T14057] RIP: 0033:0x45de59 [ 312.322952][T14057] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.342552][T14057] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 312.350955][T14057] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 312.358920][T14057] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 312.366886][T14057] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 312.374940][T14057] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001b [ 312.382998][T14057] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:13:59 executing program 0 (fault-call:6 fault-nth:28): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:13:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x1000000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYRESOCT=r0, @ANYRES32, @ANYRES16, @ANYRES16=r0, @ANYBLOB="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"]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000200)={0x5, 0x9, 0x57, &(0x7f0000000100)="597206185018e2fe5101d832d0cd9d6835f9d43c82d67e8501ad9f6e63295679dfde6e204ef00883d6c16505806ddbd55345ddd3040c9a006168aec40d060e1db4f399e5a0328ad61db03bfa036954b43da3095f91a13b"}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_open_pts(r6, 0x100) r7 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ptrace$cont(0x1f, 0x0, 0x0, 0x0) ptrace$peek(0x2, 0x0, &(0x7f0000000040)) ioctl$FITRIM(r7, 0x82307201, &(0x7f00000001c0)={0x0, 0x80000000000, 0x4}) [ 312.422391][T14061] overlayfs: workdir and upperdir must be separate subtrees 13:13:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 312.485635][T14069] FAULT_INJECTION: forcing a failure. [ 312.485635][T14069] name failslab, interval 1, probability 0, space 0, times 0 [ 312.498318][T14069] CPU: 1 PID: 14069 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 312.508608][T14069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.518845][T14069] Call Trace: [ 312.522266][T14069] dump_stack+0x1b0/0x21e [ 312.526600][T14069] ? devkmsg_release+0x11c/0x11c [ 312.531712][T14069] ? show_regs_print_info+0x12/0x12 [ 312.536914][T14069] ? __copy_skb_header+0x429/0x560 [ 312.542062][T14069] should_fail+0x6fb/0x860 [ 312.546494][T14069] ? setup_fault_attr+0x2b0/0x2b0 [ 312.551520][T14069] ? eth_type_trans+0x2a3/0x680 [ 312.556374][T14069] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 312.561745][T14069] ? skb_clone+0x1b2/0x370 [ 312.566183][T14069] should_failslab+0x5/0x20 [ 312.570685][T14069] kmem_cache_alloc+0x36/0x250 [ 312.575447][T14069] skb_clone+0x1b2/0x370 [ 312.579685][T14069] dev_queue_xmit_nit+0x279/0x9e0 13:13:59 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) r3 = ioctl$TIOCGPTPEER(r0, 0x5441, 0xffff) ioctl$TIOCSIG(r3, 0x40045436, 0x41) r4 = dup(r1) syz_io_uring_complete(0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000140)='msdos\x00', &(0x7f0000000200)='./file1\x00', r4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000019c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059640)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {r6}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, r7}], 0x0, "784934ff0e8c19"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000800)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000019c0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059640)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {0x0, r13}, {0x0, r19}, {}, {}, {}, {}, {}, {0x0, r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r20}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15, r16}], 0x6, "784934ff0e8c19"}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000400)={r5, 0xc3}) [ 312.584737][T14069] xmit_one+0x7b/0x460 [ 312.588799][T14069] __dev_queue_xmit+0x1858/0x25d0 [ 312.593827][T14069] ? dev_queue_xmit+0x20/0x20 [ 312.598504][T14069] ? ip_finish_output2+0x936/0x1810 [ 312.603714][T14069] ip_finish_output2+0xbdf/0x1810 [ 312.608736][T14069] ? ip_fragment+0x210/0x210 [ 312.613317][T14069] ? __ip_finish_output+0x4e1/0x6d0 [ 312.618538][T14069] ip_output+0x318/0x400 [ 312.622756][T14069] ? ip_finish_output+0x1d0/0x1d0 [ 312.627770][T14069] ? ip_mc_finish_output+0x3a0/0x3a0 [ 312.633042][T14069] ? udp4_hwcsum+0x26b/0x430 [ 312.637620][T14069] ip_send_skb+0xaa/0x140 [ 312.641941][T14069] udp_send_skb+0x8e9/0x1100 [ 312.646506][T14069] udp_sendmsg+0x1d45/0x2e80 [ 312.651072][T14069] ? ip_do_fragment+0x2290/0x2290 [ 312.656080][T14069] ? udp_cmsg_send+0x340/0x340 [ 312.660821][T14069] ? selinux_socket_sendmsg+0x10b/0x320 [ 312.666338][T14069] ? selinux_socket_accept+0x580/0x580 [ 312.671771][T14069] ? rw_copy_check_uvector+0x6b/0x310 [ 312.677120][T14069] ? inet_send_prepare+0x1b7/0x470 [ 312.682229][T14069] ? inet_send_prepare+0x470/0x470 [ 312.687352][T14069] ____sys_sendmsg+0x56f/0x860 [ 312.692105][T14069] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 312.697383][T14069] ? udp_sendmsg+0x75b/0x2e80 [ 312.702225][T14069] ? __sys_sendmmsg+0x46f/0x680 [ 312.707060][T14069] __sys_sendmmsg+0x338/0x680 [ 312.711718][T14069] ? __ia32_sys_sendmsg+0x90/0x90 [ 312.716724][T14069] ? __rcu_read_lock+0x50/0x50 [ 312.721460][T14069] ? __kasan_slab_free+0x1e2/0x220 [ 312.726549][T14069] ? __kasan_slab_free+0x168/0x220 [ 312.731644][T14069] ? slab_free_freelist_hook+0xd0/0x150 [ 312.737205][T14069] ? kmem_cache_free+0xac/0x5c0 [ 312.742065][T14069] ? do_sys_open+0x4a3/0x620 [ 312.746631][T14069] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 312.752676][T14069] ? do_sys_open+0x2fc/0x620 [ 312.757416][T14069] ? proc_fail_nth_write+0x166/0x200 [ 312.762679][T14069] ? proc_fail_nth_read+0x1c0/0x1c0 [ 312.767855][T14069] ? ip4_datagram_release_cb+0x864/0xde0 [ 312.773464][T14069] ? proc_fail_nth_read+0x1c0/0x1c0 [ 312.778640][T14069] ? memset+0x1f/0x40 [ 312.782611][T14069] ? fsnotify+0x13a0/0x1460 [ 312.787101][T14069] ? __kernel_write+0x340/0x340 [ 312.792450][T14069] ? fsnotify+0x13a0/0x1460 [ 312.796945][T14069] ? security_file_permission+0x128/0x300 [ 312.803193][T14069] ? __sb_end_write+0xa4/0xf0 [ 312.807850][T14069] ? vfs_write+0x427/0x4f0 [ 312.812246][T14069] ? ksys_write+0x237/0x2a0 [ 312.816729][T14069] ? __ia32_sys_read+0x80/0x80 [ 312.821490][T14069] __x64_sys_sendmmsg+0x9c/0xb0 [ 312.828502][T14069] do_syscall_64+0xcb/0x150 [ 312.832982][T14069] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 312.838881][T14069] RIP: 0033:0x45de59 [ 312.842866][T14069] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.862564][T14069] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 312.870980][T14069] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 312.878931][T14069] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 13:13:59 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x200000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 312.886882][T14069] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 312.894833][T14069] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001c [ 312.902792][T14069] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 312.906633][T14073] overlayfs: filesystem on './file1' not supported 13:13:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400008, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:13:59 executing program 0 (fault-call:6 fault-nth:29): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 313.002727][T14079] FAT-fs (loop5): Unrecognized mount option "ÿÿ00000000000000000000003ÿÿÿÿÿÿ" or missing value [ 313.039235][T14089] FAULT_INJECTION: forcing a failure. [ 313.039235][T14089] name failslab, interval 1, probability 0, space 0, times 0 [ 313.052227][T14089] CPU: 1 PID: 14089 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 313.062368][T14089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.072669][T14089] Call Trace: [ 313.075976][T14089] dump_stack+0x1b0/0x21e [ 313.080299][T14089] ? devkmsg_release+0x11c/0x11c [ 313.085231][T14089] ? show_regs_print_info+0x12/0x12 [ 313.090437][T14089] should_fail+0x6fb/0x860 [ 313.094847][T14089] ? setup_fault_attr+0x2b0/0x2b0 [ 313.099861][T14089] ? eth_get_headlen+0x240/0x240 [ 313.104782][T14089] ? sock_def_write_space+0x1b9/0x2a0 [ 313.110151][T14089] ? __alloc_skb+0x88/0x4d0 [ 313.114634][T14089] should_failslab+0x5/0x20 [ 313.119124][T14089] kmem_cache_alloc+0x36/0x250 [ 313.123876][T14089] ? netif_rx+0x157/0x2b0 [ 313.128210][T14089] __alloc_skb+0x88/0x4d0 [ 313.132522][T14089] ? dev_queue_xmit_nit+0x946/0x9e0 [ 313.137716][T14089] alloc_skb_with_frags+0xb1/0x580 [ 313.142811][T14089] ? _local_bh_enable+0x30/0x30 [ 313.147660][T14089] sock_alloc_send_pskb+0x87e/0xcc0 [ 313.152862][T14089] ? sock_kzfree_s+0x50/0x50 [ 313.157438][T14089] __ip_append_data+0x1fbd/0x31b0 [ 313.162468][T14089] ? ip_do_fragment+0x2290/0x2290 [ 313.167481][T14089] ? ip_output+0x318/0x400 [ 313.171904][T14089] ? ip_setup_cork+0x810/0x810 [ 313.176668][T14089] ? ipv4_mtu+0x212/0x2c0 [ 313.180978][T14089] ? ip_setup_cork+0x46b/0x810 [ 313.185724][T14089] ip_make_skb+0x1c9/0x4d0 [ 313.190146][T14089] ? ip_do_fragment+0x2290/0x2290 [ 313.195155][T14089] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 313.200774][T14089] ? __sk_dst_check+0x1b0/0x1b0 [ 313.205608][T14089] udp_sendmsg+0x1d1b/0x2e80 [ 313.210191][T14089] ? ip_do_fragment+0x2290/0x2290 [ 313.215214][T14089] ? udp_cmsg_send+0x340/0x340 [ 313.219965][T14089] ? selinux_socket_sendmsg+0x10b/0x320 [ 313.225498][T14089] ? selinux_socket_accept+0x580/0x580 [ 313.230955][T14089] ? rw_copy_check_uvector+0x6b/0x310 [ 313.236324][T14089] ? inet_send_prepare+0x1b7/0x470 [ 313.241420][T14089] ? inet_send_prepare+0x470/0x470 [ 313.246521][T14089] ____sys_sendmsg+0x56f/0x860 [ 313.251279][T14089] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 313.256466][T14089] ? udp_sendmsg+0x75b/0x2e80 [ 313.261150][T14089] ? __sys_sendmmsg+0x46f/0x680 [ 313.265989][T14089] __sys_sendmmsg+0x338/0x680 [ 313.270654][T14089] ? __ia32_sys_sendmsg+0x90/0x90 [ 313.275662][T14089] ? __rcu_read_lock+0x50/0x50 [ 313.280408][T14089] ? __kasan_slab_free+0x1e2/0x220 [ 313.285583][T14089] ? __kasan_slab_free+0x168/0x220 [ 313.290762][T14089] ? slab_free_freelist_hook+0xd0/0x150 [ 313.296394][T14089] ? kmem_cache_free+0xac/0x5c0 [ 313.301240][T14089] ? do_sys_open+0x4a3/0x620 [ 313.305810][T14089] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 313.311861][T14089] ? do_sys_open+0x2fc/0x620 [ 313.316433][T14089] ? proc_fail_nth_write+0x166/0x200 [ 313.321705][T14089] ? proc_fail_nth_read+0x1c0/0x1c0 [ 313.326912][T14089] ? ip4_datagram_release_cb+0x864/0xde0 [ 313.332538][T14089] ? proc_fail_nth_read+0x1c0/0x1c0 [ 313.337722][T14089] ? memset+0x1f/0x40 [ 313.341689][T14089] ? fsnotify+0x13a0/0x1460 [ 313.346807][T14089] ? __kernel_write+0x340/0x340 [ 313.351639][T14089] ? fsnotify+0x13a0/0x1460 [ 313.356139][T14089] ? security_file_permission+0x128/0x300 [ 313.361843][T14089] ? __sb_end_write+0xa4/0xf0 [ 313.366533][T14089] ? vfs_write+0x427/0x4f0 [ 313.370935][T14089] ? ksys_write+0x237/0x2a0 [ 313.375419][T14089] ? __ia32_sys_read+0x80/0x80 [ 313.380165][T14089] __x64_sys_sendmmsg+0x9c/0xb0 [ 313.385001][T14089] do_syscall_64+0xcb/0x150 [ 313.389586][T14089] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 313.395480][T14089] RIP: 0033:0x45de59 [ 313.399361][T14089] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.418954][T14089] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 313.427351][T14089] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 313.435308][T14089] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 313.443263][T14089] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 13:14:00 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000140)='./file1\x00', r2, 0xee01) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r1, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r1, 0x82307201, &(0x7f00000001c0)) [ 313.451223][T14089] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001d [ 313.459211][T14089] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 313.484534][T14085] EXT4-fs (loop2): inodes count not valid: 10 vs 32 13:14:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="250000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:00 executing program 0 (fault-call:6 fault-nth:30): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 313.516084][T14095] overlayfs: workdir and upperdir must be separate subtrees 13:14:00 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xc00000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:00 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x140, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000200)=@md5={0x1, "253ac8bfd00a9ab4fb215cd2c1b29114"}, 0x11, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:14:00 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) fallocate(r3, 0x4, 0x1452, 0x1) [ 313.677196][T14108] FAULT_INJECTION: forcing a failure. [ 313.677196][T14108] name failslab, interval 1, probability 0, space 0, times 0 [ 313.690202][T14108] CPU: 0 PID: 14108 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 313.700370][T14108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.710423][T14108] Call Trace: [ 313.713740][T14108] dump_stack+0x1b0/0x21e [ 313.718053][T14108] ? devkmsg_release+0x11c/0x11c [ 313.722979][T14108] ? show_regs_print_info+0x12/0x12 [ 313.728161][T14108] should_fail+0x6fb/0x860 [ 313.732586][T14108] ? setup_fault_attr+0x2b0/0x2b0 [ 313.737604][T14108] ? eth_get_headlen+0x240/0x240 [ 313.742545][T14108] ? sock_def_write_space+0x1b9/0x2a0 [ 313.747944][T14108] ? alloc_skb_with_frags+0xb1/0x580 [ 313.753228][T14108] should_failslab+0x5/0x20 [ 313.757751][T14108] __kmalloc_track_caller+0x5d/0x2b0 [ 313.763048][T14108] ? kmem_cache_alloc+0x1d5/0x250 [ 313.768098][T14108] ? netif_rx+0x157/0x2b0 [ 313.772427][T14108] ? alloc_skb_with_frags+0xb1/0x580 [ 313.777733][T14108] __alloc_skb+0xd1/0x4d0 [ 313.782060][T14108] alloc_skb_with_frags+0xb1/0x580 [ 313.787167][T14108] ? _local_bh_enable+0x30/0x30 [ 313.792013][T14108] sock_alloc_send_pskb+0x87e/0xcc0 [ 313.797211][T14108] ? sock_kzfree_s+0x50/0x50 [ 313.801802][T14108] __ip_append_data+0x1fbd/0x31b0 [ 313.806843][T14108] ? ip_do_fragment+0x2290/0x2290 [ 313.811874][T14108] ? ip_output+0x318/0x400 [ 313.816285][T14108] ? ip_setup_cork+0x810/0x810 [ 313.821033][T14108] ? ipv4_mtu+0x212/0x2c0 [ 313.825363][T14108] ? ip_setup_cork+0x46b/0x810 [ 313.830121][T14108] ip_make_skb+0x1c9/0x4d0 [ 313.834530][T14108] ? ip_do_fragment+0x2290/0x2290 [ 313.839556][T14108] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 313.845175][T14108] ? __sk_dst_check+0x1b0/0x1b0 [ 313.850011][T14108] udp_sendmsg+0x1d1b/0x2e80 [ 313.854613][T14108] ? ip_do_fragment+0x2290/0x2290 [ 313.859618][T14108] ? udp_cmsg_send+0x340/0x340 [ 313.864366][T14108] ? selinux_socket_sendmsg+0x10b/0x320 [ 313.869893][T14108] ? selinux_socket_accept+0x580/0x580 [ 313.875333][T14108] ? rw_copy_check_uvector+0x6b/0x310 [ 313.880690][T14108] ? inet_send_prepare+0x1b7/0x470 [ 313.885781][T14108] ? inet_send_prepare+0x470/0x470 [ 313.890877][T14108] ____sys_sendmsg+0x56f/0x860 [ 313.895628][T14108] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 313.900806][T14108] ? udp_sendmsg+0x75b/0x2e80 [ 313.905466][T14108] ? __sys_sendmmsg+0x46f/0x680 [ 313.910392][T14108] __sys_sendmmsg+0x338/0x680 [ 313.915061][T14108] ? __ia32_sys_sendmsg+0x90/0x90 [ 313.920094][T14108] ? __rcu_read_lock+0x50/0x50 [ 313.924849][T14108] ? __kasan_slab_free+0x1e2/0x220 [ 313.929963][T14108] ? __kasan_slab_free+0x168/0x220 [ 313.935072][T14108] ? slab_free_freelist_hook+0xd0/0x150 [ 313.940610][T14108] ? kmem_cache_free+0xac/0x5c0 [ 313.945454][T14108] ? do_sys_open+0x4a3/0x620 [ 313.950034][T14108] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 313.956100][T14108] ? do_sys_open+0x2fc/0x620 [ 313.960689][T14108] ? proc_fail_nth_write+0x166/0x200 [ 313.965974][T14108] ? proc_fail_nth_read+0x1c0/0x1c0 [ 313.971173][T14108] ? ip4_datagram_release_cb+0x864/0xde0 [ 313.976807][T14108] ? proc_fail_nth_read+0x1c0/0x1c0 [ 313.981999][T14108] ? memset+0x1f/0x40 [ 313.985986][T14108] ? fsnotify+0x13a0/0x1460 [ 313.990497][T14108] ? __kernel_write+0x340/0x340 [ 313.995335][T14108] ? fsnotify+0x13a0/0x1460 [ 313.999865][T14108] ? security_file_permission+0x128/0x300 [ 314.005576][T14108] ? __sb_end_write+0xa4/0xf0 [ 314.010250][T14108] ? vfs_write+0x427/0x4f0 [ 314.014665][T14108] ? ksys_write+0x237/0x2a0 [ 314.019158][T14108] ? __ia32_sys_read+0x80/0x80 [ 314.023912][T14108] __x64_sys_sendmmsg+0x9c/0xb0 [ 314.028751][T14108] do_syscall_64+0xcb/0x150 [ 314.033272][T14108] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 314.039148][T14108] RIP: 0033:0x45de59 [ 314.043146][T14108] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.062749][T14108] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 314.071157][T14108] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 13:14:00 executing program 0 (fault-call:6 fault-nth:31): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 314.079129][T14108] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 314.087094][T14108] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 314.095077][T14108] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001e [ 314.103042][T14108] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 314.121208][T14095] overlayfs: filesystem on './file1' not supported 13:14:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400009, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 314.197826][T14109] EXT4-fs (loop2): inodes count not valid: 37 vs 32 [ 314.218454][T14119] FAULT_INJECTION: forcing a failure. [ 314.218454][T14119] name failslab, interval 1, probability 0, space 0, times 0 [ 314.231087][T14119] CPU: 0 PID: 14119 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 314.241221][T14119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.251511][T14119] Call Trace: [ 314.254809][T14119] dump_stack+0x1b0/0x21e [ 314.259118][T14119] ? devkmsg_release+0x11c/0x11c [ 314.264039][T14119] ? show_regs_print_info+0x12/0x12 [ 314.269254][T14119] ? __copy_skb_header+0x429/0x560 [ 314.274348][T14119] should_fail+0x6fb/0x860 [ 314.278745][T14119] ? setup_fault_attr+0x2b0/0x2b0 [ 314.283764][T14119] ? eth_type_trans+0x2a3/0x680 [ 314.288616][T14119] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 314.293963][T14119] ? skb_clone+0x1b2/0x370 [ 314.298357][T14119] should_failslab+0x5/0x20 [ 314.302864][T14119] kmem_cache_alloc+0x36/0x250 [ 314.307621][T14119] skb_clone+0x1b2/0x370 [ 314.311846][T14119] dev_queue_xmit_nit+0x279/0x9e0 [ 314.316856][T14119] xmit_one+0x7b/0x460 [ 314.320901][T14119] __dev_queue_xmit+0x1858/0x25d0 [ 314.325927][T14119] ? dev_queue_xmit+0x20/0x20 [ 314.330601][T14119] ? ip_finish_output2+0x936/0x1810 [ 314.335783][T14119] ip_finish_output2+0xbdf/0x1810 [ 314.340831][T14119] ? ip_fragment+0x210/0x210 [ 314.345397][T14119] ? __ip_finish_output+0x4e1/0x6d0 [ 314.350587][T14119] ip_output+0x318/0x400 [ 314.354825][T14119] ? ip_finish_output+0x1d0/0x1d0 [ 314.359829][T14119] ? ip_mc_finish_output+0x3a0/0x3a0 [ 314.365095][T14119] ? udp4_hwcsum+0x26b/0x430 [ 314.369666][T14119] ip_send_skb+0xaa/0x140 [ 314.373975][T14119] udp_send_skb+0x8e9/0x1100 [ 314.378543][T14119] udp_sendmsg+0x1d45/0x2e80 [ 314.383117][T14119] ? ip_do_fragment+0x2290/0x2290 [ 314.388118][T14119] ? udp_cmsg_send+0x340/0x340 [ 314.392859][T14119] ? selinux_socket_sendmsg+0x10b/0x320 [ 314.398383][T14119] ? selinux_socket_accept+0x580/0x580 [ 314.403825][T14119] ? rw_copy_check_uvector+0x6b/0x310 [ 314.409325][T14119] ? inet_send_prepare+0x1b7/0x470 [ 314.414428][T14119] ? inet_send_prepare+0x470/0x470 [ 314.419532][T14119] ____sys_sendmsg+0x56f/0x860 [ 314.424288][T14119] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 314.429490][T14119] ? udp_sendmsg+0x75b/0x2e80 [ 314.434355][T14119] ? __sys_sendmmsg+0x46f/0x680 [ 314.439200][T14119] __sys_sendmmsg+0x338/0x680 [ 314.443857][T14119] ? __ia32_sys_sendmsg+0x90/0x90 [ 314.448874][T14119] ? __rcu_read_lock+0x50/0x50 [ 314.453672][T14119] ? __kasan_slab_free+0x1e2/0x220 [ 314.458776][T14119] ? __kasan_slab_free+0x168/0x220 [ 314.463883][T14119] ? slab_free_freelist_hook+0xd0/0x150 [ 314.469420][T14119] ? kmem_cache_free+0xac/0x5c0 [ 314.474245][T14119] ? do_sys_open+0x4a3/0x620 [ 314.478810][T14119] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 314.484962][T14119] ? do_sys_open+0x2fc/0x620 [ 314.489531][T14119] ? proc_fail_nth_write+0x166/0x200 [ 314.494799][T14119] ? proc_fail_nth_read+0x1c0/0x1c0 [ 314.499985][T14119] ? ip4_datagram_release_cb+0x864/0xde0 [ 314.505612][T14119] ? proc_fail_nth_read+0x1c0/0x1c0 [ 314.510799][T14119] ? memset+0x1f/0x40 [ 314.514761][T14119] ? fsnotify+0x13a0/0x1460 [ 314.519256][T14119] ? __kernel_write+0x340/0x340 [ 314.524078][T14119] ? fsnotify+0x13a0/0x1460 [ 314.528572][T14119] ? security_file_permission+0x128/0x300 [ 314.534263][T14119] ? __sb_end_write+0xa4/0xf0 [ 314.538928][T14119] ? vfs_write+0x427/0x4f0 [ 314.543319][T14119] ? ksys_write+0x237/0x2a0 [ 314.547794][T14119] ? __ia32_sys_read+0x80/0x80 [ 314.552529][T14119] __x64_sys_sendmmsg+0x9c/0xb0 [ 314.558853][T14119] do_syscall_64+0xcb/0x150 [ 314.563333][T14119] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 314.569205][T14119] RIP: 0033:0x45de59 [ 314.573107][T14119] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.592708][T14119] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 314.601258][T14119] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 314.609234][T14119] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 314.617189][T14119] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 314.625270][T14119] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001f [ 314.633283][T14119] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="290000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:01 executing program 5: ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000240)={0x22, 0x0, 0x5, 0x66ca36cd, 0xe64, 0x4}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000280)={'batadv_slave_0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') getxattr(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)=ANY=[@ANYBLOB='ssec-'], &(0x7f0000000200)=""/6, 0x6) arch_prctl$ARCH_GET_CPUID(0x1011) r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:14:01 executing program 0 (fault-call:6 fault-nth:32): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:01 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x1000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 314.830125][T14130] overlayfs: failed to resolve './file1': -2 [ 314.858262][T14132] FAULT_INJECTION: forcing a failure. [ 314.858262][T14132] name failslab, interval 1, probability 0, space 0, times 0 [ 314.871052][T14132] CPU: 1 PID: 14132 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 314.881186][T14132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.891243][T14132] Call Trace: [ 314.894527][T14132] dump_stack+0x1b0/0x21e [ 314.898832][T14132] ? devkmsg_release+0x11c/0x11c [ 314.903745][T14132] ? show_regs_print_info+0x12/0x12 [ 314.908921][T14132] should_fail+0x6fb/0x860 [ 314.913312][T14132] ? setup_fault_attr+0x2b0/0x2b0 [ 314.918340][T14132] ? eth_get_headlen+0x240/0x240 [ 314.923250][T14132] ? sock_def_write_space+0x1b9/0x2a0 [ 314.928594][T14132] ? __alloc_skb+0x88/0x4d0 [ 314.933071][T14132] should_failslab+0x5/0x20 [ 314.937571][T14132] kmem_cache_alloc+0x36/0x250 [ 314.942322][T14132] ? netif_rx+0x157/0x2b0 [ 314.946636][T14132] __alloc_skb+0x88/0x4d0 [ 314.950951][T14132] ? dev_queue_xmit_nit+0x946/0x9e0 [ 314.956247][T14132] alloc_skb_with_frags+0xb1/0x580 [ 314.961343][T14132] ? _local_bh_enable+0x30/0x30 [ 314.966181][T14132] sock_alloc_send_pskb+0x87e/0xcc0 [ 314.971359][T14132] ? sock_kzfree_s+0x50/0x50 [ 314.975929][T14132] __ip_append_data+0x1fbd/0x31b0 [ 314.980956][T14132] ? ip_do_fragment+0x2290/0x2290 [ 314.986156][T14132] ? ip_output+0x318/0x400 [ 314.990596][T14132] ? ip_setup_cork+0x810/0x810 [ 314.995334][T14132] ? ipv4_mtu+0x212/0x2c0 [ 314.999635][T14132] ? ip_setup_cork+0x46b/0x810 [ 315.004378][T14132] ip_make_skb+0x1c9/0x4d0 [ 315.008774][T14132] ? ip_do_fragment+0x2290/0x2290 [ 315.013777][T14132] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 315.019392][T14132] ? __sk_dst_check+0x1b0/0x1b0 [ 315.024220][T14132] udp_sendmsg+0x1d1b/0x2e80 [ 315.028804][T14132] ? ip_do_fragment+0x2290/0x2290 [ 315.033814][T14132] ? udp_cmsg_send+0x340/0x340 [ 315.038559][T14132] ? selinux_socket_sendmsg+0x10b/0x320 [ 315.044092][T14132] ? selinux_socket_accept+0x580/0x580 [ 315.049529][T14132] ? rw_copy_check_uvector+0x6b/0x310 [ 315.054882][T14132] ? inet_send_prepare+0x1b7/0x470 [ 315.059969][T14132] ? inet_send_prepare+0x470/0x470 [ 315.065062][T14132] ____sys_sendmsg+0x56f/0x860 [ 315.069804][T14132] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 315.076684][T14132] ? udp_sendmsg+0x75b/0x2e80 [ 315.081433][T14132] ? __sys_sendmmsg+0x46f/0x680 [ 315.086263][T14132] __sys_sendmmsg+0x338/0x680 [ 315.090934][T14132] ? __ia32_sys_sendmsg+0x90/0x90 [ 315.095937][T14132] ? __rcu_read_lock+0x50/0x50 [ 315.100676][T14132] ? __kasan_slab_free+0x1e2/0x220 [ 315.105761][T14132] ? __kasan_slab_free+0x168/0x220 [ 315.110861][T14132] ? slab_free_freelist_hook+0xd0/0x150 [ 315.116382][T14132] ? kmem_cache_free+0xac/0x5c0 [ 315.121209][T14132] ? do_sys_open+0x4a3/0x620 [ 315.125776][T14132] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 315.131905][T14132] ? do_sys_open+0x2fc/0x620 [ 315.136488][T14132] ? proc_fail_nth_write+0x166/0x200 [ 315.141860][T14132] ? proc_fail_nth_read+0x1c0/0x1c0 [ 315.147070][T14132] ? ip4_datagram_release_cb+0x864/0xde0 [ 315.152678][T14132] ? proc_fail_nth_read+0x1c0/0x1c0 [ 315.157868][T14132] ? memset+0x1f/0x40 [ 315.161824][T14132] ? fsnotify+0x13a0/0x1460 [ 315.166311][T14132] ? __kernel_write+0x340/0x340 [ 315.171131][T14132] ? fsnotify+0x13a0/0x1460 [ 315.175622][T14132] ? security_file_permission+0x128/0x300 [ 315.181312][T14132] ? __sb_end_write+0xa4/0xf0 [ 315.186080][T14132] ? vfs_write+0x427/0x4f0 [ 315.190473][T14132] ? ksys_write+0x237/0x2a0 [ 315.195008][T14132] ? __ia32_sys_read+0x80/0x80 [ 315.199756][T14132] __x64_sys_sendmmsg+0x9c/0xb0 [ 315.204585][T14132] do_syscall_64+0xcb/0x150 [ 315.209066][T14132] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 315.214935][T14132] RIP: 0033:0x45de59 [ 315.218803][T14132] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.238397][T14132] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 315.246806][T14132] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 315.254771][T14132] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 315.262772][T14132] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 315.270726][T14132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000020 13:14:02 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x5, 0x101) rename(&(0x7f0000000500)='./file1\x00', &(0x7f0000000540)='./file1/file0\x00') bind(r2, &(0x7f0000000200)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x80) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(r4, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x1, 0x2, 0x401, 0x0, 0x0, {0x0, 0x0, 0x5}, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PPPIOCNEWUNIT(r6, 0xc004743e, &(0x7f0000000580)=0x1) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x50, 0x7, 0x6, 0x201, 0x0, 0x0, {0x3, 0x0, 0x1}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x6}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x80000000}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0xb09}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}, 0x1, 0x0, 0x0, 0x80080c0}, 0x0) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) [ 315.279742][T14132] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:02 executing program 0 (fault-call:6 fault-nth:33): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 315.356046][T14130] overlayfs: filesystem on './file1' not supported [ 315.372487][T14147] FAULT_INJECTION: forcing a failure. [ 315.372487][T14147] name failslab, interval 1, probability 0, space 0, times 0 [ 315.385529][T14147] CPU: 0 PID: 14147 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 315.395714][T14147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.405774][T14147] Call Trace: [ 315.409045][T14147] dump_stack+0x1b0/0x21e [ 315.413351][T14147] ? devkmsg_release+0x11c/0x11c [ 315.418419][T14147] ? show_regs_print_info+0x12/0x12 [ 315.423607][T14147] should_fail+0x6fb/0x860 [ 315.428016][T14147] ? setup_fault_attr+0x2b0/0x2b0 [ 315.433041][T14147] ? eth_get_headlen+0x240/0x240 [ 315.437957][T14147] ? sock_def_write_space+0x1b9/0x2a0 [ 315.443313][T14147] ? alloc_skb_with_frags+0xb1/0x580 [ 315.448580][T14147] should_failslab+0x5/0x20 [ 315.453065][T14147] __kmalloc_track_caller+0x5d/0x2b0 [ 315.458335][T14147] ? kmem_cache_alloc+0x1d5/0x250 [ 315.463454][T14147] ? netif_rx+0x157/0x2b0 [ 315.467767][T14147] ? alloc_skb_with_frags+0xb1/0x580 [ 315.473035][T14147] __alloc_skb+0xd1/0x4d0 [ 315.477359][T14147] alloc_skb_with_frags+0xb1/0x580 [ 315.482457][T14147] ? _local_bh_enable+0x30/0x30 [ 315.487295][T14147] sock_alloc_send_pskb+0x87e/0xcc0 [ 315.495837][T14147] ? sock_kzfree_s+0x50/0x50 [ 315.500469][T14147] __ip_append_data+0x1fbd/0x31b0 [ 315.505523][T14147] ? ip_do_fragment+0x2290/0x2290 [ 315.510524][T14147] ? ip_output+0x318/0x400 [ 315.514933][T14147] ? ip_setup_cork+0x810/0x810 [ 315.519669][T14147] ? ipv4_mtu+0x212/0x2c0 [ 315.523975][T14147] ? ip_setup_cork+0x46b/0x810 [ 315.528717][T14147] ip_make_skb+0x1c9/0x4d0 [ 315.533129][T14147] ? ip_do_fragment+0x2290/0x2290 [ 315.538825][T14147] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 315.544450][T14147] ? __sk_dst_check+0x1b0/0x1b0 [ 315.549280][T14147] udp_sendmsg+0x1d1b/0x2e80 [ 315.554024][T14147] ? ip_do_fragment+0x2290/0x2290 [ 315.559030][T14147] ? udp_cmsg_send+0x340/0x340 [ 315.563811][T14147] ? selinux_socket_sendmsg+0x10b/0x320 [ 315.569328][T14147] ? selinux_socket_accept+0x580/0x580 [ 315.574762][T14147] ? rw_copy_check_uvector+0x6b/0x310 [ 315.580112][T14147] ? inet_send_prepare+0x1b7/0x470 [ 315.585203][T14147] ? inet_send_prepare+0x470/0x470 [ 315.590295][T14147] ____sys_sendmsg+0x56f/0x860 [ 315.595434][T14147] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 315.600628][T14147] ? udp_sendmsg+0x75b/0x2e80 [ 315.605319][T14147] ? __sys_sendmmsg+0x46f/0x680 [ 315.610154][T14147] __sys_sendmmsg+0x338/0x680 [ 315.614812][T14147] ? __ia32_sys_sendmsg+0x90/0x90 [ 315.619836][T14147] ? __rcu_read_lock+0x50/0x50 [ 315.624578][T14147] ? __kasan_slab_free+0x1e2/0x220 [ 315.629665][T14147] ? __kasan_slab_free+0x168/0x220 [ 315.634755][T14147] ? slab_free_freelist_hook+0xd0/0x150 [ 315.640278][T14147] ? kmem_cache_free+0xac/0x5c0 [ 315.645122][T14147] ? do_sys_open+0x4a3/0x620 [ 315.649697][T14147] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 315.655759][T14147] ? do_sys_open+0x2fc/0x620 [ 315.660327][T14147] ? proc_fail_nth_write+0x166/0x200 [ 315.665591][T14147] ? proc_fail_nth_read+0x1c0/0x1c0 [ 315.670775][T14147] ? ip4_datagram_release_cb+0x864/0xde0 [ 315.676396][T14147] ? proc_fail_nth_read+0x1c0/0x1c0 [ 315.681740][T14147] ? memset+0x1f/0x40 [ 315.685701][T14147] ? fsnotify+0x13a0/0x1460 [ 315.690181][T14147] ? __kernel_write+0x340/0x340 [ 315.695012][T14147] ? fsnotify+0x13a0/0x1460 [ 315.699514][T14147] ? security_file_permission+0x128/0x300 [ 315.705210][T14147] ? __sb_end_write+0xa4/0xf0 [ 315.709889][T14147] ? vfs_write+0x427/0x4f0 [ 315.714638][T14147] ? ksys_write+0x237/0x2a0 [ 315.719125][T14147] ? __ia32_sys_read+0x80/0x80 [ 315.723889][T14147] __x64_sys_sendmmsg+0x9c/0xb0 [ 315.728736][T14147] do_syscall_64+0xcb/0x150 [ 315.734008][T14147] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 315.739954][T14147] RIP: 0033:0x45de59 [ 315.743869][T14147] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.763453][T14147] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 315.772031][T14147] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 315.780142][T14147] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 315.788108][T14147] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 315.796080][T14147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000021 [ 315.804034][T14147] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:02 executing program 0 (fault-call:6 fault-nth:34): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 315.838950][T14145] FAT-fs (loop3): Unrecognized mount option "€" or missing value [ 315.858154][T14144] EXT4-fs (loop2): inodes count not valid: 41 vs 32 [ 315.883407][T14161] FAULT_INJECTION: forcing a failure. [ 315.883407][T14161] name failslab, interval 1, probability 0, space 0, times 0 [ 315.896104][T14161] CPU: 0 PID: 14161 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 315.906267][T14161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.916413][T14161] Call Trace: [ 315.919700][T14161] dump_stack+0x1b0/0x21e [ 315.924012][T14161] ? devkmsg_release+0x11c/0x11c [ 315.928939][T14161] ? show_regs_print_info+0x12/0x12 [ 315.934133][T14161] ? __copy_skb_header+0x429/0x560 [ 315.939261][T14161] should_fail+0x6fb/0x860 [ 315.943658][T14161] ? setup_fault_attr+0x2b0/0x2b0 [ 315.948750][T14161] ? eth_type_trans+0x2a3/0x680 [ 315.953589][T14161] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 315.958948][T14161] ? skb_clone+0x1b2/0x370 [ 315.963455][T14161] should_failslab+0x5/0x20 [ 315.967958][T14161] kmem_cache_alloc+0x36/0x250 [ 315.972705][T14161] skb_clone+0x1b2/0x370 [ 315.976930][T14161] dev_queue_xmit_nit+0x279/0x9e0 [ 315.982120][T14161] xmit_one+0x7b/0x460 [ 315.986216][T14161] __dev_queue_xmit+0x1858/0x25d0 [ 315.991386][T14161] ? dev_queue_xmit+0x20/0x20 [ 315.996048][T14161] ? ip_finish_output2+0x936/0x1810 [ 316.001248][T14161] ip_finish_output2+0xbdf/0x1810 [ 316.006257][T14161] ? ip_fragment+0x210/0x210 [ 316.010838][T14161] ? __ip_finish_output+0x4e1/0x6d0 [ 316.016033][T14161] ip_output+0x318/0x400 [ 316.020259][T14161] ? ip_finish_output+0x1d0/0x1d0 [ 316.025276][T14161] ? ip_mc_finish_output+0x3a0/0x3a0 [ 316.030542][T14161] ? udp4_hwcsum+0x26b/0x430 [ 316.035150][T14161] ip_send_skb+0xaa/0x140 [ 316.039484][T14161] udp_send_skb+0x8e9/0x1100 [ 316.044061][T14161] udp_sendmsg+0x1d45/0x2e80 [ 316.048635][T14161] ? ip_do_fragment+0x2290/0x2290 [ 316.053784][T14161] ? udp_cmsg_send+0x340/0x340 [ 316.058536][T14161] ? selinux_socket_sendmsg+0x10b/0x320 [ 316.064095][T14161] ? selinux_socket_accept+0x580/0x580 [ 316.069551][T14161] ? rw_copy_check_uvector+0x6b/0x310 [ 316.074908][T14161] ? inet_send_prepare+0x1b7/0x470 [ 316.080019][T14161] ? inet_send_prepare+0x470/0x470 [ 316.085177][T14161] ____sys_sendmsg+0x56f/0x860 [ 316.089931][T14161] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 316.095124][T14161] ? udp_sendmsg+0x75b/0x2e80 [ 316.099795][T14161] ? __sys_sendmmsg+0x46f/0x680 [ 316.104627][T14161] __sys_sendmmsg+0x338/0x680 [ 316.109287][T14161] ? __ia32_sys_sendmsg+0x90/0x90 [ 316.114308][T14161] ? __rcu_read_lock+0x50/0x50 [ 316.119061][T14161] ? __kasan_slab_free+0x1e2/0x220 [ 316.124238][T14161] ? __kasan_slab_free+0x168/0x220 [ 316.129358][T14161] ? slab_free_freelist_hook+0xd0/0x150 [ 316.134900][T14161] ? kmem_cache_free+0xac/0x5c0 [ 316.139750][T14161] ? do_sys_open+0x4a3/0x620 [ 316.144318][T14161] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 316.150377][T14161] ? do_sys_open+0x2fc/0x620 [ 316.154968][T14161] ? proc_fail_nth_write+0x166/0x200 [ 316.160256][T14161] ? proc_fail_nth_read+0x1c0/0x1c0 [ 316.165469][T14161] ? ip4_datagram_release_cb+0x864/0xde0 [ 316.171081][T14161] ? proc_fail_nth_read+0x1c0/0x1c0 [ 316.176279][T14161] ? memset+0x1f/0x40 [ 316.180248][T14161] ? fsnotify+0x13a0/0x1460 [ 316.184742][T14161] ? __kernel_write+0x340/0x340 [ 316.189571][T14161] ? fsnotify+0x13a0/0x1460 [ 316.194073][T14161] ? security_file_permission+0x128/0x300 [ 316.199772][T14161] ? __sb_end_write+0xa4/0xf0 [ 316.204440][T14161] ? vfs_write+0x427/0x4f0 [ 316.208869][T14161] ? ksys_write+0x237/0x2a0 [ 316.213358][T14161] ? __ia32_sys_read+0x80/0x80 [ 316.218106][T14161] __x64_sys_sendmmsg+0x9c/0xb0 [ 316.222954][T14161] do_syscall_64+0xcb/0x150 [ 316.227466][T14161] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 316.233333][T14161] RIP: 0033:0x45de59 [ 316.237222][T14161] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.256819][T14161] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 316.265230][T14161] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 316.273210][T14161] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 316.281158][T14161] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 13:14:03 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) [ 316.289117][T14161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000022 [ 316.297109][T14161] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 316.320321][T14165] overlayfs: workdir and upperdir must be separate subtrees 13:14:03 executing program 0 (fault-call:6 fault-nth:35): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="002000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:03 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x2000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:03 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="040005090000011060737400fcfffffffffffdff00f80131f1f87874ee8bc2f57352d4847faf9d6a25ce751c513428f0632bae5258b3d27b30ec6d5bf68cd611f56c0e0105846c8960b31171d0e8b3589a2fef11bc06a033fe12aed05fed0a4b9139fc36679a2ef8315c", 0x6a}], 0x1, &(0x7f00000002c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000200), 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) [ 316.501572][T14169] FAULT_INJECTION: forcing a failure. [ 316.501572][T14169] name failslab, interval 1, probability 0, space 0, times 0 [ 316.514247][T14169] CPU: 0 PID: 14169 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 316.524383][T14169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.534436][T14169] Call Trace: [ 316.537731][T14169] dump_stack+0x1b0/0x21e [ 316.542069][T14169] ? devkmsg_release+0x11c/0x11c [ 316.546987][T14169] ? show_regs_print_info+0x12/0x12 [ 316.552183][T14169] should_fail+0x6fb/0x860 [ 316.556596][T14169] ? setup_fault_attr+0x2b0/0x2b0 [ 316.561601][T14169] ? eth_get_headlen+0x240/0x240 [ 316.566516][T14169] ? sock_def_write_space+0x1b9/0x2a0 [ 316.571872][T14169] ? __alloc_skb+0x88/0x4d0 [ 316.576355][T14169] should_failslab+0x5/0x20 [ 316.580854][T14169] kmem_cache_alloc+0x36/0x250 [ 316.585601][T14169] ? netif_rx+0x157/0x2b0 [ 316.589940][T14169] __alloc_skb+0x88/0x4d0 [ 316.594253][T14169] ? dev_queue_xmit_nit+0x946/0x9e0 [ 316.599458][T14169] alloc_skb_with_frags+0xb1/0x580 [ 316.604555][T14169] ? _local_bh_enable+0x30/0x30 [ 316.609782][T14169] sock_alloc_send_pskb+0x87e/0xcc0 [ 316.614969][T14169] ? sock_kzfree_s+0x50/0x50 [ 316.619740][T14169] __ip_append_data+0x1fbd/0x31b0 [ 316.624769][T14169] ? ip_do_fragment+0x2290/0x2290 [ 316.629778][T14169] ? ip_output+0x318/0x400 [ 316.634175][T14169] ? ip_setup_cork+0x810/0x810 [ 316.638924][T14169] ? ipv4_mtu+0x212/0x2c0 [ 316.643236][T14169] ? ip_setup_cork+0x46b/0x810 [ 316.648010][T14169] ip_make_skb+0x1c9/0x4d0 [ 316.652408][T14169] ? ip_do_fragment+0x2290/0x2290 [ 316.657414][T14169] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 316.663051][T14169] ? __sk_dst_check+0x1b0/0x1b0 [ 316.667892][T14169] ? udp_sendmsg+0x13ea/0x2e80 [ 316.672644][T14169] udp_sendmsg+0x1d1b/0x2e80 [ 316.677215][T14169] ? ip_do_fragment+0x2290/0x2290 [ 316.682225][T14169] ? udp_cmsg_send+0x340/0x340 [ 316.687001][T14169] ? selinux_socket_sendmsg+0x10b/0x320 [ 316.692544][T14169] ? selinux_socket_accept+0x580/0x580 [ 316.698003][T14169] ? rw_copy_check_uvector+0x6b/0x310 [ 316.703355][T14169] ? inet_send_prepare+0x1b7/0x470 [ 316.708453][T14169] ? inet_send_prepare+0x470/0x470 [ 316.713601][T14169] ____sys_sendmsg+0x56f/0x860 [ 316.718393][T14169] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 316.723629][T14169] ? udp_sendmsg+0x75b/0x2e80 [ 316.728300][T14169] ? __sys_sendmmsg+0x46f/0x680 [ 316.733187][T14169] __sys_sendmmsg+0x338/0x680 [ 316.737872][T14169] ? __ia32_sys_sendmsg+0x90/0x90 [ 316.742883][T14169] ? __rcu_read_lock+0x50/0x50 [ 316.747638][T14169] ? __kasan_slab_free+0x1e2/0x220 [ 316.752762][T14169] ? __kasan_slab_free+0x168/0x220 [ 316.757856][T14169] ? slab_free_freelist_hook+0xd0/0x150 [ 316.763460][T14169] ? kmem_cache_free+0xac/0x5c0 [ 316.768302][T14169] ? do_sys_open+0x4a3/0x620 [ 316.772872][T14169] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 316.778930][T14169] ? do_sys_open+0x2fc/0x620 [ 316.780440][T14173] overlayfs: filesystem on './file1' not supported [ 316.783550][T14169] ? proc_fail_nth_write+0x166/0x200 [ 316.783560][T14169] ? proc_fail_nth_read+0x1c0/0x1c0 [ 316.783572][T14169] ? ip4_datagram_release_cb+0x864/0xde0 [ 316.783579][T14169] ? proc_fail_nth_read+0x1c0/0x1c0 [ 316.783587][T14169] ? memset+0x1f/0x40 [ 316.783594][T14169] ? fsnotify+0x13a0/0x1460 [ 316.783612][T14169] ? __kernel_write+0x340/0x340 [ 316.825058][T14169] ? fsnotify+0x13a0/0x1460 [ 316.829560][T14169] ? security_file_permission+0x128/0x300 [ 316.835258][T14169] ? __sb_end_write+0xa4/0xf0 [ 316.839925][T14169] ? vfs_write+0x427/0x4f0 [ 316.844320][T14169] ? ksys_write+0x237/0x2a0 [ 316.848800][T14169] ? __ia32_sys_read+0x80/0x80 [ 316.853549][T14169] __x64_sys_sendmmsg+0x9c/0xb0 [ 316.858397][T14169] do_syscall_64+0xcb/0x150 [ 316.862894][T14169] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 316.868764][T14169] RIP: 0033:0x45de59 [ 316.872634][T14169] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.892215][T14169] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 316.900690][T14169] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 316.908658][T14169] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 316.916624][T14169] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 316.924659][T14169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000023 [ 316.932607][T14169] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:03 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x40000b, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:14:03 executing program 0 (fault-call:6 fault-nth:36): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 317.007693][T14183] FAULT_INJECTION: forcing a failure. [ 317.007693][T14183] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 317.020910][T14183] CPU: 0 PID: 14183 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 317.031028][T14183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.041065][T14183] Call Trace: [ 317.044348][T14183] dump_stack+0x1b0/0x21e [ 317.048673][T14183] ? devkmsg_release+0x11c/0x11c [ 317.053591][T14183] ? show_regs_print_info+0x12/0x12 [ 317.058795][T14183] should_fail+0x6fb/0x860 [ 317.063192][T14183] ? setup_fault_attr+0x2b0/0x2b0 [ 317.068207][T14183] ? ip_finish_output2+0xbdf/0x1810 [ 317.073392][T14183] ? udp_sendmsg+0x1d45/0x2e80 [ 317.078154][T14183] ? __sys_sendmmsg+0x338/0x680 [ 317.083001][T14183] __alloc_pages_nodemask+0x1ee/0x7c0 [ 317.088371][T14183] ? alloc_skb_with_frags+0xb1/0x580 [ 317.093628][T14183] ? sock_alloc_send_pskb+0x87e/0xcc0 [ 317.099013][T14183] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 317.104554][T14183] ? __sys_sendmmsg+0x338/0x680 [ 317.109383][T14183] ? skb_copy_bits+0x7e/0x7c0 [ 317.114042][T14183] alloc_slab_page+0x3a/0x390 [ 317.118701][T14183] new_slab+0x97/0x450 [ 317.122753][T14183] ? should_fail+0x182/0x860 [ 317.127338][T14183] ___slab_alloc+0x2e0/0x450 [ 317.131905][T14183] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 317.137270][T14183] ? skb_clone+0x1b2/0x370 [ 317.141659][T14183] ? skb_clone+0x1b2/0x370 [ 317.146063][T14183] kmem_cache_alloc+0x230/0x250 [ 317.150889][T14183] skb_clone+0x1b2/0x370 [ 317.155137][T14183] dev_queue_xmit_nit+0x279/0x9e0 [ 317.160157][T14183] xmit_one+0x7b/0x460 [ 317.164228][T14183] __dev_queue_xmit+0x1858/0x25d0 [ 317.169245][T14183] ? dev_queue_xmit+0x20/0x20 [ 317.173919][T14183] ? ip_finish_output2+0x936/0x1810 [ 317.179104][T14183] ip_finish_output2+0xbdf/0x1810 [ 317.184117][T14183] ? ip_fragment+0x210/0x210 [ 317.188689][T14183] ? __ip_finish_output+0x4e1/0x6d0 [ 317.193870][T14183] ip_output+0x318/0x400 [ 317.198135][T14183] ? ip_finish_output+0x1d0/0x1d0 [ 317.203143][T14183] ? ip_mc_finish_output+0x3a0/0x3a0 [ 317.208401][T14183] ? udp4_hwcsum+0x26b/0x430 [ 317.212965][T14183] ip_send_skb+0xaa/0x140 [ 317.217268][T14183] udp_send_skb+0x8e9/0x1100 [ 317.222013][T14183] udp_sendmsg+0x1d45/0x2e80 [ 317.226580][T14183] ? ip_do_fragment+0x2290/0x2290 [ 317.231577][T14183] ? udp_cmsg_send+0x340/0x340 [ 317.236340][T14183] ? selinux_socket_sendmsg+0x10b/0x320 [ 317.241881][T14183] ? selinux_socket_accept+0x580/0x580 [ 317.247456][T14183] ? rw_copy_check_uvector+0x6b/0x310 [ 317.252838][T14183] ? inet_send_prepare+0x1b7/0x470 [ 317.257989][T14183] ? inet_send_prepare+0x470/0x470 [ 317.263112][T14183] ____sys_sendmsg+0x56f/0x860 [ 317.267871][T14183] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 317.273071][T14183] ? udp_sendmsg+0x75b/0x2e80 [ 317.277731][T14183] ? __sys_sendmmsg+0x46f/0x680 [ 317.282572][T14183] __sys_sendmmsg+0x338/0x680 [ 317.287228][T14183] ? __ia32_sys_sendmsg+0x90/0x90 [ 317.292414][T14183] ? __rcu_read_lock+0x50/0x50 [ 317.297153][T14183] ? __kasan_slab_free+0x1e2/0x220 [ 317.302298][T14183] ? __kasan_slab_free+0x168/0x220 [ 317.307561][T14183] ? slab_free_freelist_hook+0xd0/0x150 [ 317.313180][T14183] ? kmem_cache_free+0xac/0x5c0 [ 317.318017][T14183] ? do_sys_open+0x4a3/0x620 [ 317.322596][T14183] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 317.328648][T14183] ? do_sys_open+0x2fc/0x620 [ 317.333216][T14183] ? proc_fail_nth_write+0x166/0x200 [ 317.338764][T14183] ? proc_fail_nth_read+0x1c0/0x1c0 [ 317.344032][T14183] ? ip4_datagram_release_cb+0x864/0xde0 [ 317.349663][T14183] ? proc_fail_nth_read+0x1c0/0x1c0 [ 317.354847][T14183] ? memset+0x1f/0x40 [ 317.358809][T14183] ? fsnotify+0x13a0/0x1460 [ 317.363284][T14183] ? __kernel_write+0x340/0x340 [ 317.368125][T14183] ? fsnotify+0x13a0/0x1460 [ 317.372618][T14183] ? security_file_permission+0x128/0x300 [ 317.378321][T14183] ? __sb_end_write+0xa4/0xf0 [ 317.383032][T14183] ? vfs_write+0x427/0x4f0 [ 317.387430][T14183] ? ksys_write+0x237/0x2a0 [ 317.391918][T14183] ? __ia32_sys_read+0x80/0x80 [ 317.396691][T14183] __x64_sys_sendmmsg+0x9c/0xb0 [ 317.401534][T14183] do_syscall_64+0xcb/0x150 [ 317.406208][T14183] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 317.412215][T14183] RIP: 0033:0x45de59 [ 317.416100][T14183] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.436719][T14183] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 317.445380][T14183] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 317.453712][T14183] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 317.462497][T14183] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 317.470465][T14183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000024 [ 317.478845][T14183] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:04 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000100)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:14:04 executing program 0 (fault-call:6 fault-nth:37): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 317.567819][T14180] FAT-fs (loop3): bogus logical sector size 64512 [ 317.575723][T14180] FAT-fs (loop3): Can't find a valid FAT filesystem [ 317.691533][T14182] EXT4-fs (loop2): inodes count not valid: 8192 vs 32 [ 317.701652][T14194] FAULT_INJECTION: forcing a failure. [ 317.701652][T14194] name failslab, interval 1, probability 0, space 0, times 0 [ 317.714387][T14194] CPU: 1 PID: 14194 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 317.725132][T14194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.735532][T14194] Call Trace: [ 317.738833][T14194] dump_stack+0x1b0/0x21e [ 317.743149][T14194] ? devkmsg_release+0x11c/0x11c [ 317.749468][T14194] ? show_regs_print_info+0x12/0x12 [ 317.754660][T14194] ? __copy_skb_header+0x429/0x560 [ 317.759771][T14194] should_fail+0x6fb/0x860 [ 317.764196][T14194] ? setup_fault_attr+0x2b0/0x2b0 [ 317.769329][T14194] ? eth_type_trans+0x2a3/0x680 [ 317.774180][T14194] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 317.779693][T14194] ? ___slab_alloc+0x9b/0x450 [ 317.784365][T14194] ? skb_clone+0x1b2/0x370 [ 317.788777][T14194] should_failslab+0x5/0x20 [ 317.793293][T14194] kmem_cache_alloc+0x36/0x250 [ 317.798037][T14194] skb_clone+0x1b2/0x370 [ 317.802294][T14194] dev_queue_xmit_nit+0x279/0x9e0 [ 317.807435][T14194] xmit_one+0x7b/0x460 [ 317.811501][T14194] __dev_queue_xmit+0x1858/0x25d0 [ 317.816516][T14194] ? dev_queue_xmit+0x20/0x20 [ 317.821299][T14194] ? ip_finish_output2+0x936/0x1810 [ 317.826584][T14194] ip_finish_output2+0xbdf/0x1810 [ 317.831610][T14194] ? ip_fragment+0x210/0x210 [ 317.836203][T14194] ? __ip_finish_output+0x4e1/0x6d0 [ 317.841392][T14194] ip_output+0x318/0x400 [ 317.845682][T14194] ? ip_finish_output+0x1d0/0x1d0 [ 317.850755][T14194] ? ip_mc_finish_output+0x3a0/0x3a0 [ 317.856025][T14194] ? udp4_hwcsum+0x26b/0x430 [ 317.860647][T14194] ip_send_skb+0xaa/0x140 [ 317.864961][T14194] udp_send_skb+0x8e9/0x1100 [ 317.869553][T14194] udp_sendmsg+0x1d45/0x2e80 [ 317.874164][T14194] ? ip_do_fragment+0x2290/0x2290 [ 317.879210][T14194] ? udp_cmsg_send+0x340/0x340 [ 317.883975][T14194] ? selinux_socket_sendmsg+0x10b/0x320 [ 317.889500][T14194] ? selinux_socket_accept+0x580/0x580 [ 317.895056][T14194] ? rw_copy_check_uvector+0x6b/0x310 [ 317.900433][T14194] ? inet_send_prepare+0x1b7/0x470 [ 317.905553][T14194] ? inet_send_prepare+0x470/0x470 [ 317.910661][T14194] ____sys_sendmsg+0x56f/0x860 [ 317.915407][T14194] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 317.920596][T14194] ? udp_sendmsg+0x75b/0x2e80 [ 317.925255][T14194] ? __sys_sendmmsg+0x46f/0x680 [ 317.930083][T14194] __sys_sendmmsg+0x338/0x680 [ 317.934746][T14194] ? __ia32_sys_sendmsg+0x90/0x90 [ 317.939882][T14194] ? __rcu_read_lock+0x50/0x50 [ 317.944648][T14194] ? __kasan_slab_free+0x1e2/0x220 [ 317.949887][T14194] ? __kasan_slab_free+0x168/0x220 [ 317.956114][T14194] ? slab_free_freelist_hook+0xd0/0x150 [ 317.961648][T14194] ? kmem_cache_free+0xac/0x5c0 [ 317.966481][T14194] ? do_sys_open+0x4a3/0x620 [ 317.974272][T14194] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 317.980324][T14194] ? do_sys_open+0x2fc/0x620 [ 317.984989][T14194] ? proc_fail_nth_write+0x166/0x200 [ 317.990260][T14194] ? proc_fail_nth_read+0x1c0/0x1c0 [ 317.995437][T14194] ? ip4_datagram_release_cb+0x864/0xde0 [ 318.001046][T14194] ? proc_fail_nth_read+0x1c0/0x1c0 [ 318.006227][T14194] ? memset+0x1f/0x40 [ 318.010184][T14194] ? fsnotify+0x13a0/0x1460 [ 318.014666][T14194] ? __kernel_write+0x340/0x340 [ 318.019507][T14194] ? fsnotify+0x13a0/0x1460 [ 318.024008][T14194] ? security_file_permission+0x128/0x300 [ 318.029905][T14194] ? __sb_end_write+0xa4/0xf0 [ 318.034562][T14194] ? vfs_write+0x427/0x4f0 [ 318.038979][T14194] ? ksys_write+0x237/0x2a0 [ 318.043457][T14194] ? __ia32_sys_read+0x80/0x80 [ 318.048197][T14194] __x64_sys_sendmmsg+0x9c/0xb0 [ 318.053026][T14194] do_syscall_64+0xcb/0x150 [ 318.057502][T14194] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 318.063385][T14194] RIP: 0033:0x45de59 [ 318.067252][T14194] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.086850][T14194] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 318.095250][T14194] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 318.103243][T14194] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 318.111200][T14194] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 318.119242][T14194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000025 [ 318.127394][T14194] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:04 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x3000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:04 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)={0xffffffffffffffff, 0x7ff, 0x1000000000000}) fcntl$setstatus(r2, 0x4, 0x800) 13:14:04 executing program 0 (fault-call:6 fault-nth:38): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200200000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 318.151234][T14201] overlayfs: failed to resolve './file1': -2 13:14:05 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x4000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:05 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x40000c, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:14:05 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x14800, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000140)) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) 13:14:05 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000100)={{0x2, 0x4e22, @empty}, {0x306}, 0x10, {0x2, 0x4e20, @rand_addr=0x64010101}, 'syz_tun\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) [ 318.306555][T14196] overlayfs: filesystem on './file1' not supported [ 318.340575][T14220] FAULT_INJECTION: forcing a failure. [ 318.340575][T14220] name failslab, interval 1, probability 0, space 0, times 0 [ 318.353589][T14220] CPU: 1 PID: 14220 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 318.363721][T14220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.374062][T14220] Call Trace: [ 318.377376][T14220] dump_stack+0x1b0/0x21e [ 318.381692][T14220] ? devkmsg_release+0x11c/0x11c [ 318.386630][T14220] ? show_regs_print_info+0x12/0x12 [ 318.391817][T14220] should_fail+0x6fb/0x860 [ 318.396225][T14220] ? setup_fault_attr+0x2b0/0x2b0 [ 318.401239][T14220] ? eth_get_headlen+0x240/0x240 [ 318.406150][T14220] ? sock_def_write_space+0x1b9/0x2a0 [ 318.411524][T14220] ? __alloc_skb+0x88/0x4d0 [ 318.416120][T14220] should_failslab+0x5/0x20 [ 318.420609][T14220] kmem_cache_alloc+0x36/0x250 [ 318.425817][T14220] ? netif_rx+0x157/0x2b0 [ 318.430179][T14220] __alloc_skb+0x88/0x4d0 [ 318.434491][T14220] ? dev_queue_xmit_nit+0x946/0x9e0 [ 318.439670][T14220] alloc_skb_with_frags+0xb1/0x580 [ 318.444783][T14220] ? _local_bh_enable+0x30/0x30 [ 318.449615][T14220] sock_alloc_send_pskb+0x87e/0xcc0 [ 318.454804][T14220] ? sock_kzfree_s+0x50/0x50 [ 318.460951][T14220] __ip_append_data+0x1fbd/0x31b0 [ 318.465971][T14220] ? ip_do_fragment+0x2290/0x2290 [ 318.470990][T14220] ? ip_output+0x318/0x400 [ 318.475470][T14220] ? ip_setup_cork+0x810/0x810 [ 318.480231][T14220] ? ipv4_mtu+0x212/0x2c0 [ 318.484569][T14220] ? ip_setup_cork+0x46b/0x810 [ 318.489315][T14220] ip_make_skb+0x1c9/0x4d0 [ 318.493842][T14220] ? ip_do_fragment+0x2290/0x2290 [ 318.498877][T14220] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 318.504510][T14220] ? __sk_dst_check+0x1b0/0x1b0 [ 318.509338][T14220] udp_sendmsg+0x1d1b/0x2e80 [ 318.513912][T14220] ? ip_do_fragment+0x2290/0x2290 [ 318.518911][T14220] ? udp_cmsg_send+0x340/0x340 [ 318.523669][T14220] ? selinux_socket_sendmsg+0x10b/0x320 [ 318.529193][T14220] ? selinux_socket_accept+0x580/0x580 [ 318.534637][T14220] ? rw_copy_check_uvector+0x6b/0x310 [ 318.540110][T14220] ? inet_send_prepare+0x1b7/0x470 [ 318.545203][T14220] ? inet_send_prepare+0x470/0x470 [ 318.550371][T14220] ____sys_sendmsg+0x56f/0x860 [ 318.555285][T14220] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 318.560473][T14220] ? udp_sendmsg+0x75b/0x2e80 [ 318.565143][T14220] ? __sys_sendmmsg+0x46f/0x680 [ 318.569981][T14220] __sys_sendmmsg+0x338/0x680 [ 318.574789][T14220] ? __ia32_sys_sendmsg+0x90/0x90 [ 318.579797][T14220] ? __rcu_read_lock+0x50/0x50 [ 318.584547][T14220] ? __kasan_slab_free+0x1e2/0x220 [ 318.589659][T14220] ? __kasan_slab_free+0x168/0x220 [ 318.594756][T14220] ? slab_free_freelist_hook+0xd0/0x150 [ 318.600287][T14220] ? kmem_cache_free+0xac/0x5c0 [ 318.605140][T14220] ? do_sys_open+0x4a3/0x620 [ 318.609864][T14220] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 318.615984][T14220] ? do_sys_open+0x2fc/0x620 [ 318.620562][T14220] ? proc_fail_nth_write+0x166/0x200 [ 318.625854][T14220] ? proc_fail_nth_read+0x1c0/0x1c0 [ 318.631033][T14220] ? ip4_datagram_release_cb+0x864/0xde0 [ 318.636647][T14220] ? proc_fail_nth_read+0x1c0/0x1c0 [ 318.641841][T14220] ? memset+0x1f/0x40 [ 318.645814][T14220] ? fsnotify+0x13a0/0x1460 [ 318.650316][T14220] ? __kernel_write+0x340/0x340 [ 318.655160][T14220] ? fsnotify+0x13a0/0x1460 [ 318.659642][T14220] ? security_file_permission+0x128/0x300 [ 318.665351][T14220] ? __sb_end_write+0xa4/0xf0 [ 318.670007][T14220] ? vfs_write+0x427/0x4f0 [ 318.674398][T14220] ? ksys_write+0x237/0x2a0 [ 318.678876][T14220] ? __ia32_sys_read+0x80/0x80 [ 318.683617][T14220] __x64_sys_sendmmsg+0x9c/0xb0 [ 318.688457][T14220] do_syscall_64+0xcb/0x150 [ 318.692935][T14220] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 318.698820][T14220] RIP: 0033:0x45de59 [ 318.702720][T14220] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.722318][T14220] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 318.730762][T14220] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 318.738724][T14220] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 318.746714][T14220] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 318.754666][T14220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000026 [ 318.762734][T14220] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:05 executing program 0 (fault-call:6 fault-nth:39): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:05 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x5000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 318.854264][T14222] EXT4-fs (loop2): inodes count not valid: 544 vs 32 [ 318.875316][T14225] overlayfs: filesystem on './file1' not supported [ 318.889003][T14233] FAULT_INJECTION: forcing a failure. [ 318.889003][T14233] name failslab, interval 1, probability 0, space 0, times 0 [ 318.902427][T14233] CPU: 0 PID: 14233 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 318.912586][T14233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.922629][T14233] Call Trace: [ 318.925931][T14233] dump_stack+0x1b0/0x21e [ 318.930597][T14233] ? devkmsg_release+0x11c/0x11c [ 318.935519][T14233] ? show_regs_print_info+0x12/0x12 [ 318.940708][T14233] should_fail+0x6fb/0x860 [ 318.945113][T14233] ? setup_fault_attr+0x2b0/0x2b0 [ 318.950128][T14233] ? eth_get_headlen+0x240/0x240 [ 318.955047][T14233] ? sock_def_write_space+0x1b9/0x2a0 [ 318.960394][T14233] ? alloc_skb_with_frags+0xb1/0x580 [ 318.965653][T14233] should_failslab+0x5/0x20 [ 318.970133][T14233] __kmalloc_track_caller+0x5d/0x2b0 [ 318.976976][T14233] ? kmem_cache_alloc+0x1d5/0x250 [ 318.981981][T14233] ? netif_rx+0x157/0x2b0 [ 318.986297][T14233] ? alloc_skb_with_frags+0xb1/0x580 [ 318.991571][T14233] __alloc_skb+0xd1/0x4d0 [ 318.995877][T14233] alloc_skb_with_frags+0xb1/0x580 [ 319.000977][T14233] ? _local_bh_enable+0x30/0x30 [ 319.005813][T14233] sock_alloc_send_pskb+0x87e/0xcc0 [ 319.011018][T14233] ? sock_kzfree_s+0x50/0x50 [ 319.015702][T14233] __ip_append_data+0x1fbd/0x31b0 [ 319.020719][T14233] ? ip_do_fragment+0x2290/0x2290 [ 319.025729][T14233] ? ip_output+0x318/0x400 [ 319.030120][T14233] ? ip_setup_cork+0x810/0x810 [ 319.034867][T14233] ? ipv4_mtu+0x212/0x2c0 [ 319.039204][T14233] ? ip_setup_cork+0x46b/0x810 [ 319.044139][T14233] ip_make_skb+0x1c9/0x4d0 [ 319.048547][T14233] ? ip_do_fragment+0x2290/0x2290 [ 319.053562][T14233] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 319.059183][T14233] ? __sk_dst_check+0x1b0/0x1b0 [ 319.064011][T14233] udp_sendmsg+0x1d1b/0x2e80 [ 319.068588][T14233] ? ip_do_fragment+0x2290/0x2290 [ 319.073589][T14233] ? udp_cmsg_send+0x340/0x340 [ 319.078326][T14233] ? selinux_socket_sendmsg+0x10b/0x320 [ 319.083852][T14233] ? selinux_socket_accept+0x580/0x580 [ 319.089289][T14233] ? rw_copy_check_uvector+0x6b/0x310 [ 319.094648][T14233] ? inet_send_prepare+0x1b7/0x470 [ 319.099750][T14233] ? inet_send_prepare+0x470/0x470 [ 319.105036][T14233] ____sys_sendmsg+0x56f/0x860 [ 319.109973][T14233] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 319.115163][T14233] ? udp_sendmsg+0x75b/0x2e80 [ 319.119834][T14233] ? __sys_sendmmsg+0x46f/0x680 [ 319.128175][T14233] __sys_sendmmsg+0x338/0x680 [ 319.132835][T14233] ? __ia32_sys_sendmsg+0x90/0x90 [ 319.137862][T14233] ? __rcu_read_lock+0x50/0x50 [ 319.142616][T14233] ? __kasan_slab_free+0x1e2/0x220 [ 319.147702][T14233] ? __kasan_slab_free+0x168/0x220 [ 319.152791][T14233] ? slab_free_freelist_hook+0xd0/0x150 [ 319.158322][T14233] ? kmem_cache_free+0xac/0x5c0 [ 319.163163][T14233] ? do_sys_open+0x4a3/0x620 [ 319.167753][T14233] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 319.173802][T14233] ? do_sys_open+0x2fc/0x620 [ 319.178397][T14233] ? proc_fail_nth_write+0x166/0x200 [ 319.183668][T14233] ? proc_fail_nth_read+0x1c0/0x1c0 [ 319.188848][T14233] ? ip4_datagram_release_cb+0x864/0xde0 [ 319.194462][T14233] ? proc_fail_nth_read+0x1c0/0x1c0 [ 319.199766][T14233] ? memset+0x1f/0x40 [ 319.203747][T14233] ? fsnotify+0x13a0/0x1460 [ 319.208229][T14233] ? __kernel_write+0x340/0x340 [ 319.213059][T14233] ? fsnotify+0x13a0/0x1460 [ 319.217565][T14233] ? security_file_permission+0x128/0x300 [ 319.223286][T14233] ? __sb_end_write+0xa4/0xf0 [ 319.227959][T14233] ? vfs_write+0x427/0x4f0 [ 319.232374][T14233] ? ksys_write+0x237/0x2a0 [ 319.236857][T14233] ? __ia32_sys_read+0x80/0x80 [ 319.241638][T14233] __x64_sys_sendmmsg+0x9c/0xb0 [ 319.246482][T14233] do_syscall_64+0xcb/0x150 [ 319.250966][T14233] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 319.256999][T14233] RIP: 0033:0x45de59 [ 319.260868][T14233] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 319.281113][T14233] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 319.289520][T14233] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 319.297648][T14233] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 13:14:06 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x40000d, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:14:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200300000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 319.305621][T14233] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 319.313616][T14233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000027 [ 319.321861][T14233] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 319.333139][T14240] overlayfs: filesystem on './file1' not supported 13:14:06 executing program 0 (fault-call:6 fault-nth:40): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:06 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, 0x1, 0x3, 0x201, 0x0, 0x0, {0x3, 0x0, 0x1}, [@NFQA_VLAN={0x24, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x6}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}]}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x5d}}]}, 0x44}, 0x1, 0x0, 0x0, 0x960461506c178d00}, 0x40880) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r4 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r4, 0x82307201, &(0x7f00000001c0)) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SYNC(r5, 0x9408, 0x0) 13:14:06 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) readlinkat(r0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000200)=""/39, 0x27) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r1, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r1, 0x82307201, &(0x7f00000001c0)) [ 319.530740][T14253] FAULT_INJECTION: forcing a failure. [ 319.530740][T14253] name failslab, interval 1, probability 0, space 0, times 0 [ 319.543596][T14253] CPU: 1 PID: 14253 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 319.553753][T14253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.563804][T14253] Call Trace: [ 319.567079][T14253] dump_stack+0x1b0/0x21e [ 319.571386][T14253] ? devkmsg_release+0x11c/0x11c [ 319.576749][T14253] ? show_regs_print_info+0x12/0x12 [ 319.581923][T14253] ? __copy_skb_header+0x429/0x560 [ 319.587011][T14253] should_fail+0x6fb/0x860 [ 319.591418][T14253] ? setup_fault_attr+0x2b0/0x2b0 [ 319.596422][T14253] ? eth_type_trans+0x2a3/0x680 [ 319.601262][T14253] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 319.606609][T14253] ? skb_clone+0x1b2/0x370 [ 319.611004][T14253] should_failslab+0x5/0x20 [ 319.615482][T14253] kmem_cache_alloc+0x36/0x250 [ 319.620233][T14253] skb_clone+0x1b2/0x370 [ 319.624462][T14253] dev_queue_xmit_nit+0x279/0x9e0 [ 319.629497][T14253] xmit_one+0x7b/0x460 [ 319.633040][T14256] overlayfs: failed to resolve './file1': -2 [ 319.633572][T14253] __dev_queue_xmit+0x1858/0x25d0 [ 319.633585][T14253] ? dev_queue_xmit+0x20/0x20 [ 319.633609][T14253] ? ip_finish_output2+0x936/0x1810 [ 319.654561][T14253] ip_finish_output2+0xbdf/0x1810 [ 319.659563][T14253] ? ip_fragment+0x210/0x210 [ 319.664140][T14253] ? __ip_finish_output+0x4e1/0x6d0 [ 319.669604][T14253] ip_output+0x318/0x400 [ 319.673843][T14253] ? ip_finish_output+0x1d0/0x1d0 [ 319.678929][T14253] ? ip_mc_finish_output+0x3a0/0x3a0 [ 319.684841][T14253] ? udp4_hwcsum+0x26b/0x430 [ 319.690014][T14253] ip_send_skb+0xaa/0x140 [ 319.694316][T14253] udp_send_skb+0x8e9/0x1100 [ 319.699578][T14253] udp_sendmsg+0x1d45/0x2e80 [ 319.704181][T14253] ? ip_do_fragment+0x2290/0x2290 [ 319.709194][T14253] ? udp_cmsg_send+0x340/0x340 [ 319.713982][T14253] ? selinux_socket_sendmsg+0x10b/0x320 [ 319.719588][T14253] ? selinux_socket_accept+0x580/0x580 [ 319.725032][T14253] ? rw_copy_check_uvector+0x6b/0x310 [ 319.730381][T14253] ? inet_send_prepare+0x1b7/0x470 [ 319.735646][T14253] ? inet_send_prepare+0x470/0x470 [ 319.740751][T14253] ____sys_sendmsg+0x56f/0x860 [ 319.745497][T14253] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 319.750679][T14253] ? udp_sendmsg+0x75b/0x2e80 [ 319.755419][T14253] ? __sys_sendmmsg+0x46f/0x680 [ 319.760264][T14253] __sys_sendmmsg+0x338/0x680 [ 319.764927][T14253] ? __ia32_sys_sendmsg+0x90/0x90 [ 319.770046][T14253] ? __rcu_read_lock+0x50/0x50 [ 319.775259][T14253] ? __kasan_slab_free+0x1e2/0x220 [ 319.780675][T14253] ? __kasan_slab_free+0x168/0x220 [ 319.785776][T14253] ? slab_free_freelist_hook+0xd0/0x150 [ 319.791555][T14253] ? kmem_cache_free+0xac/0x5c0 [ 319.796377][T14253] ? do_sys_open+0x4a3/0x620 [ 319.800937][T14253] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 319.806990][T14253] ? do_sys_open+0x2fc/0x620 [ 319.811552][T14253] ? proc_fail_nth_write+0x166/0x200 [ 319.816826][T14253] ? proc_fail_nth_read+0x1c0/0x1c0 [ 319.822107][T14253] ? ip4_datagram_release_cb+0x864/0xde0 [ 319.828256][T14253] ? proc_fail_nth_read+0x1c0/0x1c0 [ 319.833461][T14253] ? memset+0x1f/0x40 [ 319.837423][T14253] ? fsnotify+0x13a0/0x1460 [ 319.841930][T14253] ? __kernel_write+0x340/0x340 [ 319.846934][T14253] ? fsnotify+0x13a0/0x1460 [ 319.853106][T14253] ? security_file_permission+0x128/0x300 [ 319.859252][T14253] ? __sb_end_write+0xa4/0xf0 [ 319.865148][T14253] ? vfs_write+0x427/0x4f0 [ 319.869549][T14253] ? ksys_write+0x237/0x2a0 [ 319.874040][T14253] ? __ia32_sys_read+0x80/0x80 [ 319.878910][T14253] __x64_sys_sendmmsg+0x9c/0xb0 [ 319.884195][T14253] do_syscall_64+0xcb/0x150 [ 319.888693][T14253] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 319.895270][T14253] RIP: 0033:0x45de59 [ 319.899152][T14253] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 319.919001][T14253] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 319.927574][T14253] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 319.935986][T14253] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 319.945336][T14253] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 319.954079][T14253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000028 [ 319.962131][T14253] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:06 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000340)='./file1/file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000000380)="040005090000006174000404090a0200027400f8050015ffe1e94de7d1e6e9d5da00", 0x22}], 0x808894, &(0x7f00000004c0)=ANY=[]) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) accept4$inet6(r2, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x80000) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000002c0)={0x3f, 0x3c}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r4 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000300)={0x6, 0xef42, 0x1, 0x5d01}, 0x10) r5 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r5, 0x82307201, &(0x7f00000001c0)) 13:14:06 executing program 0 (fault-call:6 fault-nth:41): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:06 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x6000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 320.047435][T14254] EXT4-fs (loop2): inodes count not valid: 800 vs 32 13:14:06 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x40000e, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:14:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200400000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 320.101342][T14255] overlayfs: filesystem on './file1' not supported [ 320.111815][T14271] FAULT_INJECTION: forcing a failure. [ 320.111815][T14271] name failslab, interval 1, probability 0, space 0, times 0 [ 320.125457][T14271] CPU: 0 PID: 14271 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 320.135784][T14271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.145832][T14271] Call Trace: [ 320.149127][T14271] dump_stack+0x1b0/0x21e [ 320.153467][T14271] ? devkmsg_release+0x11c/0x11c [ 320.158514][T14271] ? show_regs_print_info+0x12/0x12 [ 320.163717][T14271] should_fail+0x6fb/0x860 [ 320.168135][T14271] ? setup_fault_attr+0x2b0/0x2b0 [ 320.173695][T14271] ? eth_get_headlen+0x240/0x240 [ 320.178666][T14271] ? sock_def_write_space+0x1b9/0x2a0 [ 320.184047][T14271] ? __alloc_skb+0x88/0x4d0 [ 320.188549][T14271] should_failslab+0x5/0x20 [ 320.193131][T14271] kmem_cache_alloc+0x36/0x250 [ 320.197906][T14271] ? netif_rx+0x157/0x2b0 [ 320.202408][T14271] __alloc_skb+0x88/0x4d0 [ 320.206753][T14271] ? dev_queue_xmit_nit+0x946/0x9e0 [ 320.211947][T14271] alloc_skb_with_frags+0xb1/0x580 [ 320.217058][T14271] ? _local_bh_enable+0x30/0x30 [ 320.221928][T14271] sock_alloc_send_pskb+0x87e/0xcc0 [ 320.227120][T14271] ? sock_kzfree_s+0x50/0x50 [ 320.231707][T14271] __ip_append_data+0x1fbd/0x31b0 [ 320.236815][T14271] ? ip_do_fragment+0x2290/0x2290 [ 320.241850][T14271] ? ip_output+0x318/0x400 [ 320.246268][T14271] ? ip_setup_cork+0x810/0x810 [ 320.251025][T14271] ? ipv4_mtu+0x212/0x2c0 [ 320.255358][T14271] ? ip_setup_cork+0x46b/0x810 [ 320.260120][T14271] ip_make_skb+0x1c9/0x4d0 [ 320.264550][T14271] ? ip_do_fragment+0x2290/0x2290 [ 320.269576][T14271] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 320.275203][T14271] ? __sk_dst_check+0x1b0/0x1b0 [ 320.280046][T14271] udp_sendmsg+0x1d1b/0x2e80 [ 320.284814][T14271] ? ip_do_fragment+0x2290/0x2290 [ 320.289847][T14271] ? udp_cmsg_send+0x340/0x340 [ 320.294607][T14271] ? selinux_socket_sendmsg+0x10b/0x320 [ 320.300346][T14271] ? selinux_socket_accept+0x580/0x580 [ 320.305814][T14271] ? rw_copy_check_uvector+0x6b/0x310 [ 320.311789][T14271] ? inet_send_prepare+0x1b7/0x470 [ 320.316913][T14271] ? inet_send_prepare+0x470/0x470 [ 320.322542][T14271] ____sys_sendmsg+0x56f/0x860 [ 320.327302][T14271] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 320.332507][T14271] ? udp_sendmsg+0x75b/0x2e80 [ 320.337176][T14271] ? __sys_sendmmsg+0x46f/0x680 [ 320.342017][T14271] __sys_sendmmsg+0x338/0x680 [ 320.346690][T14271] ? __ia32_sys_sendmsg+0x90/0x90 [ 320.351726][T14271] ? __rcu_read_lock+0x50/0x50 [ 320.356494][T14271] ? __kasan_slab_free+0x1e2/0x220 [ 320.361604][T14271] ? __kasan_slab_free+0x168/0x220 [ 320.366729][T14271] ? slab_free_freelist_hook+0xd0/0x150 [ 320.372269][T14271] ? kmem_cache_free+0xac/0x5c0 [ 320.377135][T14271] ? do_sys_open+0x4a3/0x620 [ 320.381734][T14271] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 320.387806][T14271] ? do_sys_open+0x2fc/0x620 [ 320.392404][T14271] ? proc_fail_nth_write+0x166/0x200 [ 320.397694][T14271] ? proc_fail_nth_read+0x1c0/0x1c0 [ 320.403148][T14271] ? ip4_datagram_release_cb+0x864/0xde0 [ 320.409915][T14271] ? proc_fail_nth_read+0x1c0/0x1c0 [ 320.415122][T14271] ? memset+0x1f/0x40 [ 320.419096][T14271] ? fsnotify+0x13a0/0x1460 [ 320.424036][T14271] ? __kernel_write+0x340/0x340 [ 320.432061][T14271] ? fsnotify+0x13a0/0x1460 [ 320.436564][T14271] ? security_file_permission+0x128/0x300 [ 320.442280][T14271] ? __sb_end_write+0xa4/0xf0 [ 320.447057][T14271] ? vfs_write+0x427/0x4f0 [ 320.452078][T14271] ? ksys_write+0x237/0x2a0 [ 320.456607][T14271] ? __ia32_sys_read+0x80/0x80 [ 320.461629][T14271] __x64_sys_sendmmsg+0x9c/0xb0 [ 320.467298][T14271] do_syscall_64+0xcb/0x150 [ 320.471823][T14271] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 320.477734][T14271] RIP: 0033:0x45de59 [ 320.482594][T14271] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.502636][T14271] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 320.511144][T14271] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 320.519122][T14271] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 320.527086][T14271] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 320.535048][T14271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000029 [ 320.543015][T14271] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:07 executing program 0 (fault-call:6 fault-nth:42): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 320.561791][T14275] EXT4-fs (loop2): inodes count not valid: 1056 vs 32 13:14:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200500000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:07 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661740004040200027400f8010000", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000300)='./file1\x00', 0x20880, 0x48) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x490420, 0x0) sendmsg$NL80211_CMD_STOP_NAN(r5, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="14101100822ee2bdd3230b8927891dcaa357e0e15b9064e46a220e4b364d4177cafbc976638b0f5e0ec700ffd7b3", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fcdbdf2574000000"], 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x80) getdents(r4, &(0x7f0000000400)=""/4096, 0x1000) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) [ 320.673349][T14285] overlayfs: failed to resolve './file1': -2 [ 320.772861][T14288] FAULT_INJECTION: forcing a failure. [ 320.772861][T14288] name failslab, interval 1, probability 0, space 0, times 0 [ 320.785929][T14288] CPU: 1 PID: 14288 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 320.796085][T14288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.806180][T14288] Call Trace: [ 320.809566][T14288] dump_stack+0x1b0/0x21e [ 320.813891][T14288] ? devkmsg_release+0x11c/0x11c 13:14:07 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x7000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 320.818828][T14288] ? show_regs_print_info+0x12/0x12 [ 320.824052][T14288] should_fail+0x6fb/0x860 [ 320.828470][T14288] ? setup_fault_attr+0x2b0/0x2b0 [ 320.833480][T14288] ? eth_get_headlen+0x240/0x240 [ 320.838395][T14288] ? sock_def_write_space+0x1b9/0x2a0 [ 320.844144][T14288] ? alloc_skb_with_frags+0xb1/0x580 [ 320.849544][T14288] should_failslab+0x5/0x20 [ 320.854060][T14288] __kmalloc_track_caller+0x5d/0x2b0 [ 320.859533][T14288] ? kmem_cache_alloc+0x1d5/0x250 [ 320.864559][T14288] ? netif_rx+0x157/0x2b0 [ 320.868869][T14288] ? alloc_skb_with_frags+0xb1/0x580 [ 320.874139][T14288] __alloc_skb+0xd1/0x4d0 [ 320.878453][T14288] alloc_skb_with_frags+0xb1/0x580 [ 320.883608][T14288] ? _local_bh_enable+0x30/0x30 [ 320.888454][T14288] sock_alloc_send_pskb+0x87e/0xcc0 [ 320.893745][T14288] ? sock_kzfree_s+0x50/0x50 [ 320.898319][T14288] __ip_append_data+0x1fbd/0x31b0 [ 320.903353][T14288] ? ip_do_fragment+0x2290/0x2290 [ 320.908371][T14288] ? ip_output+0x318/0x400 [ 320.912780][T14288] ? ip_setup_cork+0x810/0x810 [ 320.917545][T14288] ? ipv4_mtu+0x212/0x2c0 [ 320.921867][T14288] ? ip_setup_cork+0x46b/0x810 [ 320.926626][T14288] ip_make_skb+0x1c9/0x4d0 [ 320.931026][T14288] ? ip_do_fragment+0x2290/0x2290 [ 320.936042][T14288] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 320.941688][T14288] ? __sk_dst_check+0x1b0/0x1b0 [ 320.946532][T14288] udp_sendmsg+0x1d1b/0x2e80 [ 320.951128][T14288] ? ip_do_fragment+0x2290/0x2290 [ 320.956157][T14288] ? udp_cmsg_send+0x340/0x340 [ 320.961077][T14288] ? selinux_socket_sendmsg+0x10b/0x320 [ 320.966646][T14288] ? selinux_socket_accept+0x580/0x580 [ 320.972704][T14288] ? rw_copy_check_uvector+0x6b/0x310 [ 320.978148][T14288] ? inet_send_prepare+0x1b7/0x470 [ 320.983425][T14288] ? inet_send_prepare+0x470/0x470 [ 320.988565][T14288] ____sys_sendmsg+0x56f/0x860 [ 320.993334][T14288] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 320.999440][T14288] ? udp_sendmsg+0x75b/0x2e80 [ 321.004121][T14288] ? __sys_sendmmsg+0x46f/0x680 [ 321.008951][T14288] __sys_sendmmsg+0x338/0x680 [ 321.014223][T14288] ? __ia32_sys_sendmsg+0x90/0x90 [ 321.019244][T14288] ? __rcu_read_lock+0x50/0x50 [ 321.023984][T14288] ? __pv_queued_spin_lock_slowpath+0x842/0xc40 [ 321.030214][T14288] ? proc_fail_nth_write+0x166/0x200 [ 321.035485][T14288] ? proc_fail_nth_read+0x1c0/0x1c0 [ 321.040668][T14288] ? proc_fail_nth_read+0x1c0/0x1c0 [ 321.045857][T14288] ? memset+0x1f/0x40 [ 321.049815][T14288] ? fsnotify+0x13a0/0x1460 [ 321.054324][T14288] ? __kernel_write+0x340/0x340 [ 321.059164][T14288] ? __schedule+0x8ae/0xe30 [ 321.063666][T14288] ? security_file_permission+0x128/0x300 [ 321.069503][T14288] ? __sb_end_write+0xa4/0xf0 [ 321.074192][T14288] ? vfs_write+0x427/0x4f0 [ 321.078696][T14288] ? __fpregs_load_activate+0x2d3/0x390 [ 321.084220][T14288] ? retint_kernel+0x1b/0x1b [ 321.088798][T14288] ? switch_fpu_return+0x10/0x10 [ 321.093842][T14288] ? do_syscall_64+0x80/0x150 [ 321.098497][T14288] __x64_sys_sendmmsg+0x9c/0xb0 [ 321.103341][T14288] do_syscall_64+0xcb/0x150 [ 321.107823][T14288] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 321.113697][T14288] RIP: 0033:0x45de59 [ 321.117570][T14288] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 321.137162][T14288] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 321.145672][T14288] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 321.153796][T14288] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 321.161859][T14288] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 321.169817][T14288] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002a [ 321.177768][T14288] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:08 executing program 0 (fault-call:6 fault-nth:43): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 321.222930][T14290] EXT4-fs (loop2): inodes count not valid: 1312 vs 32 13:14:08 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)={0x0, 0x54, "07ab55c40ed02d255c6aaf02cbf7734fcabeac734f25adfb9531f59560c75f1369721dda01eb80349b9e2af8836abd2751293b5ba7087a09c46816a083a81c464194d6b30b3650b2e8a4d2b97f8dbf3526c6efa6"}) chdir(&(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', &(0x7f0000000200), 0x6000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r3, 0x82307201, &(0x7f00000001c0)) 13:14:08 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 321.321597][T14285] overlayfs: filesystem on './file1' not supported [ 321.359997][T14300] FAULT_INJECTION: forcing a failure. 13:14:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200600000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 321.359997][T14300] name failslab, interval 1, probability 0, space 0, times 0 [ 321.368811][T14297] FAT-fs (loop3): invalid media value (0x00) [ 321.372934][T14300] CPU: 0 PID: 14300 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 321.372946][T14300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.378960][T14297] FAT-fs (loop3): Can't find a valid FAT filesystem [ 321.389072][T14300] Call Trace: [ 321.389096][T14300] dump_stack+0x1b0/0x21e [ 321.389104][T14300] ? devkmsg_release+0x11c/0x11c [ 321.389112][T14300] ? show_regs_print_info+0x12/0x12 [ 321.389120][T14300] ? __copy_skb_header+0x429/0x560 [ 321.389127][T14300] should_fail+0x6fb/0x860 [ 321.389134][T14300] ? setup_fault_attr+0x2b0/0x2b0 [ 321.389143][T14300] ? eth_type_trans+0x2a3/0x680 [ 321.389150][T14300] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 321.389158][T14300] ? skb_clone+0x1b2/0x370 [ 321.389172][T14300] should_failslab+0x5/0x20 [ 321.457154][T14300] kmem_cache_alloc+0x36/0x250 [ 321.461902][T14300] skb_clone+0x1b2/0x370 [ 321.466146][T14300] dev_queue_xmit_nit+0x279/0x9e0 [ 321.471176][T14300] xmit_one+0x7b/0x460 [ 321.475251][T14300] __dev_queue_xmit+0x1858/0x25d0 [ 321.480255][T14300] ? dev_queue_xmit+0x20/0x20 [ 321.484907][T14300] ? ip_finish_output2+0x936/0x1810 [ 321.490153][T14300] ip_finish_output2+0xbdf/0x1810 [ 321.495161][T14300] ? ip_fragment+0x210/0x210 [ 321.499777][T14300] ? __ip_finish_output+0x4e1/0x6d0 [ 321.504974][T14300] ip_output+0x318/0x400 [ 321.509190][T14300] ? ip_finish_output+0x1d0/0x1d0 [ 321.514186][T14300] ? ip_mc_finish_output+0x3a0/0x3a0 [ 321.519527][T14300] ? udp4_hwcsum+0x26b/0x430 [ 321.524112][T14300] ip_send_skb+0xaa/0x140 [ 321.528507][T14300] udp_send_skb+0x8e9/0x1100 [ 321.533092][T14300] udp_sendmsg+0x1d45/0x2e80 [ 321.538345][T14300] ? ip_do_fragment+0x2290/0x2290 [ 321.543357][T14300] ? udp_cmsg_send+0x340/0x340 [ 321.548101][T14300] ? selinux_socket_sendmsg+0x10b/0x320 [ 321.553627][T14300] ? selinux_socket_accept+0x580/0x580 [ 321.559062][T14300] ? rw_copy_check_uvector+0x6b/0x310 [ 321.564410][T14300] ? inet_send_prepare+0x1b7/0x470 [ 321.569512][T14300] ? inet_send_prepare+0x470/0x470 [ 321.574602][T14300] ____sys_sendmsg+0x56f/0x860 [ 321.579749][T14300] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 321.584978][T14300] ? udp_sendmsg+0x75b/0x2e80 [ 321.589641][T14300] ? __sys_sendmmsg+0x46f/0x680 [ 321.594499][T14300] __sys_sendmmsg+0x338/0x680 [ 321.599160][T14300] ? __ia32_sys_sendmsg+0x90/0x90 [ 321.604174][T14300] ? __rcu_read_lock+0x50/0x50 [ 321.608914][T14300] ? __kasan_slab_free+0x1e2/0x220 [ 321.614001][T14300] ? __kasan_slab_free+0x168/0x220 [ 321.619108][T14300] ? slab_free_freelist_hook+0xd0/0x150 [ 321.624638][T14300] ? kmem_cache_free+0xac/0x5c0 [ 321.629469][T14300] ? do_sys_open+0x4a3/0x620 [ 321.634065][T14300] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 321.640124][T14300] ? do_sys_open+0x2fc/0x620 [ 321.644709][T14300] ? proc_fail_nth_write+0x166/0x200 [ 321.649991][T14300] ? proc_fail_nth_read+0x1c0/0x1c0 [ 321.655298][T14300] ? ip4_datagram_release_cb+0x864/0xde0 [ 321.660918][T14300] ? proc_fail_nth_read+0x1c0/0x1c0 [ 321.666178][T14300] ? memset+0x1f/0x40 [ 321.670888][T14300] ? fsnotify+0x13a0/0x1460 [ 321.675379][T14300] ? __kernel_write+0x340/0x340 [ 321.680217][T14300] ? fsnotify+0x13a0/0x1460 [ 321.684693][T14300] ? security_file_permission+0x128/0x300 [ 321.690396][T14300] ? __sb_end_write+0xa4/0xf0 [ 321.695079][T14300] ? vfs_write+0x427/0x4f0 [ 321.699482][T14300] ? ksys_write+0x237/0x2a0 [ 321.703957][T14300] ? __ia32_sys_read+0x80/0x80 [ 321.708700][T14300] __x64_sys_sendmmsg+0x9c/0xb0 [ 321.713527][T14300] do_syscall_64+0xcb/0x150 [ 321.718020][T14300] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 321.723885][T14300] RIP: 0033:0x45de59 [ 321.727808][T14300] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 321.747648][T14300] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 321.756199][T14300] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 321.764183][T14300] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 321.772166][T14300] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 321.780123][T14300] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002b [ 321.788078][T14300] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:08 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x8000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:08 executing program 0 (fault-call:6 fault-nth:44): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:08 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x24, 0x1, 0x4, 0x101, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x6}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4001}, 0x24004004) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) [ 321.892845][T14297] FAT-fs (loop3): invalid media value (0x00) [ 321.892871][T14313] EXT4-fs (loop2): inodes count not valid: 1568 vs 32 [ 321.900040][T14297] FAT-fs (loop3): Can't find a valid FAT filesystem [ 321.979856][T14322] FAULT_INJECTION: forcing a failure. [ 321.979856][T14322] name failslab, interval 1, probability 0, space 0, times 0 [ 321.992746][T14322] CPU: 0 PID: 14322 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 322.002880][T14322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.012935][T14322] Call Trace: [ 322.016214][T14322] dump_stack+0x1b0/0x21e [ 322.020529][T14322] ? devkmsg_release+0x11c/0x11c [ 322.025474][T14322] ? show_regs_print_info+0x12/0x12 [ 322.030642][T14322] should_fail+0x6fb/0x860 [ 322.035054][T14322] ? setup_fault_attr+0x2b0/0x2b0 [ 322.040062][T14322] ? eth_get_headlen+0x240/0x240 [ 322.044988][T14322] ? sock_def_write_space+0x1b9/0x2a0 [ 322.050530][T14322] ? __alloc_skb+0x88/0x4d0 [ 322.055031][T14322] should_failslab+0x5/0x20 [ 322.059551][T14322] kmem_cache_alloc+0x36/0x250 [ 322.064307][T14322] ? netif_rx+0x157/0x2b0 [ 322.068643][T14322] __alloc_skb+0x88/0x4d0 [ 322.072962][T14322] ? dev_queue_xmit_nit+0x946/0x9e0 [ 322.076501][T14324] overlayfs: failed to resolve './file1': -2 [ 322.078144][T14322] alloc_skb_with_frags+0xb1/0x580 [ 322.078155][T14322] ? _local_bh_enable+0x30/0x30 [ 322.078164][T14322] sock_alloc_send_pskb+0x87e/0xcc0 [ 322.078176][T14322] ? sock_kzfree_s+0x50/0x50 [ 322.078188][T14322] __ip_append_data+0x1fbd/0x31b0 [ 322.078200][T14322] ? ip_do_fragment+0x2290/0x2290 [ 322.078208][T14322] ? ip_output+0x318/0x400 [ 322.078217][T14322] ? ip_setup_cork+0x810/0x810 [ 322.078224][T14322] ? ipv4_mtu+0x212/0x2c0 [ 322.078233][T14322] ? ip_setup_cork+0x46b/0x810 [ 322.078243][T14322] ip_make_skb+0x1c9/0x4d0 [ 322.078253][T14322] ? ip_do_fragment+0x2290/0x2290 [ 322.078262][T14322] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 322.078273][T14322] ? __sk_dst_check+0x1b0/0x1b0 [ 322.078281][T14322] udp_sendmsg+0x1d1b/0x2e80 [ 322.078293][T14322] ? ip_do_fragment+0x2290/0x2290 [ 322.078300][T14322] ? udp_cmsg_send+0x340/0x340 [ 322.078312][T14322] ? selinux_socket_sendmsg+0x10b/0x320 [ 322.078321][T14322] ? selinux_socket_accept+0x580/0x580 [ 322.078332][T14322] ? rw_copy_check_uvector+0x6b/0x310 [ 322.078342][T14322] ? inet_send_prepare+0x1b7/0x470 [ 322.078351][T14322] ? inet_send_prepare+0x470/0x470 [ 322.078360][T14322] ____sys_sendmsg+0x56f/0x860 [ 322.078371][T14322] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 322.078379][T14322] ? udp_sendmsg+0x75b/0x2e80 [ 322.078387][T14322] ? __sys_sendmmsg+0x46f/0x680 [ 322.078397][T14322] __sys_sendmmsg+0x338/0x680 [ 322.078408][T14322] ? __ia32_sys_sendmsg+0x90/0x90 [ 322.078417][T14322] ? __rcu_read_lock+0x50/0x50 [ 322.078431][T14322] ? __kasan_slab_free+0x1e2/0x220 [ 322.232611][T14322] ? __kasan_slab_free+0x168/0x220 [ 322.237763][T14322] ? slab_free_freelist_hook+0xd0/0x150 [ 322.243305][T14322] ? kmem_cache_free+0xac/0x5c0 [ 322.248143][T14322] ? do_sys_open+0x4a3/0x620 [ 322.252732][T14322] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 322.258931][T14322] ? do_sys_open+0x2fc/0x620 [ 322.263519][T14322] ? proc_fail_nth_write+0x166/0x200 [ 322.268805][T14322] ? proc_fail_nth_read+0x1c0/0x1c0 [ 322.273986][T14322] ? ip4_datagram_release_cb+0x864/0xde0 [ 322.279608][T14322] ? proc_fail_nth_read+0x1c0/0x1c0 [ 322.284796][T14322] ? memset+0x1f/0x40 [ 322.288759][T14322] ? fsnotify+0x13a0/0x1460 [ 322.293276][T14322] ? __kernel_write+0x340/0x340 [ 322.298131][T14322] ? fsnotify+0x13a0/0x1460 [ 322.302615][T14322] ? security_file_permission+0x128/0x300 [ 322.308327][T14322] ? __sb_end_write+0xa4/0xf0 [ 322.313003][T14322] ? vfs_write+0x427/0x4f0 [ 322.317411][T14322] ? ksys_write+0x237/0x2a0 [ 322.321902][T14322] ? __ia32_sys_read+0x80/0x80 [ 322.326658][T14322] __x64_sys_sendmmsg+0x9c/0xb0 [ 322.331490][T14322] do_syscall_64+0xcb/0x150 [ 322.335984][T14322] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 322.341868][T14322] RIP: 0033:0x45de59 [ 322.345826][T14322] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.365648][T14322] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 322.374036][T14322] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 322.382348][T14322] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 322.390329][T14322] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 322.398297][T14322] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002c [ 322.406368][T14322] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:09 executing program 0 (fault-call:6 fault-nth:45): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) socket$netlink(0x10, 0x3, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000140)={'veth0_to_batadv\x00', {0x2, 0x0, @broadcast}}) r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r2, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:14:09 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400010, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:14:09 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x5, &(0x7f0000000300)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}, {&(0x7f0000000200)="1254fba8f6a249a9d4edb1cd7d9687e2132afd94cf7f9f640c23694d8a23937f3668d5c740478a578ffa13eff3bba00db45d3f36daf25e8d6e56643b8e73a669b7396cc00c42d18e5addb6eb994af0bd793be888253ed5d30a9233c0cf8c97132d1b36be9a0bc3878116109f9acc93f06e6d3e6a19a49a91e6ef8df96c0337443bed5dacac87773ae2c0371e241d6c9eb392f39d160ff56e2ed8d5261125294928ccec1cc0c2ce923950e99d461304a95ac056d331fbc804393f4a53e431ffafbab52a91ed1f9763e97a7ac962a9134aa6d8c04a72b3b37af53359dd31", 0xdd, 0xf4}, {&(0x7f0000000400)="889a0a738542e423fa49287bd96cc3f8a5d425fd1cfda5e45e41f2a921625bb0885435eef6131999569056b9be45bce018375921b564641294ded16c3cb3c4019315568f1cee58841ca87f175122af112e742d6a76d96c8d4df8352a973c8b52ae9c778d2dcb51051fcddd3d135659b59d17e8c7110cd60a7aec893d48b2d73ddfac0913c230ec5f55e9bd7c02346f56cc9e77ec0fb2a748f55cb163e7e3be2050ef56f5bfba1fc96de74607e4d1fc774623ad32e5e51aba4f6134135a53b17f8113492fc3555badc45442ab36a94411eb09ede05863a60a7b1a49dd69721a728f9fb844759b06cc", 0xe8, 0x39}, {&(0x7f0000000500)="860a96682d02e13f1c19327eb989e2295e0cd130587f602024a0c33638c63f770347e2a9e1c1c948e08ced380216e283fe4984efe34c81a36befb31fd3fd9893dab87d638d8d9d60b51242b39ee1b8575ad373b157c3281f89b9c63b9687b1e5c7159c03d722624a2b9e1ee9d39e49905c1a2cacd2e5cae5867b0be886939a6a642310aea08413e23122d8e50af9a35f710599958ea25eed8e1686d2173277a2ebcf72614d537fdf8c519244437cfaad5b988bdb026d4755aabaf09ac2d51daebe45bb304e2ec6322520b2c7f113cd06a101641d7e2f0a77c89d1d9b7f9186538ca57cf093", 0xe5, 0x9}, {&(0x7f0000000100)="d0b408996d20fe7ff3303afbea8888488317b404768e453ee29e3d1111bfc6e5ef723d4fc84641b58c4b6e80f3af0dcf94c87f515736e2f8417ea9a948f08ddff6fa94d1b1533080f0f5c672a3a1e2c169fddfe6bd3e94d8d4144b305d2019440df294fc7d543246c536", 0x6a, 0xaa8}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:14:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200700000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 322.582506][T14334] FAULT_INJECTION: forcing a failure. [ 322.582506][T14334] name failslab, interval 1, probability 0, space 0, times 0 [ 322.596092][T14334] CPU: 0 PID: 14334 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 322.606363][T14334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.616419][T14334] Call Trace: [ 322.619707][T14334] dump_stack+0x1b0/0x21e [ 322.624042][T14334] ? devkmsg_release+0x11c/0x11c [ 322.628978][T14334] ? show_regs_print_info+0x12/0x12 [ 322.634164][T14334] should_fail+0x6fb/0x860 [ 322.638599][T14334] ? setup_fault_attr+0x2b0/0x2b0 [ 322.643616][T14334] ? ___slab_alloc+0x9b/0x450 [ 322.648279][T14334] ? eth_get_headlen+0x240/0x240 [ 322.653211][T14334] ? sock_def_write_space+0x1b9/0x2a0 [ 322.658573][T14334] ? alloc_skb_with_frags+0xb1/0x580 [ 322.663847][T14334] should_failslab+0x5/0x20 [ 322.668338][T14334] __kmalloc_track_caller+0x5d/0x2b0 [ 322.673618][T14334] ? kmem_cache_alloc+0x1d5/0x250 [ 322.678633][T14334] ? alloc_skb_with_frags+0xb1/0x580 [ 322.683906][T14334] __alloc_skb+0xd1/0x4d0 [ 322.688228][T14334] alloc_skb_with_frags+0xb1/0x580 [ 322.693369][T14334] ? _local_bh_enable+0x30/0x30 [ 322.698231][T14334] sock_alloc_send_pskb+0x87e/0xcc0 [ 322.703451][T14334] ? sock_kzfree_s+0x50/0x50 [ 322.708054][T14334] __ip_append_data+0x1fbd/0x31b0 [ 322.713078][T14334] ? ip_do_fragment+0x2290/0x2290 [ 322.718122][T14334] ? ip_output+0x318/0x400 [ 322.722530][T14334] ? ip_setup_cork+0x810/0x810 [ 322.727286][T14334] ? ipv4_mtu+0x212/0x2c0 [ 322.731621][T14334] ? ip_setup_cork+0x46b/0x810 [ 322.736380][T14334] ip_make_skb+0x1c9/0x4d0 [ 322.740793][T14334] ? ip_do_fragment+0x2290/0x2290 [ 322.745808][T14334] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 322.751441][T14334] ? __sk_dst_check+0x1b0/0x1b0 [ 322.756295][T14334] udp_sendmsg+0x1d1b/0x2e80 [ 322.760883][T14334] ? ip_do_fragment+0x2290/0x2290 [ 322.765910][T14334] ? udp_cmsg_send+0x340/0x340 [ 322.770701][T14334] ? selinux_socket_sendmsg+0x10b/0x320 [ 322.776252][T14334] ? selinux_socket_accept+0x580/0x580 [ 322.781712][T14334] ? rw_copy_check_uvector+0x6b/0x310 [ 322.787087][T14334] ? inet_send_prepare+0x1b7/0x470 [ 322.792195][T14334] ? inet_send_prepare+0x470/0x470 [ 322.797296][T14334] ____sys_sendmsg+0x56f/0x860 [ 322.802061][T14334] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 322.807266][T14334] ? udp_sendmsg+0x75b/0x2e80 [ 322.811955][T14334] ? __sys_sendmmsg+0x46f/0x680 [ 322.816868][T14334] __sys_sendmmsg+0x338/0x680 [ 322.821550][T14334] ? __ia32_sys_sendmsg+0x90/0x90 [ 322.826569][T14334] ? __rcu_read_lock+0x50/0x50 [ 322.831353][T14334] ? __kasan_slab_free+0x1e2/0x220 [ 322.837514][T14334] ? __kasan_slab_free+0x168/0x220 [ 322.842620][T14334] ? slab_free_freelist_hook+0xd0/0x150 [ 322.848158][T14334] ? kmem_cache_free+0xac/0x5c0 [ 322.853019][T14334] ? do_sys_open+0x4a3/0x620 [ 322.857600][T14334] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 322.863677][T14334] ? do_sys_open+0x2fc/0x620 [ 322.868291][T14334] ? proc_fail_nth_write+0x166/0x200 [ 322.873577][T14334] ? proc_fail_nth_read+0x1c0/0x1c0 [ 322.878768][T14334] ? ip4_datagram_release_cb+0x864/0xde0 [ 322.884423][T14334] ? proc_fail_nth_read+0x1c0/0x1c0 [ 322.889617][T14334] ? memset+0x1f/0x40 [ 322.893591][T14334] ? fsnotify+0x13a0/0x1460 [ 322.898089][T14334] ? __kernel_write+0x340/0x340 [ 322.902929][T14334] ? fsnotify+0x13a0/0x1460 [ 322.907425][T14334] ? security_file_permission+0x128/0x300 [ 322.913137][T14334] ? __sb_end_write+0xa4/0xf0 [ 322.917803][T14334] ? vfs_write+0x427/0x4f0 [ 322.922208][T14334] ? ksys_write+0x237/0x2a0 [ 322.926706][T14334] ? __ia32_sys_read+0x80/0x80 [ 322.931457][T14334] __x64_sys_sendmmsg+0x9c/0xb0 [ 322.936298][T14334] do_syscall_64+0xcb/0x150 [ 322.940793][T14334] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 322.946678][T14334] RIP: 0033:0x45de59 [ 322.950564][T14334] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.970168][T14334] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 13:14:09 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x9000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 322.978571][T14334] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 322.986534][T14334] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 322.994515][T14334] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 323.002476][T14334] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002d [ 323.010478][T14334] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:09 executing program 0 (fault-call:6 fault-nth:46): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000000c0)) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) [ 323.175406][T14358] FAULT_INJECTION: forcing a failure. [ 323.175406][T14358] name failslab, interval 1, probability 0, space 0, times 0 [ 323.188146][T14358] CPU: 0 PID: 14358 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 323.198442][T14358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.208586][T14358] Call Trace: [ 323.211879][T14358] dump_stack+0x1b0/0x21e [ 323.216286][T14358] ? devkmsg_release+0x11c/0x11c [ 323.221223][T14358] ? show_regs_print_info+0x12/0x12 [ 323.226652][T14358] ? __copy_skb_header+0x429/0x560 [ 323.231801][T14358] should_fail+0x6fb/0x860 [ 323.236212][T14358] ? setup_fault_attr+0x2b0/0x2b0 [ 323.241330][T14358] ? eth_type_trans+0x2a3/0x680 [ 323.247331][T14358] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 323.252980][T14358] ? skb_clone+0x1b2/0x370 [ 323.257412][T14358] should_failslab+0x5/0x20 [ 323.261911][T14358] kmem_cache_alloc+0x36/0x250 [ 323.266663][T14358] skb_clone+0x1b2/0x370 [ 323.270888][T14358] dev_queue_xmit_nit+0x279/0x9e0 [ 323.275904][T14358] xmit_one+0x7b/0x460 [ 323.279982][T14358] __dev_queue_xmit+0x1858/0x25d0 [ 323.285001][T14358] ? dev_queue_xmit+0x20/0x20 [ 323.289675][T14358] ? ip_finish_output2+0x936/0x1810 [ 323.294855][T14358] ip_finish_output2+0xbdf/0x1810 [ 323.299911][T14358] ? ip_fragment+0x210/0x210 [ 323.304496][T14358] ? __ip_finish_output+0x4e1/0x6d0 [ 323.309674][T14358] ip_output+0x318/0x400 [ 323.313959][T14358] ? ip_finish_output+0x1d0/0x1d0 [ 323.319019][T14358] ? ip_mc_finish_output+0x3a0/0x3a0 [ 323.324292][T14358] ? udp4_hwcsum+0x26b/0x430 [ 323.328934][T14358] ip_send_skb+0xaa/0x140 [ 323.333251][T14358] udp_send_skb+0x8e9/0x1100 [ 323.337848][T14358] udp_sendmsg+0x1d45/0x2e80 [ 323.342487][T14358] ? ip_do_fragment+0x2290/0x2290 [ 323.347545][T14358] ? udp_cmsg_send+0x340/0x340 [ 323.352289][T14358] ? selinux_socket_sendmsg+0x10b/0x320 [ 323.358770][T14358] ? selinux_socket_accept+0x580/0x580 [ 323.364322][T14358] ? rw_copy_check_uvector+0x6b/0x310 [ 323.374196][T14358] ? inet_send_prepare+0x1b7/0x470 [ 323.379309][T14358] ? inet_send_prepare+0x470/0x470 [ 323.384425][T14358] ____sys_sendmsg+0x56f/0x860 [ 323.389179][T14358] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 323.394362][T14358] ? udp_sendmsg+0x75b/0x2e80 [ 323.399025][T14358] ? __sys_sendmmsg+0x46f/0x680 [ 323.403872][T14358] __sys_sendmmsg+0x338/0x680 [ 323.408528][T14358] ? __ia32_sys_sendmsg+0x90/0x90 [ 323.413566][T14358] ? __rcu_read_lock+0x50/0x50 [ 323.418307][T14358] ? __kasan_slab_free+0x1e2/0x220 [ 323.423400][T14358] ? __kasan_slab_free+0x168/0x220 [ 323.428490][T14358] ? slab_free_freelist_hook+0xd0/0x150 [ 323.434020][T14358] ? kmem_cache_free+0xac/0x5c0 [ 323.438853][T14358] ? do_sys_open+0x4a3/0x620 [ 323.443577][T14358] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 323.449655][T14358] ? do_sys_open+0x2fc/0x620 [ 323.454241][T14358] ? proc_fail_nth_write+0x166/0x200 [ 323.459534][T14358] ? proc_fail_nth_read+0x1c0/0x1c0 [ 323.464729][T14358] ? ip4_datagram_release_cb+0x864/0xde0 [ 323.470361][T14358] ? proc_fail_nth_read+0x1c0/0x1c0 [ 323.475563][T14358] ? memset+0x1f/0x40 [ 323.479541][T14358] ? fsnotify+0x13a0/0x1460 [ 323.484025][T14358] ? __kernel_write+0x340/0x340 [ 323.488867][T14358] ? fsnotify+0x13a0/0x1460 [ 323.493374][T14358] ? security_file_permission+0x128/0x300 [ 323.499157][T14358] ? __sb_end_write+0xa4/0xf0 [ 323.503812][T14358] ? vfs_write+0x427/0x4f0 [ 323.508230][T14358] ? ksys_write+0x237/0x2a0 [ 323.512710][T14358] ? __ia32_sys_read+0x80/0x80 [ 323.517462][T14358] __x64_sys_sendmmsg+0x9c/0xb0 [ 323.522297][T14358] do_syscall_64+0xcb/0x150 [ 323.526796][T14358] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 323.532670][T14358] RIP: 0033:0x45de59 [ 323.536560][T14358] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.556140][T14358] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 323.564530][T14358] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 323.572502][T14358] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 323.580583][T14358] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 323.588557][T14358] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002e [ 323.596514][T14358] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 323.613271][T14360] overlayfs: failed to resolve './file1': -2 13:14:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200800000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:10 executing program 0 (fault-call:6 fault-nth:47): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 323.625566][T14347] EXT4-fs (loop2): inodes count not valid: 1824 vs 32 [ 323.640273][T14356] FAT-fs (loop5): Unrecognized mount option "I/ÃU[­ÄTB«6©Dë íàXc¦ [ 323.640273][T14356] {IÝirrŸ¸Du›Ì" or missing value 13:14:10 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400011, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 323.734395][T14356] FAT-fs (loop5): Unrecognized mount option "I/ÃU[­ÄTB«6©Dë íàXc¦ [ 323.734395][T14356] {IÝirrŸ¸Du›Ì" or missing value [ 323.749013][T14357] overlayfs: filesystem on './file1' not supported [ 323.765356][T14373] FAULT_INJECTION: forcing a failure. [ 323.765356][T14373] name failslab, interval 1, probability 0, space 0, times 0 [ 323.779533][T14373] CPU: 0 PID: 14373 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 323.789717][T14373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.800463][T14373] Call Trace: [ 323.803756][T14373] dump_stack+0x1b0/0x21e [ 323.808104][T14373] ? devkmsg_release+0x11c/0x11c [ 323.813067][T14373] ? show_regs_print_info+0x12/0x12 [ 323.818872][T14373] should_fail+0x6fb/0x860 [ 323.823559][T14373] ? setup_fault_attr+0x2b0/0x2b0 [ 323.828785][T14373] ? eth_get_headlen+0x240/0x240 [ 323.833720][T14373] ? sock_def_write_space+0x1b9/0x2a0 [ 323.839182][T14373] ? __alloc_skb+0x88/0x4d0 [ 323.844736][T14373] should_failslab+0x5/0x20 [ 323.849241][T14373] kmem_cache_alloc+0x36/0x250 [ 323.854095][T14373] ? netif_rx+0x157/0x2b0 [ 323.858416][T14373] __alloc_skb+0x88/0x4d0 [ 323.862829][T14373] ? dev_queue_xmit_nit+0x946/0x9e0 [ 323.868112][T14373] alloc_skb_with_frags+0xb1/0x580 [ 323.875143][T14373] ? _local_bh_enable+0x30/0x30 [ 323.880260][T14373] sock_alloc_send_pskb+0x87e/0xcc0 [ 323.885560][T14373] ? sock_kzfree_s+0x50/0x50 [ 323.890150][T14373] __ip_append_data+0x1fbd/0x31b0 [ 323.895189][T14373] ? ip_do_fragment+0x2290/0x2290 [ 323.901101][T14373] ? ip_output+0x318/0x400 [ 323.905879][T14373] ? ip_setup_cork+0x810/0x810 [ 323.910744][T14373] ? ipv4_mtu+0x212/0x2c0 [ 323.915245][T14373] ? ip_setup_cork+0x46b/0x810 [ 323.920003][T14373] ip_make_skb+0x1c9/0x4d0 [ 323.924868][T14373] ? ip_do_fragment+0x2290/0x2290 [ 323.930147][T14373] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 323.936132][T14373] ? __sk_dst_check+0x1b0/0x1b0 [ 323.941004][T14373] udp_sendmsg+0x1d1b/0x2e80 [ 323.945611][T14373] ? ip_do_fragment+0x2290/0x2290 [ 323.950626][T14373] ? udp_cmsg_send+0x340/0x340 [ 323.955393][T14373] ? selinux_socket_sendmsg+0x10b/0x320 [ 323.960971][T14373] ? selinux_socket_accept+0x580/0x580 [ 323.966524][T14373] ? rw_copy_check_uvector+0x6b/0x310 [ 323.971996][T14373] ? inet_send_prepare+0x1b7/0x470 [ 323.977384][T14373] ? inet_send_prepare+0x470/0x470 [ 323.982507][T14373] ____sys_sendmsg+0x56f/0x860 [ 323.987289][T14373] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 323.993099][T14373] ? udp_sendmsg+0x75b/0x2e80 [ 323.997873][T14373] ? __sys_sendmmsg+0x46f/0x680 [ 324.002722][T14373] __sys_sendmmsg+0x338/0x680 [ 324.008621][T14373] ? __ia32_sys_sendmsg+0x90/0x90 [ 324.013642][T14373] ? __rcu_read_lock+0x50/0x50 [ 324.018425][T14373] ? __kasan_slab_free+0x1e2/0x220 [ 324.023528][T14373] ? __kasan_slab_free+0x168/0x220 [ 324.028721][T14373] ? slab_free_freelist_hook+0xd0/0x150 [ 324.034260][T14373] ? kmem_cache_free+0xac/0x5c0 [ 324.039120][T14373] ? do_sys_open+0x4a3/0x620 [ 324.043722][T14373] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 324.049784][T14373] ? do_sys_open+0x2fc/0x620 [ 324.054367][T14373] ? proc_fail_nth_write+0x166/0x200 [ 324.059663][T14373] ? proc_fail_nth_read+0x1c0/0x1c0 [ 324.064860][T14373] ? ip4_datagram_release_cb+0x864/0xde0 [ 324.070487][T14373] ? proc_fail_nth_read+0x1c0/0x1c0 [ 324.075699][T14373] ? memset+0x1f/0x40 [ 324.079693][T14373] ? fsnotify+0x13a0/0x1460 [ 324.084187][T14373] ? __kernel_write+0x340/0x340 [ 324.089030][T14373] ? fsnotify+0x13a0/0x1460 [ 324.093530][T14373] ? security_file_permission+0x128/0x300 [ 324.099240][T14373] ? __sb_end_write+0xa4/0xf0 [ 324.103927][T14373] ? vfs_write+0x427/0x4f0 [ 324.108337][T14373] ? ksys_write+0x237/0x2a0 [ 324.112834][T14373] ? __ia32_sys_read+0x80/0x80 [ 324.117591][T14373] __x64_sys_sendmmsg+0x9c/0xb0 [ 324.122435][T14373] do_syscall_64+0xcb/0x150 [ 324.126946][T14373] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 324.132833][T14373] RIP: 0033:0x45de59 [ 324.136716][T14373] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.156334][T14373] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 324.164741][T14373] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 324.172704][T14373] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 13:14:11 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) [ 324.180755][T14373] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 324.188808][T14373] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002f [ 324.196775][T14373] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:11 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xa000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:11 executing program 0 (fault-call:6 fault-nth:48): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 324.231508][T14366] FAT-fs (loop3): bogus number of reserved sectors [ 324.238137][T14366] FAT-fs (loop3): Can't find a valid FAT filesystem [ 324.249948][T14381] overlayfs: filesystem on './file1' not supported [ 324.288108][T14372] EXT4-fs (loop2): inodes count not valid: 2080 vs 32 [ 324.324154][T14381] overlayfs: filesystem on './file1' not supported 13:14:11 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400012, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 324.333274][T14389] FAULT_INJECTION: forcing a failure. [ 324.333274][T14389] name failslab, interval 1, probability 0, space 0, times 0 [ 324.345960][T14389] CPU: 1 PID: 14389 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 324.356102][T14389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.366773][T14389] Call Trace: [ 324.370074][T14389] dump_stack+0x1b0/0x21e [ 324.374423][T14389] ? devkmsg_release+0x11c/0x11c [ 324.379380][T14389] ? show_regs_print_info+0x12/0x12 [ 324.384572][T14389] should_fail+0x6fb/0x860 [ 324.388983][T14389] ? setup_fault_attr+0x2b0/0x2b0 [ 324.394001][T14389] ? eth_get_headlen+0x240/0x240 [ 324.398934][T14389] ? sock_def_write_space+0x1b9/0x2a0 [ 324.404301][T14389] ? alloc_skb_with_frags+0xb1/0x580 [ 324.409576][T14389] should_failslab+0x5/0x20 [ 324.414078][T14389] __kmalloc_track_caller+0x5d/0x2b0 [ 324.419356][T14389] ? kmem_cache_alloc+0x1d5/0x250 [ 324.424372][T14389] ? netif_rx+0x157/0x2b0 [ 324.428694][T14389] ? alloc_skb_with_frags+0xb1/0x580 [ 324.433970][T14389] __alloc_skb+0xd1/0x4d0 [ 324.438302][T14389] alloc_skb_with_frags+0xb1/0x580 [ 324.443405][T14389] ? _local_bh_enable+0x30/0x30 [ 324.448249][T14389] sock_alloc_send_pskb+0x87e/0xcc0 [ 324.453457][T14389] ? sock_kzfree_s+0x50/0x50 [ 324.458038][T14389] __ip_append_data+0x1fbd/0x31b0 [ 324.463057][T14389] ? ip_do_fragment+0x2290/0x2290 [ 324.468076][T14389] ? ip_output+0x318/0x400 [ 324.472498][T14389] ? ip_setup_cork+0x810/0x810 [ 324.477249][T14389] ? ipv4_mtu+0x212/0x2c0 [ 324.481573][T14389] ? ip_setup_cork+0x46b/0x810 [ 324.486338][T14389] ip_make_skb+0x1c9/0x4d0 [ 324.490831][T14389] ? ip_do_fragment+0x2290/0x2290 [ 324.495844][T14389] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 324.501466][T14389] ? __sk_dst_check+0x1b0/0x1b0 [ 324.506321][T14389] udp_sendmsg+0x1d1b/0x2e80 [ 324.510927][T14389] ? ip_do_fragment+0x2290/0x2290 [ 324.515959][T14389] ? udp_cmsg_send+0x340/0x340 [ 324.520717][T14389] ? selinux_socket_sendmsg+0x10b/0x320 [ 324.526257][T14389] ? selinux_socket_accept+0x580/0x580 [ 324.531706][T14389] ? rw_copy_check_uvector+0x6b/0x310 [ 324.537076][T14389] ? inet_send_prepare+0x1b7/0x470 [ 324.542188][T14389] ? inet_send_prepare+0x470/0x470 [ 324.547293][T14389] ____sys_sendmsg+0x56f/0x860 [ 324.552053][T14389] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 324.557270][T14389] ? udp_sendmsg+0x75b/0x2e80 [ 324.561956][T14389] ? __sys_sendmmsg+0x46f/0x680 [ 324.566812][T14389] __sys_sendmmsg+0x338/0x680 [ 324.571513][T14389] ? __ia32_sys_sendmsg+0x90/0x90 [ 324.576535][T14389] ? __rcu_read_lock+0x50/0x50 [ 324.581293][T14389] ? __kasan_slab_free+0x1e2/0x220 [ 324.586414][T14389] ? __kasan_slab_free+0x168/0x220 [ 324.591544][T14389] ? slab_free_freelist_hook+0xd0/0x150 [ 324.597100][T14389] ? kmem_cache_free+0xac/0x5c0 [ 324.601957][T14389] ? do_sys_open+0x4a3/0x620 [ 324.606571][T14389] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 324.612645][T14389] ? do_sys_open+0x2fc/0x620 [ 324.617266][T14389] ? proc_fail_nth_write+0x166/0x200 [ 324.622552][T14389] ? proc_fail_nth_read+0x1c0/0x1c0 [ 324.627756][T14389] ? ip4_datagram_release_cb+0x864/0xde0 [ 324.633389][T14389] ? proc_fail_nth_read+0x1c0/0x1c0 [ 324.638605][T14389] ? memset+0x1f/0x40 [ 324.642590][T14389] ? fsnotify+0x13a0/0x1460 [ 324.647178][T14389] ? __kernel_write+0x340/0x340 [ 324.652028][T14389] ? fsnotify+0x13a0/0x1460 [ 324.656558][T14389] ? security_file_permission+0x128/0x300 [ 324.662287][T14389] ? __sb_end_write+0xa4/0xf0 [ 324.666964][T14389] ? vfs_write+0x427/0x4f0 [ 324.671376][T14389] ? ksys_write+0x237/0x2a0 [ 324.675876][T14389] ? __ia32_sys_read+0x80/0x80 [ 324.680661][T14389] __x64_sys_sendmmsg+0x9c/0xb0 [ 324.685514][T14389] do_syscall_64+0xcb/0x150 [ 324.690034][T14389] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 324.696009][T14389] RIP: 0033:0x45de59 [ 324.699891][T14389] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.719484][T14389] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 324.727895][T14389] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 324.735864][T14389] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 324.743836][T14389] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 324.751813][T14389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000030 [ 324.759903][T14389] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 324.782856][T14366] FAT-fs (loop3): bogus number of reserved sectors 13:14:11 executing program 0 (fault-call:6 fault-nth:49): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200900000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 324.790543][T14366] FAT-fs (loop3): Can't find a valid FAT filesystem [ 324.816436][T14400] FAULT_INJECTION: forcing a failure. [ 324.816436][T14400] name failslab, interval 1, probability 0, space 0, times 0 [ 324.829330][T14400] CPU: 1 PID: 14400 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 324.839490][T14400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.849785][T14400] Call Trace: [ 324.853190][T14400] dump_stack+0x1b0/0x21e [ 324.857625][T14400] ? devkmsg_release+0x11c/0x11c [ 324.862643][T14400] ? show_regs_print_info+0x12/0x12 [ 324.867932][T14400] ? __copy_skb_header+0x429/0x560 [ 324.873181][T14400] should_fail+0x6fb/0x860 [ 324.878702][T14400] ? setup_fault_attr+0x2b0/0x2b0 [ 324.883738][T14400] ? eth_type_trans+0x2a3/0x680 [ 324.888573][T14400] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 324.893928][T14400] ? ___slab_alloc+0x9b/0x450 [ 324.898609][T14400] ? skb_clone+0x1b2/0x370 [ 324.903025][T14400] should_failslab+0x5/0x20 [ 324.907562][T14400] kmem_cache_alloc+0x36/0x250 [ 324.912340][T14400] skb_clone+0x1b2/0x370 [ 324.916566][T14400] dev_queue_xmit_nit+0x279/0x9e0 [ 324.921718][T14400] xmit_one+0x7b/0x460 [ 324.925831][T14400] __dev_queue_xmit+0x1858/0x25d0 [ 324.930869][T14400] ? dev_queue_xmit+0x20/0x20 [ 324.935544][T14400] ? ip_finish_output2+0x936/0x1810 [ 324.940744][T14400] ip_finish_output2+0xbdf/0x1810 [ 324.945753][T14400] ? ip_fragment+0x210/0x210 [ 324.950323][T14400] ? __ip_finish_output+0x4e1/0x6d0 [ 324.955517][T14400] ip_output+0x318/0x400 [ 324.959767][T14400] ? ip_finish_output+0x1d0/0x1d0 [ 324.964768][T14400] ? ip_mc_finish_output+0x3a0/0x3a0 [ 324.970043][T14400] ? udp4_hwcsum+0x26b/0x430 [ 324.974625][T14400] ip_send_skb+0xaa/0x140 [ 324.978930][T14400] udp_send_skb+0x8e9/0x1100 [ 324.983501][T14400] udp_sendmsg+0x1d45/0x2e80 [ 324.988073][T14400] ? ip_do_fragment+0x2290/0x2290 [ 324.993082][T14400] ? udp_cmsg_send+0x340/0x340 [ 324.997831][T14400] ? selinux_socket_sendmsg+0x10b/0x320 [ 325.003351][T14400] ? selinux_socket_accept+0x580/0x580 [ 325.008805][T14400] ? rw_copy_check_uvector+0x6b/0x310 [ 325.014170][T14400] ? inet_send_prepare+0x1b7/0x470 [ 325.019283][T14400] ? inet_send_prepare+0x470/0x470 [ 325.024403][T14400] ____sys_sendmsg+0x56f/0x860 [ 325.029154][T14400] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 325.034340][T14400] ? udp_sendmsg+0x75b/0x2e80 [ 325.038991][T14400] ? __sys_sendmmsg+0x46f/0x680 [ 325.043819][T14400] __sys_sendmmsg+0x338/0x680 [ 325.048490][T14400] ? __ia32_sys_sendmsg+0x90/0x90 [ 325.053507][T14400] ? __rcu_read_lock+0x50/0x50 [ 325.058272][T14400] ? __kasan_slab_free+0x1e2/0x220 [ 325.063369][T14400] ? __kasan_slab_free+0x168/0x220 [ 325.068473][T14400] ? slab_free_freelist_hook+0xd0/0x150 [ 325.074000][T14400] ? kmem_cache_free+0xac/0x5c0 [ 325.078843][T14400] ? do_sys_open+0x4a3/0x620 [ 325.083413][T14400] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 325.089476][T14400] ? do_sys_open+0x2fc/0x620 [ 325.094046][T14400] ? proc_fail_nth_write+0x166/0x200 [ 325.099311][T14400] ? proc_fail_nth_read+0x1c0/0x1c0 [ 325.104490][T14400] ? ip4_datagram_release_cb+0x864/0xde0 [ 325.110100][T14400] ? proc_fail_nth_read+0x1c0/0x1c0 [ 325.115297][T14400] ? memset+0x1f/0x40 [ 325.119282][T14400] ? fsnotify+0x13a0/0x1460 [ 325.123772][T14400] ? __kernel_write+0x340/0x340 [ 325.128600][T14400] ? fsnotify+0x13a0/0x1460 [ 325.133106][T14400] ? security_file_permission+0x128/0x300 [ 325.138806][T14400] ? __sb_end_write+0xa4/0xf0 [ 325.143477][T14400] ? vfs_write+0x427/0x4f0 [ 325.147927][T14400] ? ksys_write+0x237/0x2a0 [ 325.152434][T14400] ? __ia32_sys_read+0x80/0x80 [ 325.157177][T14400] __x64_sys_sendmmsg+0x9c/0xb0 [ 325.162006][T14400] do_syscall_64+0xcb/0x150 [ 325.166577][T14400] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 325.172446][T14400] RIP: 0033:0x45de59 [ 325.176314][T14400] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.195897][T14400] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 325.205647][T14400] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 325.213605][T14400] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 325.221560][T14400] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 325.229512][T14400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000031 13:14:12 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) renameat(r0, &(0x7f0000000140)='./file1\x00', r0, &(0x7f0000000200)='./file1\x00') r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setfsuid(0x0) getdents(r1, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r1, 0x82307201, &(0x7f00000001c0)) [ 325.237462][T14400] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:12 executing program 0 (fault-call:6 fault-nth:50): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000006c0)={'syztnl2\x00', &(0x7f0000000640)={'syztnl2\x00', 0x0, 0x0, 0x81, 0x2, 0x2000000, 0x12, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x3, 0x100}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f00000001c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18fa8ff89740001c2f9fa0b3836005404b0e0301a4ce875f2e31760163ee34004000000000000000000010101013c5811039e1577501eecce66fd6e2bbf0e5bf5ff1b0816f3f6db1c0001000000000000003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="c70800002a00fb490ddcff5489814856af999f5b", @ANYRES32=r3], 0x2}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000005f40)={'tunl0\x00', &(0x7f0000005ec0)={'ip_vti0\x00', 0x0, 0x8000, 0x10, 0xffff, 0x3, {{0x15, 0x4, 0x3, 0x12, 0x54, 0x64, 0x0, 0x7f, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@ssrr={0x89, 0x7, 0xc6, [@remote]}, @ra={0x94, 0x4, 0x1}, @generic={0x94, 0x9, "d25bf72cc31d62"}, @timestamp={0x44, 0x20, 0xdd, 0x0, 0x8, [0x1ff, 0x807, 0x3, 0x2e, 0x0, 0x5, 0x8001]}, @ssrr={0x89, 0xb, 0xba, [@remote, @remote]}]}}}}}) sendmmsg$inet(r0, &(0x7f0000006140)=[{{&(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000240)="bad170285fa4a3b5f355ab6fdac50e644890ba3f8bd4522c251483ba264c738781534e930f62340921a6b0e4ee691270f489aaf70005e5d073bd70335d9f68addcf237dc7e6e72adda2680a610592fb0273b2596ac4e6f6b07a467a45b6c4e005d", 0x61}, {&(0x7f00000002c0)="5719a497e167b861fdfa2b27cf479ad0b407096080144a929b87fa3854ef43fdecf4263624", 0x25}], 0x2, &(0x7f0000000400)=[@ip_retopts={{0x7c, 0x0, 0x7, {[@cipso={0x86, 0x36, 0x1, [{0x7, 0xe, "7e9e01b330dea0ea1e999763"}, {0x1, 0x11, "bc6049a776bd01390c8c16087bf340"}, {0x2, 0x3, "f7"}, {0x2, 0xe, "93d2e47ca0b142fd3960df7a"}]}, @timestamp_prespec={0x44, 0x34, 0x45, 0x3, 0x1, [{@loopback, 0x2}, {@dev={0xac, 0x14, 0x14, 0x2b}, 0x8}, {@local, 0x575}, {@multicast1, 0xfffffffa}, {@local, 0x8}, {@dev={0xac, 0x14, 0x14, 0x3e}, 0x80}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @multicast2}}}, @ip_retopts={{0xa4, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x3c, 0x74, 0x3, 0xb, [{@multicast1, 0x64cfc360}, {@loopback, 0x6}, {@private=0xa010101, 0x1000}, {@rand_addr=0x64010100, 0x200}, {@multicast1, 0x1328000}, {@multicast2, 0x1}, {@local, 0x8}]}, @timestamp={0x44, 0xc, 0x83, 0x0, 0x0, [0x8001, 0x1]}, @cipso={0x86, 0x49, 0x2, [{0x1, 0x2}, {0x1, 0x4, "e104"}, {0x2, 0x2}, {0x0, 0xd, "71a06148c949abb727696c"}, {0x6, 0x4, '*\"'}, {0x2, 0xd, "844a5ceef5ffa766c352d4"}, {0xf, 0x11, "5c61ffd8484ad9647cde514ea21e89"}, {0x0, 0xa, "da7e27c8317967f0"}, {0x5, 0x2}]}, @noop]}}}], 0x160}}, {{&(0x7f0000000340)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000580)="1e4d7057040010dbaf1f3bf75ac34fe7396f6a9606ea2a159ebeb5a586f942498f353361c06e16c77757d7ef31bb8770853167d0c7a60bd444afa24d007ec2d8af1ca4a3c80e46c4df79735e9e1ff07db8ee937a14023d5a945bc475d10c3301d1bf6952a11646633bc576a0c4558051232fa3e011391e6cd2b1aded6e39dbe9f8a2aad9b0d033d4343d715be59d", 0x8e}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @multicast2, @private=0xa010102}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @rand_addr=0x64010100}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @remote}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1f}}], 0xc0}}, {{&(0x7f00000007c0)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000001b40)=[{&(0x7f0000000800)="0b2aea78f0eb091505456c824cebf9b8481b020985ba6a4b81b5145319ec57b2b4d7a30c4caef5471be3f0dcceb7142f4b90381a6ab3607c88cfc6acbdb06f72aab427fd6ed6dbba17c6437c7ee3c317e45faa3adf46404fa400a5bf3f957756c5b15215504056963b0ef349114de2208ca96bb9493f930bf1f587fa1e540ef814c1200c8713f618a20d27890ed0b337c7734fa9f5ae13ff62911e75600c", 0x9e}, {&(0x7f00000008c0)="b19f7ce53e71a3a69b0529527c4bb31bdac53eb1263039de8c070b0bf94ecbfb0c6f15befdcc888f24efda7b282651e5644bbe7b5fe4cc6ab5261eb2f1c4b963c958bd49f51db39476530749ea127f2b7a3de63c1d106c332840a05bc0e6c6096c9bac102fa81c296fb5241c30a16e7c5d788c967a", 0x75}, {&(0x7f0000000940)="99d3fc7d2769208079946afa37da8fb45149021a555fbe7055a0324f8cb5308ab33e8b3c8eead9c8d9af858bc2b8618c637fe5e7b40b33c191ee976704dcc5e42c640232236abc5a2eeedf6e4006af656b77fd972ec733dd3537837d2108fca11052a2eb5e4d60e26459885eec08a151b6d4016e7cf22de991790e9f0227f855fda1824d84a2c06ac8440e1248502a45c6cce3ec01d12732c6d5ce20c650aac1136db7d640ea858e05d268e98bd7006db2c0447c67deeb0dd64e782b40f52a43bfcf5e760798bfe22bed272ff2d06e820ade1b78d74c2fa9aa4131d0f5b08c186a0912405d428b4e0ec31e4ce78f0c923a2655ae90edd784224d39fb4548839a63899481246a4e91d16cc868c29014993021a2aa3787b88a1f3e053c50dd5be3143470c2c50e73d670f3a22072475efb1d8e0260e6689371bc18c95e4b8a273d6835d622d952165dac09df827119e20a51afb1ed2bdbb2d85d37749ad88c886579be90eaeee17c0a80418431736923e092ec215a008e98f11a7fc33bbe699071176291b1ddef9de2108ee7e57bbc3fbe987a1f66119b861f140323555397f42beb850b79645796d984dc260f765c8bb8b55c7e04b960762ffabf1ba77c96c9f6f4addf998a60f2ad2ee2d58c215997386a49dd2e293f5f3232d4e2d543f132ffa07f3e284a8ac1e14926276f429857271d935c8e8c105e65144c74447d216d999a46324efd5be9e3f3380c36c8cdd8a78a3d04bca8754fb3dc90e8284d8efbcac04ed4936ef1ea81e3dd88fb5a0472d1361b7e5ad44439ee135630c031de7b863cbeeac347ac71000d6828f90667b396f28c5107c347cf73d539a059773efe7cde4d2dd8564b5c2b6dc731ac756741daae7cd8e64aad52d1abb29011e7a4f4d61f1e29af44d95672a1a00a86f31ff5f4f0fd4946bd10b12fd0a7f6ecc140a16c239aac43d0cdf6b40ef471645c02fd5fa3e81d3a409735cc10085a471773fd9c0b5847dd511943db88821d08b01de77fcaf61b5b8cb84984263d82d8b419ae94d9ed9762d0eaa9287741e72b256d36f8cc846c40f972bc88b61846edc0ed596b94d46a9c79129e64387d35ff1c7d8f2059dfc29a2de869bf326c634d2bf2109777e8b30c5467587aa004c0daf8bb1105a8dbc6ace09e9a95c314ae7dace61cdcdb485cdb9c609347b132a3174f3d71b6ad916d7ab01e30944e46646e418a02161f870e757112d8a1e09ea262ea8bd82f9e80f8645f0fd67c6a73048289d14b560f1e3e9ef5bd83c3c44dd3035846a01265217e0f18d84b128b6bfe55101b5d5d29c7202398d36d5d38b02a6706a34bf21bd488d71f82a653ec828f49f1e468761e34d20b1cbca1b60d943acdb13b5390882cb2486bea0b5d5a4cbedc71408fffe15ca8f84b299a59120e22fe95f3d8470ef954a8fd5709be2b9a963bc21999217ed8fed098904b4164dc27bd494ba60fc713d823fcef4198235425b295e57484cd38784dfa1f9697a208f884a6c32b7be15516dd4bb49a8b4f83d903cb2bbbb285e7041136a17fe3bceb84f115040d3a6f37d7e9ebfbc5a89426772139bdd60bfce0e06ad5990223cc5a7d2d3b1a328c542444b6eac0c5b532c8c7eff1e555997d721466554a91b959f26e5e86fba381718e7913e22fac971af40d04e1d4cddcd04fe4c6bb8ad8587bb46405bcc4b250ea7acee36a68474397d909a1a60520294048acdf237bae131b1e2e05b133bf16f3f61a1cb86f8e4d699ea52172a61172aeb2dcf722c25dacfe64d2b1fc67357ffd2ba26508fc586b0109fbe43e365ffbe1ba3d2476f40c18b39dfff23ebf793c0a9b133f67cd5c5c49bf243f3047e7b1670ff12a3d3fcbc91b415dd5d07d643f7ae894040643a3bdd425e0ad9e5457056978b7e7c7f5dd11cc36aeff7102248737f127fe83f22935fc03d844de6f6fa20edad350fb8a5ffe25ca25939fc8dd30eabf7a0e533f59349030a8a91f4cb2aa740730981e433b65b9f2a3c0aa02ebfd75441ef404f0df54ce086f1b45a3d77fcace69167376775dcabd0b5d42528a7a6e3dc995e5ec1f279fe022a590bfdad2d7f8ef40f5430a27e2393cf42d7f34beaa38ad0beefaf7188620a1b8d6fc89ce35319410da3c32529a3da2fe6812b876942dc1f5cf6dd4e817fcb9e3cd5ac55e471d4e3b38765a911b2c7002888a297bcf6a915ca71c48f89a43e6f0d7a6369770dda730fc09846af0838cd57a83d870de1a575d15489d2515d91dcf165f7d469b22e1df2da09db6ccf72375a1769c65ffbd20b53ed1b309ac637171180a24a35f35c2bf8ecf348e1224c02290847e37b6e7fed0403d2383524b7cbb78134cab69620c752ee9d6fb3c88b44e6c4bc893ff8be57b4db8ce8ae993f66feb65b570e57956559684d49b3f53f9841f52dd47b6a1b85511391e0c8341df451a195e875b4fa89f2ee70feb821c0d5ebfc24b2ff61baeda01bbf93cf0a9282eda8219b230be9f025680b3510af57f27b37a7efb5cae45774086d44c46a84283d335ee89c578f37d7fa8c64f9c7b0276a87faaafd91601b9a480b9f16b25ce1707a8b36ac47c49b5d7552f6416c948982396bd298e8afa609f8a56ed0996a5fe7b8cf68623bb117a1f72f59b8ae88b1a364bdf7a713e87eadc860c9fbfc7db62ab01717d1f3ce296a94ae967a6ac56b03092462f3e7274298dea2b7d4d3664f06a7836e546a7123b0f0b063ec4af204c39dd52c693fd6712b8d1a6ab211d3652a3c450320bb673ac702aca9bc19792677210edec620c77da48c0b9d09e1897d7f48ff5eb228af1b3df703744d7a9d47e0df8494846d65dfbde871c9f1b2ac62dab716cc03626b4cc1e3c21b32e9469d331c5808ef74fb3a4f335d4825a7910c4ca8bf948c9c6c5b8edb7e49f0a520585d65db05cc78f0dd8699fcf6530bf219235835182a7c956f6fcaea89c2aa81afb973c665da3718838afcf6db584b7811f95ad65f25b239bd59dd2dcf02bab940d1034038ab4e4b1e0e7f45a0c9744cc5874fbaa2698c07ac060361728cc30ca63ecd57c41e7b19889b2f24384aa8d9d2d566729b70ce6a2713211551c01da0cde7442e915ff9e052784ac311b17e27e36acb723eee875dd94b3558873a24492d7c83f294fef2b6bb27e243377fe3308ab7296b34c2224cc05a97c4fccf45f3b285b72c6abd3205b32f003f48a8f54654d9159a3b2ab534b8be5b5835928d079337873056c4c1ba20285edc70a4625035538e63665074da54a28c7d114d553fe2f17a7d3b0ea811cd7f10bc368e0e997209e34e50bab6f2f3cc0798a51823d1de15581b2489e56a457b1f5eb994552d6f47eb0ef971c4274deb8632178ab04df359913a8c2a1a09adb5c721e23996d2f6743ffbdc902a8623088ad44f7889aba74d81eab843c99791e401a27834e9a48d10ba03f41bd316670dfe2565a4ef325c1c41391b742074642fb89ff5eb2a7d9876b6ac90cd0101825997947bb04a3fcb5828b32952c705fb91bc0f5473b7da73ed83abd498bd2c115fc688cd92354e3393db9c5f2bf964e59f0d5f99c025850a5a092580d53e55c6a3df741b83aafa19f2be32037b01266035d8c60a4765f231cf7c8a61022bfc8132c508888a2d98d756626d398727f27ed0ae297702d6d2bf2be0c93f53adc35fc48294f9b12b567a519e87d2be1096b0ec3dc19a67b496ac953c241e86e5222c294d3a81a2daf2507b9ff3ee6e7d0e767148ce57bf1bbc8aac1925c718866598893401129769ef205c5f35c85591081cbd0571374b7aa2cf0f729a1524d939075cde9b6512b6896df0e72fde2b2456916404d97db12d013bb6e2906ecdadddce314d7792a0a47b5eabc6ff47df181f1001af486df00d0fb71b12cb2ca55a730bfef32e9c17805e19313557ba5fb245c740740ed3666c18239a16670d2d86207806a46f1fb770e37c4e889a758ac580de0176f13599bb9e64d574ed108ac8da71a59e5ff02e90836ec5c2117963b8d7147385fc887bcaa84ff0c1a72f5bd3e85d16959ae8ccf6895876485b76715950e26ff3cb4dfef7802f9febd9b297e2c9451c346364277f47ce23d582e8d041154a8af5bddef3f31055eeeef6546338c1a0f2ee5a1bacff0ebdf52944347f3a53e4b9457a9f1130dbf913aabff08f4884c41455ba995b1d48c8271a9723fa8f1eb426bb882fca4015c1490fd091a252723217962c542dff205adce16eca78d75b9385533fb139839aff8e97938f72553b279ae5eeb0f79ba44d38f5cb0ee64cec671da16b6375bc0d7ec33529638d662953b565d9a3b2a8c82464d321eb2d91fa403096aa5a4a25096a22fb1967869c57ea65a5e2b17fc976f68d889e3fe790b46c2da4f2d3a8090470e261a6aa368fda36eb0c439ecdba0e4c2b9d20c318c0b9875a662f6b1e41f0e3519bd920a4d71004c1e40f4ee8e90182ddc1ef44b3be530f1dd23ebaca19a1173aae368504dcd2481f937e47fc8cca76b84c188d7c55a7925f2c656cf28fbe2aaebe6897d2329a18674e4f2bba67bb3d979b8d6e01160960f1e5e0225de1c9edf44b292e192cbb37f1513d2b0abca091613cfe4f0eb0c8f38ae5edeb7fea89cc6402b88750ee6fd4c79675d71b28a3f74eb46ff9107a61f82d1c1d3a3b9a6aa3cfd31aefe82f444935b9068e1a0f2a0e55e3135497e4078d689ee39ad0b3e47f070531ff890b603b9db8395afeb573b5212242f87f95ac5989ae03e2be8f70920958a5439a5a9cb36f5c310a54061245a64a1bf65c8c572aaae9dfba0ad5dd986282aa5e594948c03bc985d6dbf1be4f6bfc0153e635a5217bb31998fa875dd6f7cae27a1d9e3ff89d7dd26d4b5d7876e94c279a4debe145ce1c1bea12a4cccb386f7b646164b2ce27fa1522537bd82472fa34d9f133250a0c229c3e134a974b19614e1550da5b1595654a0791a5bfedb38734096f2e77463dbf20312e1b129f8067815177c061cbe1d4f19ada7e988ef5b83737c1a4c3191a32258707f711c7a1fea4ef31a54e865dd7b57857846291ce56f7057ef6d36af4cdd8c0de3fd0630e3684c5a70a261f1384e31189f11eb16065cfbac6e49ee59ecd6962de99a4f25cc4a1b54dbacd473f786efb8e52ccb987c4679b8076c1ba54cabfb6c65174e57adfada96c75e00c80849d9252d2fa427b847dd7e053897966d613cffbe56be13a855387f03e101ac76e649962717ddb6f860ada0ac1fa5d9d80418a664fce6ad88ff66e1a2812dc5211aad9a410f0e858692294251aec1d2457552374546f39c05c1ad9a11147e6ee1b61852714cd651d08a601d3a3d978f7d410042142ccea9bea1c48d6417686d9bc071cbde881daeb98f50db72f62b0e84731e41a88a9374d5e50196a5bbd2a67595defeeb324a9532f6cb5f54b06406c3dfa035a116256ecf78500223a3ed4bc31f8e38d7ec131affc8593766ffda0f4f16052fc13bd82b428ed109926b9567c0494748b8280f3b6bcbdc23fbfb2fa535ca29a95f9068c9ca2b44fbac4cff7636b58c9c5e05fdad89e24359d640348ab741f6e5637420157ad8406d3508f1721902102757faa8d137d7dd32dac97a9b8cb511318d303773404d99534a78569a9de9a9580788574a4f48652ea6142cdc631cbb5af81b9537b02b78bdd7deb17d6aa3e31153293cb25d1b0010f5632b3aa07a46c0c74fbb5300f82c390039c76f6da315b5199b9a636b3745a24c7973492f5a629c17ab3ca3a570d567269ed8aaafd79956ff2bd1c217238415c9f65c94cf397612a860e4e1aa144cd8", 0x1000}, {&(0x7f0000001940)="bb5b6459ba909ff15ee1", 0xa}, {&(0x7f0000001980)}, {&(0x7f00000019c0)="c93dc6316fea", 0x6}, {&(0x7f0000001a00)="9315dfd53d82bdf85f69c4ad19492a33afb50aec56c4fd388918", 0x1a}, {&(0x7f0000001a40)="d4a32f26b9bff678e3600d218c4fa1ef88ac4e393a833469e2fb4b54c3c26f996536e115d53db3fb38316dd8e85a95f64f8b26717584aeb72361de48b02ffac2a61f751b532cb9dfae3d71227c6df75e59c9b4b9ba05a1bf651ea34699550f7055e004452adf2d8ca7dd34253c42e88a9d424e7e8daa7df66e741edea6a3a268123de508959a04f2f60fa220e9106ed8a505b4b3ad98d959a613a07386497ab200492363d119e724793e9564ddf4a3ab2630c236cfb32715e771", 0xba}, {&(0x7f0000001b00)="0e", 0x1}], 0x9, &(0x7f0000001c00)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_retopts={{0x38, 0x0, 0x7, {[@rr={0x7, 0xf, 0x45, [@dev={0xac, 0x14, 0x14, 0x22}, @rand_addr=0x64010100, @multicast2]}, @cipso={0x86, 0x18, 0xffffffffffffffff, [{0x6, 0xf, "f807af9ea9e4f152cc6991426c"}, {0x5, 0x3, "19"}]}]}}}], 0x50}}, {{0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000001c80)="73ce6817a6f9056ad526f11814a6dcea24ecc1c1f0b715f77bc68a3da7d7572dbf6be2fc9a5cad7f36a96e0da3b3d6478184de181bd1cf7bceb5437f171a4c8a222890f9e822d2e18b41f77627b40e54723c4c25cc88c72393dffeb6b2edbfdb5458d235b4156d036ae7", 0x6a}, {&(0x7f0000001d00)="6dc03194751c22a65daab2bd26bffadf86e8e08e21efcefa9d10e375bce6c874cd6c929c57321b9e9f0f1846014d01e351af41b1891dde5103094b986bc8ffbffc5155a1b12038edbf405ee0edae8d8a05c764dbc104136109d9a524f284d5b3f9558104b892a752371ad2b2ad984432c0de0c042b1212c00981c3b4e64548eaecce9c35fcec4ba9bb34ab550f7e4b18f1a514401906d4a998096fd5239ec515a604bd39ac457abf06dde715ea72ca1e1ab197458946", 0xb6}, {&(0x7f0000001dc0)="a974d88bd5cd273fde206b859c52e69c41c7134c88444b2670cea7ea488c3265fc032a83c02fd5dc1785143ae257b4bcc601074400edef0b151b75fe8cee155534155dce63321f95e80b2f181b42ce194b4e183f243c7fee9e2e0a7dcfb219f5e9d12433ab6db202e7c6293e51e991a0bc86fec8e89fa7230adeb518c52a79f868c4d20007eec0486f52874adf2c4ea7", 0x90}, {&(0x7f0000001e80)="c34af58c67d9857bdef308c28a028edd6e982c83f979e6438264a67b7446beadba8c88c8a909f8a2eec8017ff73dce856046719ed8d47e7f8a758dc4c153a42685ff2d6d632a630112f190f6d0ecf7e125c2a5610062c3344228e5719c60e0f49ae134ef5d0b410920382ed93eb89253201cf9e1bbb13994a130b462b2d958737e294828794580ab1b17ad4aee4bdf70", 0x90}, {&(0x7f0000001f40)="10b4b8b23b2594b6c3df23fc1cdad071d7fe468a537d528851ba269b27f95d1494cbf5390836c07da62a4cb0dbe70b0a0a77c3a8761214b69e7c9981f7874dc8ef56361fb2e996eb83e870b78767b2c287fe8d09eeba38390c638247c7f63f0f53b6777c1a013e92b2401bfca4d0b6badc7f24c4ab5a809441bcaa4ef5184700624d996dfb980099666d3cbfb49c6977b26bd9070733515f438c57bc7b93830156353ca54fd50967a08f1083d0d36129c24d1985089d69c690cd0ceb0fef85bf29beb9cc14214ade4f372ecde590b24daa28653e8439568aee4b41", 0xdb}], 0x5, &(0x7f00000020c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xbb}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x56}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}], 0x60}}, {{&(0x7f0000002140)={0x2, 0x4e24, @private=0xa010101}, 0x10, &(0x7f0000003340)=[{&(0x7f0000002180)="b5c9f9cc41fa3e4fcd4ef81fbaa0e618dbbc803799f8128e2fa13b869ac47b2f46633bc34eb2130d4f9f253cb1b53349e8972e2d1364fb52e043accd80cc98ef6024dd09fb75c85180eb9a3a4897889e9f84a244d012edf5d2648a8cc8e42e1b69d1ed7ba6f053e8e75578cb0703d64fc58a54dcc69c4fad8d0ac38e1a55c6ef007ba4ebcb4a1a8e4f3e60f35f091b799a320346581ce2ff0012568463322b246113f1bd15ff82600954e283d8c1217232a0a1d0e8c9b86e74db9caf5ae41227034435aa08290d6951c50b3b7d", 0xcd}, {&(0x7f0000002280)="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", 0x1000}, {&(0x7f0000003280)="07bbc152c62976ef0235a5e4ff43188039c44ac9bde2f75fb7361ad3f0b00ea4590e2c2f8fa0b4992e01f4719ce091a4afe7d59665a7a33a4488ad063ea4ede3c822b6c18c63ef49e5b6295480147521f4c77bc04f4a0d93b901ea9dc9902bcaeca5420397b4eaca55117514621de4732564e76bb8d198783d8d789947505af905a99dca1a3b81457c8c6e18aae4254e36b49934a3f228fd6cdacda7b3dddc1f26f74a4c695caa6afe07ca678088d6ecfcad84a4512720f1c8b47c9d", 0xbc}], 0x3, &(0x7f0000003380)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x2e, 0x1, 0xf, [{@rand_addr=0x64010102, 0x5}, {@loopback, 0xffff}, {@multicast2, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8000}, {@multicast1, 0x80}, {@broadcast, 0x4}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_retopts={{0x98, 0x0, 0x7, {[@cipso={0x86, 0x4a, 0x2, [{0x7, 0x8, "5daab2b992ca"}, {0x1, 0x12, "da46de635d3b4cbac8e0294c76f587d9"}, {0x6, 0x12, "e41f5a187406a60a71eca4a23d8af09d"}, {0x2, 0xd, "a53933f6bcd5c9341c4c15"}, {0x6, 0xb, "5df512fe87f50bd71c"}]}, @lsrr={0x83, 0x27, 0x83, [@initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @loopback, @remote, @local, @loopback, @empty, @empty, @multicast1]}, @rr={0x7, 0x17, 0xa1, [@multicast1, @private=0xa010100, @broadcast, @empty, @empty]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_retopts={{0x98, 0x0, 0x7, {[@ra={0x94, 0x4}, @lsrr={0x83, 0x23, 0xe8, [@local, @local, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010102, @loopback, @private=0xa010102, @broadcast]}, @timestamp_addr={0x44, 0x2c, 0x4a, 0x1, 0x4, [{@multicast2, 0x2}, {@loopback, 0x2}, {@private=0xa010102, 0x4}, {@loopback, 0x400000}, {@remote, 0xffff}]}, @generic={0x44, 0xd, "33b7bb23b49d506ccbf454"}, @ssrr={0x89, 0x27, 0x17, [@multicast2, @rand_addr=0x64010101, @multicast1, @multicast2, @dev={0xac, 0x14, 0x14, 0x25}, @rand_addr=0x64010101, @loopback, @rand_addr=0x64010101, @local]}]}}}], 0x1c0}}, {{&(0x7f0000003540)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000003680)=[{&(0x7f0000003580)="dbbc18e2b456115f2da9df8c9d07b178c902af969a65e648c36e10aa309f6dd907f4daa6c4e99931a36205461c7f027f1cda0aca4df24c41960494ce78450a067ec552df6a6db02ba53c1f2852f704557ac025db257f8ac4d6ec048e63aabe71618553fb3128f951558dfc978c648ba65c2a42eab90cde5497caa07c190813e42ba0d0125989d2a4ceed26483a89a478c6ef845455b23109e83fd6bc333abc7c8b8c75e160bf2321350047d5400fd88d40a0213af97a9f70fa7c5890bf26725ed4dc43e802d314e7a2022c1db4c30af766c41e9dc8cf6188", 0xd8}], 0x1, &(0x7f00000036c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfffffff9}}, @ip_retopts={{0x5c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x44, 0x36, 0x3, 0x8, [{@rand_addr=0x64010101}, {@remote, 0x400}, {@remote, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, {@private=0xa010100, 0xffffff00}, {@multicast1, 0x840}, {@broadcast, 0xfffffff8}, {@rand_addr=0x64010102, 0x80000001}]}, @generic={0x44, 0x7, "c6dc47fa6f"}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @loopback}}}], 0xb0}}, {{&(0x7f0000003780)={0x2, 0x4e20, @loopback}, 0x10, &(0x7f0000004940)=[{&(0x7f00000037c0)="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", 0x1000}, {&(0x7f00000047c0)="e19d9341789fcb0d0854d3c3e79c73bab15277da7b492c1a5ab38264862440fbb3e2985eae1167238cd7a61dbd9dcde2a3726e89b3de90bd7e6de294e99bab8077a18321734c3db983ec7882faad9c945c6e5b20282a104ee2501377effe04730920a796c97df40ba1b7679324b5d75a8c7758ae3e50f1845c37e8627126aeaa6fc16e36be65c531b11de6d68afad6c0e82e6ff0faa882fd91eb7b3a945d7987bd7417f95ac034ec541585a713418db240a71a", 0xb3}, {&(0x7f0000004880)="735acfd8a6be3e5534116ecc483c51e4bf254fba454063e6968aad2ce9a61c2dd5e6b84cfff1f9ddd1ca185f9decea4365b4db799f2dc398465c22a21df714db7a0e9ee5c813f62bf291670a306c366b067fdb2dc390461a66bb171c0045374edbb80d489c148f0c654d", 0x6a}, {&(0x7f0000004900)}], 0x4, &(0x7f0000004980)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @end]}}}, @ip_ttl={{0x14}}], 0x30}}, {{&(0x7f00000049c0)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000005d80)=[{&(0x7f0000004a00)="e6d6dfe2b88f4e80d7c6fc8b0c07699675854adfd94eba4155f09d46699c1594ddf0b34599627ea0526773f02d8c2c7b7b2d27cd10656e88a7c4208bc6248759b6facecfbd5cc68df6cba84309cca4b6f4244e65ecbd7c47dc600333c32ab0ec4b16577f0db3ba344b6ad5cac223f4d7df997895fc5196d0c56a035ff63802dbdb841079a400b7f336d969aa7b600954930d38d6ff", 0x95}, {&(0x7f0000004ac0)="c6ac435d876f2d680b229e104e69256012b81683010b02260f1daf572405ef27c15dca6968d8f24f99c18d4225df042957a7aabc1dbc71e7ee91bd86cd58909b", 0x40}, {&(0x7f0000004b00)="ff7e15cbe28902695da9b7ed3a009b889083ec41cf00358f033680b15fb2c59c656b1dd2a24917ed26f73186298fefd19407b018ab0e7b2c968b6c70eb14193f9c561910be69386ce65394ff0cb8", 0x4e}, {&(0x7f0000004b80)="7283f6c9164277d88695156038b11685585019042298ebc59af209e1f63077ff1c84a3f53b4ae4697b3dd46811173ff580c24f902e771ffb018119eba2fc882d43110d0100c305558481bcdadbe13352bfcec5ac3e72bd2e6d56dd0d2973a853507b9439c43ef637274e7079616d97cf6fad11273a699833adbfa559afb6a7ece0850018e346b6fc8ad5269a770b12d7b8ed5f18abb730f0e5d6469741077d35dcc2a7cbf55700e377374ed17193f98f7c420c2b2c2ff5a31c5706bd85d99f7cd465cd17e27bfb462e74d04dd7ec85cbf637c7bb6e2df8274a93a2547daada78df7abcb76b5c0d", 0xe7}, {&(0x7f0000004c80)="98915afb253c9a878c466f9fc147fc47838dec5a508e780f27585b7dc8784ca031dcd4fe2157401f920e4cb75ffae6ac6d63ded9e662f940edb78bdc070bd69dabff7ecc86a81f8e1a89cb1b2d9df9c9beac2f0da24bfdea58c4157956f949bcc26fdb4042f1ca59a6eaf1b3089fb802210f424fd261dfeb4940d9653fcd94dbde85d149ff6f78d8", 0x88}, {&(0x7f0000004d40)="920eb393eedc66440ab0a09b1363064c88cf84f1290782b9b2e96b1691714c2e3ac6c3af450972044dd6d5faadc53eb1244c2d41", 0x34}, {&(0x7f0000004d80)="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", 0x1000}], 0x7, &(0x7f0000005f80)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x84}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xe0}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @rand_addr=0x64010101, @private=0xa010100}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}], 0x98}}, {{&(0x7f0000006040)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f00000060c0)=[{&(0x7f0000006080)="ff37a80da7c81d35a1803533211ee72336966be86ff008dc581ccc387e48a781b7d2c10e76b5a7264e2ae8e7c8e8409f2559d13054", 0x35}], 0x1, &(0x7f0000006100)=[@ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_tos_int={{0x14}}], 0x30}}], 0x9, 0x2800) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) r7 = creat(&(0x7f0000000100)='./file1\x00', 0x50) ioctl$UI_END_FF_ERASE(r7, 0x400c55cb, &(0x7f0000000140)={0xb, 0x2, 0x7ff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r8 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r8, 0x82307201, &(0x7f00000001c0)) 13:14:12 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xb000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 325.341630][T14411] FAULT_INJECTION: forcing a failure. [ 325.341630][T14411] name failslab, interval 1, probability 0, space 0, times 0 [ 325.354284][T14411] CPU: 1 PID: 14411 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 325.364431][T14411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.374481][T14411] Call Trace: [ 325.377766][T14411] dump_stack+0x1b0/0x21e [ 325.382073][T14411] ? devkmsg_release+0x11c/0x11c [ 325.386989][T14411] ? show_regs_print_info+0x12/0x12 [ 325.392164][T14411] should_fail+0x6fb/0x860 [ 325.396570][T14411] ? setup_fault_attr+0x2b0/0x2b0 [ 325.402438][T14411] ? eth_get_headlen+0x240/0x240 [ 325.407348][T14411] ? sock_def_write_space+0x1b9/0x2a0 [ 325.412690][T14411] ? __alloc_skb+0x88/0x4d0 [ 325.417196][T14411] should_failslab+0x5/0x20 [ 325.421688][T14411] kmem_cache_alloc+0x36/0x250 [ 325.426430][T14411] ? netif_rx+0x157/0x2b0 [ 325.430741][T14411] __alloc_skb+0x88/0x4d0 [ 325.435055][T14411] ? dev_queue_xmit_nit+0x946/0x9e0 [ 325.440231][T14411] alloc_skb_with_frags+0xb1/0x580 [ 325.445345][T14411] ? _local_bh_enable+0x30/0x30 [ 325.450172][T14411] sock_alloc_send_pskb+0x87e/0xcc0 [ 325.455345][T14411] ? sock_kzfree_s+0x50/0x50 [ 325.459931][T14411] __ip_append_data+0x1fbd/0x31b0 [ 325.464950][T14411] ? ip_do_fragment+0x2290/0x2290 [ 325.470009][T14411] ? ip_output+0x318/0x400 [ 325.474407][T14411] ? ip_setup_cork+0x810/0x810 [ 325.479198][T14411] ? ipv4_mtu+0x212/0x2c0 [ 325.483537][T14411] ? ip_setup_cork+0x46b/0x810 [ 325.488279][T14411] ip_make_skb+0x1c9/0x4d0 [ 325.492673][T14411] ? ip_do_fragment+0x2290/0x2290 [ 325.497674][T14411] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 325.503286][T14411] ? __sk_dst_check+0x1b0/0x1b0 [ 325.508120][T14411] udp_sendmsg+0x1d1b/0x2e80 [ 325.512703][T14411] ? ip_do_fragment+0x2290/0x2290 [ 325.517703][T14411] ? udp_cmsg_send+0x340/0x340 [ 325.522461][T14411] ? selinux_socket_sendmsg+0x10b/0x320 [ 325.528069][T14411] ? selinux_socket_accept+0x580/0x580 [ 325.533513][T14411] ? rw_copy_check_uvector+0x6b/0x310 [ 325.538880][T14411] ? inet_send_prepare+0x1b7/0x470 [ 325.543984][T14411] ? inet_send_prepare+0x470/0x470 [ 325.549072][T14411] ____sys_sendmsg+0x56f/0x860 [ 325.553817][T14411] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 325.559001][T14411] ? udp_sendmsg+0x75b/0x2e80 [ 325.563657][T14411] ? __sys_sendmmsg+0x46f/0x680 [ 325.568505][T14411] __sys_sendmmsg+0x338/0x680 [ 325.573179][T14411] ? __ia32_sys_sendmsg+0x90/0x90 [ 325.578184][T14411] ? __rcu_read_lock+0x50/0x50 [ 325.582924][T14411] ? __kasan_slab_free+0x1e2/0x220 [ 325.588018][T14411] ? __kasan_slab_free+0x168/0x220 [ 325.593254][T14411] ? slab_free_freelist_hook+0xd0/0x150 [ 325.598806][T14411] ? kmem_cache_free+0xac/0x5c0 [ 325.603655][T14411] ? do_sys_open+0x4a3/0x620 [ 325.608225][T14411] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 325.614301][T14411] ? do_sys_open+0x2fc/0x620 [ 325.618897][T14411] ? proc_fail_nth_write+0x166/0x200 [ 325.624160][T14411] ? proc_fail_nth_read+0x1c0/0x1c0 [ 325.629341][T14411] ? ip4_datagram_release_cb+0x864/0xde0 [ 325.634950][T14411] ? proc_fail_nth_read+0x1c0/0x1c0 [ 325.640142][T14411] ? memset+0x1f/0x40 [ 325.644123][T14411] ? fsnotify+0x13a0/0x1460 [ 325.648622][T14411] ? __kernel_write+0x340/0x340 [ 325.653482][T14411] ? fsnotify+0x13a0/0x1460 [ 325.657966][T14411] ? security_file_permission+0x128/0x300 [ 325.663663][T14411] ? __sb_end_write+0xa4/0xf0 [ 325.668317][T14411] ? vfs_write+0x427/0x4f0 [ 325.672725][T14411] ? ksys_write+0x237/0x2a0 [ 325.677206][T14411] ? __ia32_sys_read+0x80/0x80 [ 325.681946][T14411] __x64_sys_sendmmsg+0x9c/0xb0 [ 325.686772][T14411] do_syscall_64+0xcb/0x150 [ 325.691276][T14411] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 325.697141][T14411] RIP: 0033:0x45de59 [ 325.701026][T14411] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.720818][T14411] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 325.729212][T14411] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 325.737580][T14411] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 325.745549][T14411] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 325.753571][T14411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000032 [ 325.761637][T14411] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 325.778154][T14417] overlayfs: failed to resolve './file1': -2 13:14:12 executing program 0 (fault-call:6 fault-nth:51): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 325.792693][T14412] EXT4-fs (loop2): inodes count not valid: 2336 vs 32 [ 325.908454][T14423] FAULT_INJECTION: forcing a failure. [ 325.908454][T14423] name failslab, interval 1, probability 0, space 0, times 0 [ 325.921435][T14423] CPU: 1 PID: 14423 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 325.931574][T14423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.941625][T14423] Call Trace: [ 325.944901][T14423] dump_stack+0x1b0/0x21e [ 325.949228][T14423] ? devkmsg_release+0x11c/0x11c [ 325.954181][T14423] ? show_regs_print_info+0x12/0x12 [ 325.959368][T14423] should_fail+0x6fb/0x860 [ 325.963768][T14423] ? setup_fault_attr+0x2b0/0x2b0 [ 325.968767][T14423] ? eth_get_headlen+0x240/0x240 [ 325.973678][T14423] ? sock_def_write_space+0x1b9/0x2a0 [ 325.979032][T14423] ? alloc_skb_with_frags+0xb1/0x580 [ 325.984404][T14423] should_failslab+0x5/0x20 [ 325.989334][T14423] __kmalloc_track_caller+0x5d/0x2b0 [ 325.994599][T14423] ? kmem_cache_alloc+0x1d5/0x250 [ 325.999612][T14423] ? netif_rx+0x157/0x2b0 [ 326.003930][T14423] ? alloc_skb_with_frags+0xb1/0x580 [ 326.009187][T14423] __alloc_skb+0xd1/0x4d0 [ 326.013596][T14423] alloc_skb_with_frags+0xb1/0x580 [ 326.018685][T14423] ? _local_bh_enable+0x30/0x30 [ 326.023516][T14423] sock_alloc_send_pskb+0x87e/0xcc0 [ 326.028707][T14423] ? sock_kzfree_s+0x50/0x50 [ 326.033274][T14423] __ip_append_data+0x1fbd/0x31b0 [ 326.038281][T14423] ? ip_do_fragment+0x2290/0x2290 [ 326.043291][T14423] ? ip_output+0x318/0x400 [ 326.047873][T14423] ? ip_setup_cork+0x810/0x810 [ 326.052632][T14423] ? ipv4_mtu+0x212/0x2c0 [ 326.057108][T14423] ? ip_setup_cork+0x46b/0x810 [ 326.062453][T14423] ip_make_skb+0x1c9/0x4d0 [ 326.066866][T14423] ? ip_do_fragment+0x2290/0x2290 [ 326.071876][T14423] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 326.077501][T14423] ? __sk_dst_check+0x1b0/0x1b0 [ 326.082341][T14423] udp_sendmsg+0x1d1b/0x2e80 [ 326.086908][T14423] ? ip_do_fragment+0x2290/0x2290 [ 326.091917][T14423] ? udp_cmsg_send+0x340/0x340 [ 326.096674][T14423] ? selinux_socket_sendmsg+0x10b/0x320 [ 326.102210][T14423] ? selinux_socket_accept+0x580/0x580 [ 326.107666][T14423] ? rw_copy_check_uvector+0x6b/0x310 [ 326.113019][T14423] ? inet_send_prepare+0x1b7/0x470 [ 326.118117][T14423] ? inet_send_prepare+0x470/0x470 [ 326.123380][T14423] ____sys_sendmsg+0x56f/0x860 [ 326.128128][T14423] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 326.133314][T14423] ? udp_sendmsg+0x75b/0x2e80 [ 326.137978][T14423] ? __sys_sendmmsg+0x46f/0x680 [ 326.142809][T14423] __sys_sendmmsg+0x338/0x680 [ 326.147571][T14423] ? __ia32_sys_sendmsg+0x90/0x90 [ 326.153180][T14423] ? __rcu_read_lock+0x50/0x50 [ 326.157930][T14423] ? __kasan_slab_free+0x1e2/0x220 [ 326.163014][T14423] ? __kasan_slab_free+0x168/0x220 [ 326.168106][T14423] ? slab_free_freelist_hook+0xd0/0x150 [ 326.173628][T14423] ? kmem_cache_free+0xac/0x5c0 [ 326.178455][T14423] ? do_sys_open+0x4a3/0x620 [ 326.183017][T14423] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 326.189084][T14423] ? do_sys_open+0x2fc/0x620 [ 326.193748][T14423] ? proc_fail_nth_write+0x166/0x200 [ 326.199024][T14423] ? proc_fail_nth_read+0x1c0/0x1c0 [ 326.204199][T14423] ? ip4_datagram_release_cb+0x864/0xde0 [ 326.209811][T14423] ? proc_fail_nth_read+0x1c0/0x1c0 [ 326.215005][T14423] ? memset+0x1f/0x40 [ 326.218979][T14423] ? fsnotify+0x13a0/0x1460 [ 326.223479][T14423] ? __kernel_write+0x340/0x340 [ 326.228321][T14423] ? fsnotify+0x13a0/0x1460 [ 326.232801][T14423] ? security_file_permission+0x128/0x300 [ 326.238508][T14423] ? __sb_end_write+0xa4/0xf0 [ 326.243189][T14423] ? vfs_write+0x427/0x4f0 [ 326.247603][T14423] ? ksys_write+0x237/0x2a0 [ 326.252099][T14423] ? __ia32_sys_read+0x80/0x80 [ 326.256930][T14423] __x64_sys_sendmmsg+0x9c/0xb0 [ 326.261865][T14423] do_syscall_64+0xcb/0x150 [ 326.266360][T14423] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 326.272230][T14423] RIP: 0033:0x45de59 [ 326.276123][T14423] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.295734][T14423] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 326.304134][T14423] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 326.312124][T14423] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 326.320547][T14423] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 326.328503][T14423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000033 [ 326.336484][T14423] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200a00000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:13 executing program 0 (fault-call:6 fault-nth:52): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:13 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400022, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:14:13 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000340)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x28102, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x0, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f0000000100)=""/26, 0x1a) ioctl$FITRIM(r0, 0x82307201, &(0x7f00000001c0)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) sendmsg$SOCK_DESTROY(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x15, 0x200, 0x70bd25, 0x25dfdbfc, {0x27, 0x1f}}, 0x14}, 0x1, 0x0, 0x0, 0x8008000}, 0x0) [ 326.422983][T14410] overlayfs: filesystem on './file1' not supported [ 326.448362][T14436] FAULT_INJECTION: forcing a failure. [ 326.448362][T14436] name failslab, interval 1, probability 0, space 0, times 0 [ 326.461138][T14436] CPU: 0 PID: 14436 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 326.471268][T14436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.481305][T14436] Call Trace: [ 326.484582][T14436] dump_stack+0x1b0/0x21e [ 326.488964][T14436] ? devkmsg_release+0x11c/0x11c [ 326.493966][T14436] ? show_regs_print_info+0x12/0x12 [ 326.499195][T14436] should_fail+0x6fb/0x860 [ 326.503603][T14436] ? setup_fault_attr+0x2b0/0x2b0 [ 326.508611][T14436] ? eth_get_headlen+0x240/0x240 [ 326.513542][T14436] ? sock_def_write_space+0x1b9/0x2a0 [ 326.518887][T14436] ? __alloc_skb+0x88/0x4d0 [ 326.523372][T14436] should_failslab+0x5/0x20 [ 326.527857][T14436] kmem_cache_alloc+0x36/0x250 [ 326.532612][T14436] ? netif_rx+0x157/0x2b0 [ 326.536928][T14436] __alloc_skb+0x88/0x4d0 [ 326.541232][T14436] ? dev_queue_xmit_nit+0x946/0x9e0 [ 326.546425][T14436] alloc_skb_with_frags+0xb1/0x580 [ 326.551511][T14436] ? _local_bh_enable+0x30/0x30 [ 326.556339][T14436] sock_alloc_send_pskb+0x87e/0xcc0 [ 326.561536][T14436] ? sock_kzfree_s+0x50/0x50 [ 326.566104][T14436] __ip_append_data+0x1fbd/0x31b0 [ 326.571131][T14436] ? ip_do_fragment+0x2290/0x2290 [ 326.576130][T14436] ? ip_output+0x318/0x400 [ 326.580542][T14436] ? ip_setup_cork+0x810/0x810 [ 326.585298][T14436] ? ipv4_mtu+0x212/0x2c0 [ 326.589637][T14436] ? ip_setup_cork+0x46b/0x810 [ 326.594386][T14436] ip_make_skb+0x1c9/0x4d0 [ 326.598819][T14436] ? ip_do_fragment+0x2290/0x2290 [ 326.603842][T14436] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 326.609657][T14436] ? __sk_dst_check+0x1b0/0x1b0 [ 326.614528][T14436] udp_sendmsg+0x1d1b/0x2e80 [ 326.619126][T14436] ? ip_do_fragment+0x2290/0x2290 [ 326.624145][T14436] ? udp_cmsg_send+0x340/0x340 [ 326.628891][T14436] ? selinux_socket_sendmsg+0x10b/0x320 [ 326.634430][T14436] ? selinux_socket_accept+0x580/0x580 [ 326.639872][T14436] ? rw_copy_check_uvector+0x6b/0x310 [ 326.645224][T14436] ? inet_send_prepare+0x1b7/0x470 [ 326.650319][T14436] ? inet_send_prepare+0x470/0x470 [ 326.655408][T14436] ____sys_sendmsg+0x56f/0x860 [ 326.660165][T14436] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 326.665417][T14436] ? udp_sendmsg+0x75b/0x2e80 [ 326.670241][T14436] ? __sys_sendmmsg+0x46f/0x680 [ 326.675181][T14436] __sys_sendmmsg+0x338/0x680 [ 326.679864][T14436] ? __ia32_sys_sendmsg+0x90/0x90 [ 326.684873][T14436] ? __rcu_read_lock+0x50/0x50 [ 326.689613][T14436] ? __kasan_slab_free+0x1e2/0x220 [ 326.694702][T14436] ? __kasan_slab_free+0x168/0x220 [ 326.699795][T14436] ? slab_free_freelist_hook+0xd0/0x150 [ 326.705334][T14436] ? kmem_cache_free+0xac/0x5c0 [ 326.710163][T14436] ? do_sys_open+0x4a3/0x620 [ 326.714730][T14436] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 326.720784][T14436] ? do_sys_open+0x2fc/0x620 [ 326.725376][T14436] ? proc_fail_nth_write+0x166/0x200 [ 326.730643][T14436] ? proc_fail_nth_read+0x1c0/0x1c0 [ 326.735822][T14436] ? ip4_datagram_release_cb+0x864/0xde0 [ 326.741437][T14436] ? proc_fail_nth_read+0x1c0/0x1c0 [ 326.746631][T14436] ? memset+0x1f/0x40 [ 326.750590][T14436] ? fsnotify+0x13a0/0x1460 [ 326.755083][T14436] ? __kernel_write+0x340/0x340 [ 326.759925][T14436] ? fsnotify+0x13a0/0x1460 [ 326.764421][T14436] ? security_file_permission+0x128/0x300 [ 326.770155][T14436] ? __sb_end_write+0xa4/0xf0 [ 326.774825][T14436] ? vfs_write+0x427/0x4f0 [ 326.779219][T14436] ? ksys_write+0x237/0x2a0 [ 326.784420][T14436] ? __ia32_sys_read+0x80/0x80 [ 326.789171][T14436] __x64_sys_sendmmsg+0x9c/0xb0 [ 326.794178][T14436] do_syscall_64+0xcb/0x150 [ 326.799129][T14436] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 326.805099][T14436] RIP: 0033:0x45de59 [ 326.808984][T14436] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.828579][T14436] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 326.836992][T14436] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 326.845088][T14436] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 326.853080][T14436] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 326.861036][T14436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000034 13:14:13 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:14:13 executing program 0 (fault-call:6 fault-nth:53): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 326.869077][T14436] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:13 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xc000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 326.935172][T14435] EXT4-fs (loop2): inodes count not valid: 2592 vs 32 [ 326.970547][T14442] FAULT_INJECTION: forcing a failure. [ 326.970547][T14442] name failslab, interval 1, probability 0, space 0, times 0 [ 326.983378][T14442] CPU: 0 PID: 14442 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 326.993528][T14442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.003687][T14442] Call Trace: [ 327.007004][T14442] dump_stack+0x1b0/0x21e [ 327.011482][T14442] ? devkmsg_release+0x11c/0x11c [ 327.016408][T14442] ? show_regs_print_info+0x12/0x12 [ 327.021593][T14442] should_fail+0x6fb/0x860 [ 327.025989][T14442] ? setup_fault_attr+0x2b0/0x2b0 [ 327.031010][T14442] ? eth_get_headlen+0x240/0x240 [ 327.035939][T14442] ? sock_def_write_space+0x1b9/0x2a0 [ 327.041361][T14442] ? __alloc_skb+0x88/0x4d0 [ 327.045882][T14442] should_failslab+0x5/0x20 [ 327.052034][T14442] kmem_cache_alloc+0x36/0x250 [ 327.056781][T14442] ? netif_rx+0x157/0x2b0 [ 327.061110][T14442] __alloc_skb+0x88/0x4d0 [ 327.065431][T14442] ? dev_queue_xmit_nit+0x946/0x9e0 [ 327.070613][T14442] alloc_skb_with_frags+0xb1/0x580 [ 327.075708][T14442] ? _local_bh_enable+0x30/0x30 [ 327.076845][T14447] overlayfs: failed to resolve './file1': -2 [ 327.080585][T14442] sock_alloc_send_pskb+0x87e/0xcc0 [ 327.080598][T14442] ? sock_kzfree_s+0x50/0x50 [ 327.080616][T14442] __ip_append_data+0x1fbd/0x31b0 [ 327.101321][T14442] ? ip_do_fragment+0x2290/0x2290 [ 327.106334][T14442] ? ip_output+0x318/0x400 [ 327.110725][T14442] ? ip_setup_cork+0x810/0x810 [ 327.115474][T14442] ? ipv4_mtu+0x212/0x2c0 [ 327.119788][T14442] ? ip_setup_cork+0x46b/0x810 [ 327.124544][T14442] ip_make_skb+0x1c9/0x4d0 [ 327.128934][T14442] ? ip_do_fragment+0x2290/0x2290 [ 327.133930][T14442] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 327.139558][T14442] ? __sk_dst_check+0x1b0/0x1b0 [ 327.144398][T14442] udp_sendmsg+0x1d1b/0x2e80 [ 327.148967][T14442] ? ip_do_fragment+0x2290/0x2290 [ 327.153965][T14442] ? udp_cmsg_send+0x340/0x340 [ 327.158719][T14442] ? selinux_socket_sendmsg+0x10b/0x320 [ 327.164271][T14442] ? selinux_socket_accept+0x580/0x580 [ 327.170328][T14442] ? rw_copy_check_uvector+0x6b/0x310 [ 327.175676][T14442] ? inet_send_prepare+0x1b7/0x470 [ 327.180776][T14442] ? inet_send_prepare+0x470/0x470 [ 327.185879][T14442] ____sys_sendmsg+0x56f/0x860 [ 327.190621][T14442] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 327.195793][T14442] ? udp_sendmsg+0x75b/0x2e80 [ 327.200450][T14442] ? __sys_sendmmsg+0x46f/0x680 [ 327.205275][T14442] __sys_sendmmsg+0x338/0x680 [ 327.209946][T14442] ? __ia32_sys_sendmsg+0x90/0x90 [ 327.214958][T14442] ? __rcu_read_lock+0x50/0x50 [ 327.219699][T14442] ? __kasan_slab_free+0x1e2/0x220 [ 327.224792][T14442] ? __kasan_slab_free+0x168/0x220 [ 327.229908][T14442] ? slab_free_freelist_hook+0xd0/0x150 [ 327.235429][T14442] ? kmem_cache_free+0xac/0x5c0 [ 327.240780][T14442] ? do_sys_open+0x4a3/0x620 [ 327.245477][T14442] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 327.252480][T14442] ? do_sys_open+0x2fc/0x620 [ 327.257087][T14442] ? proc_fail_nth_write+0x166/0x200 [ 327.262369][T14442] ? proc_fail_nth_read+0x1c0/0x1c0 [ 327.267565][T14442] ? ip4_datagram_release_cb+0x864/0xde0 [ 327.273175][T14442] ? proc_fail_nth_read+0x1c0/0x1c0 [ 327.278365][T14442] ? memset+0x1f/0x40 [ 327.282395][T14442] ? fsnotify+0x13a0/0x1460 [ 327.286880][T14442] ? __kernel_write+0x340/0x340 [ 327.291724][T14442] ? fsnotify+0x13a0/0x1460 [ 327.296224][T14442] ? security_file_permission+0x128/0x300 [ 327.302891][T14442] ? __sb_end_write+0xa4/0xf0 [ 327.307547][T14442] ? vfs_write+0x427/0x4f0 [ 327.311976][T14442] ? ksys_write+0x237/0x2a0 [ 327.316459][T14442] ? __ia32_sys_read+0x80/0x80 [ 327.321277][T14442] __x64_sys_sendmmsg+0x9c/0xb0 [ 327.326124][T14442] do_syscall_64+0xcb/0x150 [ 327.330619][T14442] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 327.336489][T14442] RIP: 0033:0x45de59 [ 327.340355][T14442] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.359954][T14442] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 327.368363][T14442] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 327.376326][T14442] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 327.384301][T14442] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 327.392273][T14442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000035 [ 327.400219][T14442] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:14 executing program 0 (fault-call:6 fault-nth:54): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200b00000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:14 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400025, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:14:14 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='freezer.state\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x8, &(0x7f0000000200)=""/6, &(0x7f0000000240)=0x6) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000140)=0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r4 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r4, 0x82307201, &(0x7f00000001c0)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) write$cgroup_freezer_state(r4, &(0x7f0000000400)='THAWED\x00', 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) readlinkat(r6, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=""/207, 0xcf) [ 327.474773][T14447] overlayfs: filesystem on './file1' not supported [ 327.487816][T14462] EXT4-fs (loop2): inodes count not valid: 2848 vs 32 [ 327.506874][T14466] FAULT_INJECTION: forcing a failure. [ 327.506874][T14466] name failslab, interval 1, probability 0, space 0, times 0 [ 327.520444][T14466] CPU: 1 PID: 14466 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 327.530604][T14466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.540656][T14466] Call Trace: [ 327.543941][T14466] dump_stack+0x1b0/0x21e [ 327.548266][T14466] ? devkmsg_release+0x11c/0x11c [ 327.553191][T14466] ? show_regs_print_info+0x12/0x12 [ 327.558382][T14466] should_fail+0x6fb/0x860 [ 327.562781][T14466] ? setup_fault_attr+0x2b0/0x2b0 [ 327.567802][T14466] ? ___slab_alloc+0x9b/0x450 [ 327.572475][T14466] ? eth_get_headlen+0x240/0x240 [ 327.577388][T14466] ? sock_def_write_space+0x1b9/0x2a0 [ 327.582753][T14466] ? alloc_skb_with_frags+0xb1/0x580 [ 327.588020][T14466] should_failslab+0x5/0x20 [ 327.592531][T14466] __kmalloc_track_caller+0x5d/0x2b0 [ 327.597806][T14466] ? kmem_cache_alloc+0x1d5/0x250 [ 327.602817][T14466] ? alloc_skb_with_frags+0xb1/0x580 [ 327.608113][T14466] __alloc_skb+0xd1/0x4d0 [ 327.612430][T14466] alloc_skb_with_frags+0xb1/0x580 [ 327.617534][T14466] ? _local_bh_enable+0x30/0x30 [ 327.622379][T14466] sock_alloc_send_pskb+0x87e/0xcc0 [ 327.627592][T14466] ? sock_kzfree_s+0x50/0x50 [ 327.632173][T14466] __ip_append_data+0x1fbd/0x31b0 [ 327.637185][T14466] ? ip_do_fragment+0x2290/0x2290 [ 327.642210][T14466] ? ip_output+0x318/0x400 [ 327.646626][T14466] ? ip_setup_cork+0x810/0x810 [ 327.651370][T14466] ? ipv4_mtu+0x212/0x2c0 [ 327.655690][T14466] ? ip_setup_cork+0x46b/0x810 [ 327.660439][T14466] ip_make_skb+0x1c9/0x4d0 [ 327.664842][T14466] ? ip_do_fragment+0x2290/0x2290 [ 327.669880][T14466] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 327.675511][T14466] ? __sk_dst_check+0x1b0/0x1b0 [ 327.680352][T14466] udp_sendmsg+0x1d1b/0x2e80 [ 327.684937][T14466] ? ip_do_fragment+0x2290/0x2290 [ 327.689945][T14466] ? udp_cmsg_send+0x340/0x340 [ 327.694712][T14466] ? selinux_socket_sendmsg+0x10b/0x320 [ 327.700250][T14466] ? selinux_socket_accept+0x580/0x580 [ 327.705701][T14466] ? rw_copy_check_uvector+0x6b/0x310 [ 327.711067][T14466] ? inet_send_prepare+0x1b7/0x470 [ 327.716174][T14466] ? inet_send_prepare+0x470/0x470 [ 327.721278][T14466] ____sys_sendmsg+0x56f/0x860 [ 327.726038][T14466] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 327.731339][T14466] ? udp_sendmsg+0x75b/0x2e80 [ 327.736002][T14466] ? __sys_sendmmsg+0x46f/0x680 [ 327.740838][T14466] __sys_sendmmsg+0x338/0x680 [ 327.745520][T14466] ? __ia32_sys_sendmsg+0x90/0x90 [ 327.751087][T14466] ? __rcu_read_lock+0x50/0x50 [ 327.755865][T14466] ? __kasan_slab_free+0x1e2/0x220 [ 327.760959][T14466] ? __kasan_slab_free+0x168/0x220 [ 327.766059][T14466] ? slab_free_freelist_hook+0xd0/0x150 [ 327.771589][T14466] ? kmem_cache_free+0xac/0x5c0 [ 327.776440][T14466] ? do_sys_open+0x4a3/0x620 [ 327.781045][T14466] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 327.787109][T14466] ? do_sys_open+0x2fc/0x620 [ 327.791698][T14466] ? proc_fail_nth_write+0x166/0x200 [ 327.796973][T14466] ? proc_fail_nth_read+0x1c0/0x1c0 [ 327.802160][T14466] ? ip4_datagram_release_cb+0x864/0xde0 [ 327.807809][T14466] ? proc_fail_nth_read+0x1c0/0x1c0 [ 327.814129][T14466] ? memset+0x1f/0x40 [ 327.818101][T14466] ? fsnotify+0x13a0/0x1460 [ 327.822588][T14466] ? __kernel_write+0x340/0x340 [ 327.827441][T14466] ? fsnotify+0x13a0/0x1460 [ 327.831935][T14466] ? security_file_permission+0x128/0x300 [ 327.837641][T14466] ? __sb_end_write+0xa4/0xf0 [ 327.842320][T14466] ? vfs_write+0x427/0x4f0 [ 327.846729][T14466] ? ksys_write+0x237/0x2a0 [ 327.851221][T14466] ? __ia32_sys_read+0x80/0x80 [ 327.855982][T14466] __x64_sys_sendmmsg+0x9c/0xb0 [ 327.860828][T14466] do_syscall_64+0xcb/0x150 [ 327.865335][T14466] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 327.871212][T14466] RIP: 0033:0x45de59 [ 327.875090][T14466] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.894711][T14466] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 327.903111][T14466] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 327.911173][T14466] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 327.919135][T14466] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 327.927098][T14466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000036 [ 327.935057][T14466] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:14 executing program 0 (fault-call:6 fault-nth:55): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200c00000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 328.080887][T14476] FAULT_INJECTION: forcing a failure. [ 328.080887][T14476] name failslab, interval 1, probability 0, space 0, times 0 [ 328.093601][T14476] CPU: 0 PID: 14476 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 328.103748][T14476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.113821][T14476] Call Trace: [ 328.117121][T14476] dump_stack+0x1b0/0x21e [ 328.121443][T14476] ? devkmsg_release+0x11c/0x11c [ 328.126381][T14476] ? show_regs_print_info+0x12/0x12 [ 328.131573][T14476] ? __copy_skb_header+0x429/0x560 [ 328.136682][T14476] should_fail+0x6fb/0x860 [ 328.141096][T14476] ? setup_fault_attr+0x2b0/0x2b0 [ 328.146208][T14476] ? eth_type_trans+0x2a3/0x680 [ 328.151070][T14476] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 328.156437][T14476] ? skb_clone+0x1b2/0x370 [ 328.160851][T14476] should_failslab+0x5/0x20 [ 328.165444][T14476] kmem_cache_alloc+0x36/0x250 [ 328.170210][T14476] skb_clone+0x1b2/0x370 [ 328.174552][T14476] dev_queue_xmit_nit+0x279/0x9e0 [ 328.179766][T14476] xmit_one+0x7b/0x460 [ 328.183829][T14476] __dev_queue_xmit+0x1858/0x25d0 [ 328.188849][T14476] ? dev_queue_xmit+0x20/0x20 [ 328.193545][T14476] ? ip_finish_output2+0x936/0x1810 [ 328.198826][T14476] ip_finish_output2+0xbdf/0x1810 [ 328.204284][T14476] ? ip_fragment+0x210/0x210 [ 328.208893][T14476] ? __ip_finish_output+0x4e1/0x6d0 [ 328.214102][T14476] ip_output+0x318/0x400 [ 328.218339][T14476] ? ip_finish_output+0x1d0/0x1d0 [ 328.223355][T14476] ? ip_mc_finish_output+0x3a0/0x3a0 [ 328.228721][T14476] ? udp4_hwcsum+0x26b/0x430 [ 328.233308][T14476] ip_send_skb+0xaa/0x140 [ 328.238015][T14476] udp_send_skb+0x8e9/0x1100 [ 328.242601][T14476] udp_sendmsg+0x1d45/0x2e80 [ 328.247193][T14476] ? ip_do_fragment+0x2290/0x2290 [ 328.252223][T14476] ? udp_cmsg_send+0x340/0x340 [ 328.256989][T14476] ? selinux_socket_sendmsg+0x10b/0x320 [ 328.263056][T14476] ? selinux_socket_accept+0x580/0x580 [ 328.268523][T14476] ? rw_copy_check_uvector+0x6b/0x310 [ 328.274155][T14476] ? inet_send_prepare+0x1b7/0x470 [ 328.279374][T14476] ? inet_send_prepare+0x470/0x470 [ 328.284484][T14476] ____sys_sendmsg+0x56f/0x860 [ 328.289249][T14476] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 328.294479][T14476] ? udp_sendmsg+0x75b/0x2e80 [ 328.299696][T14476] ? __sys_sendmmsg+0x46f/0x680 [ 328.304545][T14476] __sys_sendmmsg+0x338/0x680 [ 328.309229][T14476] ? __ia32_sys_sendmsg+0x90/0x90 [ 328.314278][T14476] ? __rcu_read_lock+0x50/0x50 [ 328.319123][T14476] ? __kasan_slab_free+0x1e2/0x220 [ 328.324256][T14476] ? __kasan_slab_free+0x168/0x220 [ 328.329369][T14476] ? slab_free_freelist_hook+0xd0/0x150 [ 328.334927][T14476] ? kmem_cache_free+0xac/0x5c0 [ 328.339771][T14476] ? do_sys_open+0x4a3/0x620 [ 328.344359][T14476] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 328.350513][T14476] ? do_sys_open+0x2fc/0x620 [ 328.355193][T14476] ? proc_fail_nth_write+0x166/0x200 [ 328.360512][T14476] ? proc_fail_nth_read+0x1c0/0x1c0 [ 328.365709][T14476] ? ip4_datagram_release_cb+0x864/0xde0 [ 328.371341][T14476] ? proc_fail_nth_read+0x1c0/0x1c0 [ 328.376539][T14476] ? memset+0x1f/0x40 [ 328.381211][T14476] ? fsnotify+0x13a0/0x1460 [ 328.385804][T14476] ? __kernel_write+0x340/0x340 [ 328.390677][T14476] ? fsnotify+0x13a0/0x1460 [ 328.395283][T14476] ? security_file_permission+0x128/0x300 [ 328.401002][T14476] ? __sb_end_write+0xa4/0xf0 [ 328.405679][T14476] ? vfs_write+0x427/0x4f0 [ 328.410123][T14476] ? ksys_write+0x237/0x2a0 [ 328.414648][T14476] ? __ia32_sys_read+0x80/0x80 [ 328.419437][T14476] __x64_sys_sendmmsg+0x9c/0xb0 [ 328.424289][T14476] do_syscall_64+0xcb/0x150 [ 328.428792][T14476] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 328.434679][T14476] RIP: 0033:0x45de59 [ 328.438592][T14476] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.459143][T14476] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 328.467635][T14476] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 13:14:15 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xd000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 328.475602][T14476] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 328.484090][T14476] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 328.492772][T14476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000037 [ 328.500740][T14476] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 328.534819][T14480] overlayfs: workdir and upperdir must be separate subtrees [ 328.575068][T14480] overlayfs: filesystem on './file1' not supported 13:14:15 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x40002c, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:14:15 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0x4) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f0000000200)={0x1, 0x0, 0x8}) 13:14:15 executing program 0 (fault-call:6 fault-nth:56): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 328.597661][T14483] EXT4-fs (loop2): inodes count not valid: 3104 vs 32 13:14:15 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)={{r0, r1/1000+10000}, {r2, r3/1000+60000}}) r4 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)=0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000500)={{{@in=@loopback, @in=@multicast1, 0x4e21, 0x7, 0x4e23, 0x8001, 0x2, 0x80, 0x0, 0x73, 0x0, r5}, {0x80000001, 0x100000001, 0xfffffffffffefffb, 0x79f, 0x10001, 0x7, 0x773, 0x6}, {0x5, 0x7ff, 0xfffffffffffff800}, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x2}, {{@in6=@private1, 0x4d3, 0x3c}, 0xa, @in6=@ipv4={[], [], @multicast2}, 0x34ff, 0x4, 0x2, 0x8, 0x3, 0x8, 0x7}}, 0xe8) prctl$PR_GET_NO_NEW_PRIVS(0x27) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getdents(r4, &(0x7f0000000100)=""/26, 0x1a) r8 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r8) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000400)={{0x2, 0x4e20, @rand_addr=0x64010100}, {0x1}, 0x40, {0x2, 0x4e22, @broadcast}, 'veth1_to_hsr\x00'}) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x78, 0x0, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={[], [], @multicast2}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @local}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private2={0xfc, 0x2, [], 0x1}}]}, 0x78}, 0x1, 0x0, 0x0, 0x20008040}, 0x8000) sendmsg$NLBL_MGMT_C_PROTOCOLS(r4, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000229bd7000fbdbdf250700000008000c0002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x840) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000340)={'tunl0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="780000870000005e000000014b1d002c00660000002d90789dc3001fa8f018ac141401ffac1e0101ac1e000100"/56]}) ioctl$FITRIM(r4, 0x82307201, &(0x7f00000001c0)) 13:14:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200d00000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:15 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xe000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 328.760799][T14493] FAULT_INJECTION: forcing a failure. [ 328.760799][T14493] name failslab, interval 1, probability 0, space 0, times 0 [ 328.803157][T14493] CPU: 0 PID: 14493 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 328.813393][T14493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.823428][T14493] Call Trace: [ 328.826729][T14493] dump_stack+0x1b0/0x21e [ 328.831051][T14493] ? devkmsg_release+0x11c/0x11c [ 328.835974][T14493] ? show_regs_print_info+0x12/0x12 [ 328.841165][T14493] should_fail+0x6fb/0x860 [ 328.845599][T14493] ? setup_fault_attr+0x2b0/0x2b0 [ 328.850603][T14493] ? eth_get_headlen+0x240/0x240 [ 328.855514][T14493] ? sock_def_write_space+0x1b9/0x2a0 [ 328.860872][T14493] ? __alloc_skb+0x88/0x4d0 [ 328.865349][T14493] should_failslab+0x5/0x20 [ 328.869831][T14493] kmem_cache_alloc+0x36/0x250 [ 328.874576][T14493] ? netif_rx+0x157/0x2b0 [ 328.878881][T14493] __alloc_skb+0x88/0x4d0 [ 328.883192][T14493] ? dev_queue_xmit_nit+0x946/0x9e0 [ 328.888364][T14493] alloc_skb_with_frags+0xb1/0x580 [ 328.893459][T14493] ? _local_bh_enable+0x30/0x30 [ 328.898282][T14493] sock_alloc_send_pskb+0x87e/0xcc0 [ 328.903467][T14493] ? sock_kzfree_s+0x50/0x50 [ 328.908044][T14493] __ip_append_data+0x1fbd/0x31b0 [ 328.913075][T14493] ? ip_do_fragment+0x2290/0x2290 [ 328.918137][T14493] ? ip_output+0x318/0x400 [ 328.922534][T14493] ? ip_setup_cork+0x810/0x810 [ 328.927301][T14493] ? ipv4_mtu+0x212/0x2c0 [ 328.931614][T14493] ? ip_setup_cork+0x46b/0x810 [ 328.936387][T14493] ip_make_skb+0x1c9/0x4d0 [ 328.940793][T14493] ? ip_do_fragment+0x2290/0x2290 [ 328.945803][T14493] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 328.951409][T14493] ? __sk_dst_check+0x1b0/0x1b0 [ 328.956237][T14493] udp_sendmsg+0x1d1b/0x2e80 [ 328.960805][T14493] ? ip_do_fragment+0x2290/0x2290 [ 328.965798][T14493] ? udp_cmsg_send+0x340/0x340 [ 328.970547][T14493] ? selinux_socket_sendmsg+0x10b/0x320 [ 328.976064][T14493] ? selinux_socket_accept+0x580/0x580 [ 328.981495][T14493] ? rw_copy_check_uvector+0x6b/0x310 [ 328.986846][T14493] ? inet_send_prepare+0x1b7/0x470 [ 328.991937][T14493] ? inet_send_prepare+0x470/0x470 [ 328.997047][T14493] ____sys_sendmsg+0x56f/0x860 [ 329.001819][T14493] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 329.007014][T14493] ? udp_sendmsg+0x75b/0x2e80 [ 329.011676][T14493] ? __sys_sendmmsg+0x46f/0x680 [ 329.016502][T14493] __sys_sendmmsg+0x338/0x680 [ 329.021173][T14493] ? __ia32_sys_sendmsg+0x90/0x90 [ 329.026186][T14493] ? __rcu_read_lock+0x50/0x50 [ 329.031096][T14493] ? __kasan_slab_free+0x1e2/0x220 [ 329.036964][T14493] ? __kasan_slab_free+0x168/0x220 [ 329.042072][T14493] ? slab_free_freelist_hook+0xd0/0x150 [ 329.047592][T14493] ? kmem_cache_free+0xac/0x5c0 [ 329.052436][T14493] ? do_sys_open+0x4a3/0x620 [ 329.057013][T14493] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 329.063079][T14493] ? do_sys_open+0x2fc/0x620 [ 329.067651][T14493] ? proc_fail_nth_write+0x166/0x200 [ 329.072927][T14493] ? proc_fail_nth_read+0x1c0/0x1c0 [ 329.078122][T14493] ? ip4_datagram_release_cb+0x864/0xde0 [ 329.083731][T14493] ? proc_fail_nth_read+0x1c0/0x1c0 [ 329.088904][T14493] ? memset+0x1f/0x40 [ 329.092886][T14493] ? fsnotify+0x13a0/0x1460 [ 329.097373][T14493] ? __kernel_write+0x340/0x340 [ 329.102216][T14493] ? fsnotify+0x13a0/0x1460 [ 329.106699][T14493] ? security_file_permission+0x128/0x300 [ 329.112394][T14493] ? __sb_end_write+0xa4/0xf0 [ 329.117048][T14493] ? vfs_write+0x427/0x4f0 [ 329.121442][T14493] ? ksys_write+0x237/0x2a0 [ 329.125937][T14493] ? __ia32_sys_read+0x80/0x80 [ 329.130680][T14493] __x64_sys_sendmmsg+0x9c/0xb0 [ 329.136284][T14493] do_syscall_64+0xcb/0x150 [ 329.140758][T14493] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 329.146638][T14493] RIP: 0033:0x45de59 [ 329.150526][T14493] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.170120][T14493] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 329.178510][T14493] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 329.186516][T14493] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 329.194467][T14493] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 329.202419][T14493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000038 [ 329.210433][T14493] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:16 executing program 0 (fault-call:6 fault-nth:57): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 329.257279][T14505] EXT4-fs (loop2): inodes count not valid: 3360 vs 32 [ 329.259195][T14512] overlayfs: filesystem on './file1' not supported [ 329.298975][T14519] FAULT_INJECTION: forcing a failure. [ 329.298975][T14519] name failslab, interval 1, probability 0, space 0, times 0 [ 329.311872][T14519] CPU: 0 PID: 14519 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 329.322025][T14519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.332100][T14519] Call Trace: [ 329.335415][T14519] dump_stack+0x1b0/0x21e [ 329.339764][T14519] ? devkmsg_release+0x11c/0x11c [ 329.344713][T14519] ? show_regs_print_info+0x12/0x12 [ 329.349915][T14519] should_fail+0x6fb/0x860 [ 329.354328][T14519] ? setup_fault_attr+0x2b0/0x2b0 [ 329.359399][T14519] ? eth_get_headlen+0x240/0x240 [ 329.364331][T14519] ? sock_def_write_space+0x1b9/0x2a0 [ 329.369701][T14519] ? alloc_skb_with_frags+0xb1/0x580 [ 329.374982][T14519] should_failslab+0x5/0x20 [ 329.379485][T14519] __kmalloc_track_caller+0x5d/0x2b0 [ 329.384772][T14519] ? kmem_cache_alloc+0x1d5/0x250 [ 329.389794][T14519] ? netif_rx+0x157/0x2b0 [ 329.394125][T14519] ? alloc_skb_with_frags+0xb1/0x580 [ 329.399403][T14519] __alloc_skb+0xd1/0x4d0 [ 329.403731][T14519] alloc_skb_with_frags+0xb1/0x580 [ 329.408845][T14519] ? _local_bh_enable+0x30/0x30 [ 329.413691][T14519] sock_alloc_send_pskb+0x87e/0xcc0 [ 329.418886][T14519] ? sock_kzfree_s+0x50/0x50 [ 329.423497][T14519] __ip_append_data+0x1fbd/0x31b0 [ 329.428520][T14519] ? ip_do_fragment+0x2290/0x2290 [ 329.433540][T14519] ? ip_output+0x318/0x400 [ 329.437946][T14519] ? ip_setup_cork+0x810/0x810 [ 329.442725][T14519] ? ipv4_mtu+0x212/0x2c0 [ 329.447071][T14519] ? ip_setup_cork+0x46b/0x810 [ 329.451849][T14519] ip_make_skb+0x1c9/0x4d0 [ 329.456281][T14519] ? ip_do_fragment+0x2290/0x2290 [ 329.461299][T14519] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 329.466925][T14519] ? __sk_dst_check+0x1b0/0x1b0 [ 329.471777][T14519] udp_sendmsg+0x1d1b/0x2e80 [ 329.476370][T14519] ? ip_do_fragment+0x2290/0x2290 [ 329.481387][T14519] ? udp_cmsg_send+0x340/0x340 [ 329.486148][T14519] ? selinux_socket_sendmsg+0x10b/0x320 [ 329.491693][T14519] ? selinux_socket_accept+0x580/0x580 [ 329.497149][T14519] ? rw_copy_check_uvector+0x6b/0x310 [ 329.502521][T14519] ? inet_send_prepare+0x1b7/0x470 [ 329.507632][T14519] ? inet_send_prepare+0x470/0x470 [ 329.512748][T14519] ____sys_sendmsg+0x56f/0x860 [ 329.517509][T14519] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 329.522699][T14519] ? udp_sendmsg+0x75b/0x2e80 [ 329.527369][T14519] ? __sys_sendmmsg+0x46f/0x680 [ 329.532215][T14519] __sys_sendmmsg+0x338/0x680 [ 329.536904][T14519] ? __ia32_sys_sendmsg+0x90/0x90 [ 329.541931][T14519] ? __rcu_read_lock+0x50/0x50 [ 329.546688][T14519] ? __kasan_slab_free+0x1e2/0x220 [ 329.551793][T14519] ? __kasan_slab_free+0x168/0x220 [ 329.559188][T14519] ? slab_free_freelist_hook+0xd0/0x150 [ 329.564733][T14519] ? kmem_cache_free+0xac/0x5c0 [ 329.569587][T14519] ? do_sys_open+0x4a3/0x620 [ 329.574177][T14519] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 329.580240][T14519] ? do_sys_open+0x2fc/0x620 [ 329.584976][T14519] ? proc_fail_nth_write+0x166/0x200 [ 329.590257][T14519] ? proc_fail_nth_read+0x1c0/0x1c0 [ 329.595456][T14519] ? ip4_datagram_release_cb+0x864/0xde0 [ 329.601088][T14519] ? proc_fail_nth_read+0x1c0/0x1c0 [ 329.606282][T14519] ? memset+0x1f/0x40 [ 329.610256][T14519] ? fsnotify+0x13a0/0x1460 [ 329.614783][T14519] ? __kernel_write+0x340/0x340 [ 329.619625][T14519] ? fsnotify+0x13a0/0x1460 [ 329.624135][T14519] ? security_file_permission+0x128/0x300 [ 329.629846][T14519] ? __sb_end_write+0xa4/0xf0 [ 329.634520][T14519] ? vfs_write+0x427/0x4f0 [ 329.638937][T14519] ? ksys_write+0x237/0x2a0 [ 329.643441][T14519] ? __ia32_sys_read+0x80/0x80 [ 329.648205][T14519] __x64_sys_sendmmsg+0x9c/0xb0 [ 329.653096][T14519] do_syscall_64+0xcb/0x150 [ 329.657600][T14519] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 329.663488][T14519] RIP: 0033:0x45de59 [ 329.667381][T14519] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.687006][T14519] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 329.695455][T14519] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 329.703431][T14519] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 329.711402][T14519] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 329.719395][T14519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000039 [ 329.727481][T14519] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:16 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="fe6ab2c6b1887e4dfd8334e37cf7297d79fe4e8e9f727ef0ca1a8e921be3a0f3edeaa59868ebf61c5781ecf04299c910da5c0203cbeebabdc164ec6e9e27a2e7587bdad785fa1b76835d0370adaa8bad6f7a8de35624d9e7c490d89e3e81b82149d22a8778fc22d51328dc", @ANYRES16, @ANYRESHEX, @ANYRESDEC, @ANYRESDEC]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x12081ff) fcntl$setstatus(r3, 0x4, 0x6100) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r5 = open(&(0x7f0000000140)='./file0\x00', 0x149042, 0x0) r6 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x47a) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000180)={0x0, r3}) r7 = open(&(0x7f0000000400)='./bus\x00', 0x14943e, 0x0) pwritev(r7, &(0x7f0000001640)=[{&(0x7f0000000100)="84", 0x1}], 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) ioctl$KDDELIO(r7, 0x4b35, 0x3) 13:14:16 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400036, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 329.748203][T14512] overlayfs: filesystem on './file1' not supported 13:14:16 executing program 0 (fault-call:6 fault-nth:58): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200e00000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:16 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x10000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 329.921111][T14529] FAULT_INJECTION: forcing a failure. [ 329.921111][T14529] name failslab, interval 1, probability 0, space 0, times 0 [ 329.933789][T14529] CPU: 0 PID: 14529 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 329.943936][T14529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.953997][T14529] Call Trace: [ 329.957290][T14529] dump_stack+0x1b0/0x21e [ 329.961622][T14529] ? devkmsg_release+0x11c/0x11c [ 329.966557][T14529] ? show_regs_print_info+0x12/0x12 [ 329.971755][T14529] ? __copy_skb_header+0x429/0x560 [ 329.976861][T14529] should_fail+0x6fb/0x860 [ 329.981271][T14529] ? setup_fault_attr+0x2b0/0x2b0 [ 329.986289][T14529] ? eth_type_trans+0x2a3/0x680 [ 329.991142][T14529] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 329.996510][T14529] ? skb_clone+0x1b2/0x370 [ 330.000931][T14529] should_failslab+0x5/0x20 [ 330.003620][T14535] overlayfs: failed to resolve './file1': -2 [ 330.005447][T14529] kmem_cache_alloc+0x36/0x250 [ 330.005463][T14529] skb_clone+0x1b2/0x370 [ 330.020392][T14529] dev_queue_xmit_nit+0x279/0x9e0 [ 330.025403][T14529] xmit_one+0x7b/0x460 [ 330.029460][T14529] __dev_queue_xmit+0x1858/0x25d0 [ 330.034476][T14529] ? dev_queue_xmit+0x20/0x20 [ 330.039149][T14529] ? ip_finish_output2+0x936/0x1810 [ 330.044337][T14529] ip_finish_output2+0xbdf/0x1810 [ 330.049351][T14529] ? ip_fragment+0x210/0x210 [ 330.053928][T14529] ? __ip_finish_output+0x4e1/0x6d0 [ 330.059113][T14529] ip_output+0x318/0x400 [ 330.063343][T14529] ? ip_finish_output+0x1d0/0x1d0 [ 330.068356][T14529] ? ip_mc_finish_output+0x3a0/0x3a0 [ 330.073631][T14529] ? udp4_hwcsum+0x26b/0x430 [ 330.078238][T14529] ip_send_skb+0xaa/0x140 [ 330.082559][T14529] udp_send_skb+0x8e9/0x1100 [ 330.087139][T14529] udp_sendmsg+0x1d45/0x2e80 [ 330.091849][T14529] ? ip_do_fragment+0x2290/0x2290 [ 330.096862][T14529] ? udp_cmsg_send+0x340/0x340 [ 330.101623][T14529] ? selinux_socket_sendmsg+0x10b/0x320 [ 330.107158][T14529] ? selinux_socket_accept+0x580/0x580 [ 330.112619][T14529] ? rw_copy_check_uvector+0x6b/0x310 [ 330.118002][T14529] ? inet_send_prepare+0x1b7/0x470 [ 330.123117][T14529] ? inet_send_prepare+0x470/0x470 [ 330.128220][T14529] ____sys_sendmsg+0x56f/0x860 [ 330.132971][T14529] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 330.138157][T14529] ? udp_sendmsg+0x75b/0x2e80 [ 330.142818][T14529] ? __sys_sendmmsg+0x46f/0x680 [ 330.147675][T14529] __sys_sendmmsg+0x338/0x680 [ 330.152363][T14529] ? __ia32_sys_sendmsg+0x90/0x90 [ 330.157375][T14529] ? __rcu_read_lock+0x50/0x50 [ 330.162124][T14529] ? __kasan_slab_free+0x1e2/0x220 [ 330.167216][T14529] ? __kasan_slab_free+0x168/0x220 [ 330.172314][T14529] ? slab_free_freelist_hook+0xd0/0x150 [ 330.178031][T14529] ? kmem_cache_free+0xac/0x5c0 [ 330.182918][T14529] ? do_sys_open+0x4a3/0x620 [ 330.187501][T14529] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 330.193556][T14529] ? do_sys_open+0x2fc/0x620 [ 330.198172][T14529] ? proc_fail_nth_write+0x166/0x200 [ 330.203449][T14529] ? proc_fail_nth_read+0x1c0/0x1c0 [ 330.208657][T14529] ? ip4_datagram_release_cb+0x864/0xde0 [ 330.214277][T14529] ? proc_fail_nth_read+0x1c0/0x1c0 [ 330.219469][T14529] ? memset+0x1f/0x40 [ 330.223452][T14529] ? fsnotify+0x13a0/0x1460 [ 330.227945][T14529] ? __kernel_write+0x340/0x340 [ 330.232780][T14529] ? fsnotify+0x13a0/0x1460 [ 330.237295][T14529] ? security_file_permission+0x128/0x300 [ 330.243027][T14529] ? __sb_end_write+0xa4/0xf0 [ 330.247697][T14529] ? vfs_write+0x427/0x4f0 [ 330.252106][T14529] ? ksys_write+0x237/0x2a0 [ 330.256646][T14529] ? __ia32_sys_read+0x80/0x80 [ 330.261427][T14529] __x64_sys_sendmmsg+0x9c/0xb0 [ 330.266278][T14529] do_syscall_64+0xcb/0x150 [ 330.270785][T14529] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 330.276668][T14529] RIP: 0033:0x45de59 [ 330.280552][T14529] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.300156][T14529] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 330.308562][T14529] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 330.316531][T14529] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 330.325281][T14529] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 330.333250][T14529] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003a [ 330.341216][T14529] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:17 executing program 0 (fault-call:6 fault-nth:59): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:17 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400037, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 330.436831][T14535] overlayfs: filesystem on './file1' not supported [ 330.458650][T14534] EXT4-fs (loop2): inodes count not valid: 3616 vs 32 13:14:17 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x11000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 330.496196][T14547] FAULT_INJECTION: forcing a failure. [ 330.496196][T14547] name failslab, interval 1, probability 0, space 0, times 0 [ 330.521881][T14547] CPU: 0 PID: 14547 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 330.532083][T14547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.542135][T14547] Call Trace: [ 330.545433][T14547] dump_stack+0x1b0/0x21e [ 330.549763][T14547] ? devkmsg_release+0x11c/0x11c [ 330.554718][T14547] ? show_regs_print_info+0x12/0x12 [ 330.559926][T14547] should_fail+0x6fb/0x860 [ 330.564353][T14547] ? setup_fault_attr+0x2b0/0x2b0 [ 330.569413][T14547] ? eth_get_headlen+0x240/0x240 [ 330.574349][T14547] ? sock_def_write_space+0x1b9/0x2a0 [ 330.579721][T14547] ? __alloc_skb+0x88/0x4d0 [ 330.584237][T14547] should_failslab+0x5/0x20 [ 330.588745][T14547] kmem_cache_alloc+0x36/0x250 [ 330.593512][T14547] ? netif_rx+0x157/0x2b0 [ 330.597838][T14547] __alloc_skb+0x88/0x4d0 [ 330.602166][T14547] ? dev_queue_xmit_nit+0x946/0x9e0 [ 330.607363][T14547] alloc_skb_with_frags+0xb1/0x580 [ 330.612482][T14547] ? _local_bh_enable+0x30/0x30 [ 330.617334][T14547] sock_alloc_send_pskb+0x87e/0xcc0 [ 330.622536][T14547] ? sock_kzfree_s+0x50/0x50 [ 330.627126][T14547] __ip_append_data+0x1fbd/0x31b0 [ 330.632152][T14547] ? ip_do_fragment+0x2290/0x2290 [ 330.637183][T14547] ? ip_output+0x318/0x400 [ 330.641609][T14547] ? ip_setup_cork+0x810/0x810 [ 330.646374][T14547] ? ipv4_mtu+0x212/0x2c0 [ 330.650709][T14547] ? ip_setup_cork+0x46b/0x810 [ 330.656166][T14547] ip_make_skb+0x1c9/0x4d0 [ 330.660579][T14547] ? ip_do_fragment+0x2290/0x2290 [ 330.665603][T14547] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 330.671233][T14547] ? __sk_dst_check+0x1b0/0x1b0 [ 330.676117][T14547] udp_sendmsg+0x1d1b/0x2e80 [ 330.680711][T14547] ? ip_do_fragment+0x2290/0x2290 [ 330.685732][T14547] ? udp_cmsg_send+0x340/0x340 [ 330.690495][T14547] ? selinux_socket_sendmsg+0x10b/0x320 [ 330.696043][T14547] ? selinux_socket_accept+0x580/0x580 [ 330.701512][T14547] ? rw_copy_check_uvector+0x6b/0x310 [ 330.706911][T14547] ? inet_send_prepare+0x1b7/0x470 [ 330.712063][T14547] ? inet_send_prepare+0x470/0x470 [ 330.717174][T14547] ____sys_sendmsg+0x56f/0x860 [ 330.721937][T14547] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 330.727133][T14547] ? udp_sendmsg+0x75b/0x2e80 [ 330.731814][T14547] ? __sys_sendmmsg+0x46f/0x680 [ 330.736663][T14547] __sys_sendmmsg+0x338/0x680 [ 330.741342][T14547] ? __ia32_sys_sendmsg+0x90/0x90 [ 330.746370][T14547] ? __rcu_read_lock+0x50/0x50 [ 330.751125][T14547] ? __kasan_slab_free+0x1e2/0x220 [ 330.756235][T14547] ? __kasan_slab_free+0x168/0x220 [ 330.761376][T14547] ? slab_free_freelist_hook+0xd0/0x150 [ 330.766915][T14547] ? kmem_cache_free+0xac/0x5c0 [ 330.771762][T14547] ? do_sys_open+0x4a3/0x620 [ 330.776348][T14547] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 330.782412][T14547] ? do_sys_open+0x2fc/0x620 [ 330.787003][T14547] ? proc_fail_nth_write+0x166/0x200 [ 330.792283][T14547] ? proc_fail_nth_read+0x1c0/0x1c0 [ 330.797490][T14547] ? ip4_datagram_release_cb+0x864/0xde0 [ 330.803133][T14547] ? proc_fail_nth_read+0x1c0/0x1c0 [ 330.808332][T14547] ? memset+0x1f/0x40 [ 330.812313][T14547] ? fsnotify+0x13a0/0x1460 [ 330.816814][T14547] ? __kernel_write+0x340/0x340 [ 330.821692][T14547] ? fsnotify+0x13a0/0x1460 [ 330.826212][T14547] ? security_file_permission+0x128/0x300 [ 330.831932][T14547] ? __sb_end_write+0xa4/0xf0 [ 330.836606][T14547] ? vfs_write+0x427/0x4f0 [ 330.841109][T14547] ? ksys_write+0x237/0x2a0 [ 330.845625][T14547] ? __ia32_sys_read+0x80/0x80 [ 330.850390][T14547] __x64_sys_sendmmsg+0x9c/0xb0 [ 330.855241][T14547] do_syscall_64+0xcb/0x150 [ 330.859753][T14547] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 330.865644][T14547] RIP: 0033:0x45de59 [ 330.869538][T14547] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.889139][T14547] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 330.897549][T14547] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 330.905521][T14547] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 330.913489][T14547] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 330.921575][T14547] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003b [ 330.929547][T14547] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:17 executing program 0 (fault-call:6 fault-nth:60): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200f00000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:17 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) r3 = dup3(r0, r0, 0x80000) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140)='ethtool\x00') sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r3, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, r4, 0x8, 0x70bd27, 0x25dfdbfb, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 331.056637][T14558] FAULT_INJECTION: forcing a failure. [ 331.056637][T14558] name failslab, interval 1, probability 0, space 0, times 0 [ 331.069623][T14558] CPU: 1 PID: 14558 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 331.079781][T14558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.089838][T14558] Call Trace: [ 331.093139][T14558] dump_stack+0x1b0/0x21e [ 331.098862][T14558] ? devkmsg_release+0x11c/0x11c [ 331.103803][T14558] ? show_regs_print_info+0x12/0x12 [ 331.109010][T14558] should_fail+0x6fb/0x860 [ 331.113435][T14558] ? setup_fault_attr+0x2b0/0x2b0 [ 331.118463][T14558] ? ___slab_alloc+0x9b/0x450 [ 331.123146][T14558] ? eth_get_headlen+0x240/0x240 [ 331.128084][T14558] ? sock_def_write_space+0x1b9/0x2a0 [ 331.133477][T14558] ? alloc_skb_with_frags+0xb1/0x580 [ 331.138786][T14558] should_failslab+0x5/0x20 [ 331.143292][T14558] __kmalloc_track_caller+0x5d/0x2b0 [ 331.148577][T14558] ? kmem_cache_alloc+0x1d5/0x250 [ 331.153601][T14558] ? alloc_skb_with_frags+0xb1/0x580 [ 331.158895][T14558] __alloc_skb+0xd1/0x4d0 [ 331.163224][T14558] alloc_skb_with_frags+0xb1/0x580 [ 331.168340][T14558] ? _local_bh_enable+0x30/0x30 [ 331.173201][T14558] sock_alloc_send_pskb+0x87e/0xcc0 [ 331.178405][T14558] ? sock_kzfree_s+0x50/0x50 [ 331.183006][T14558] __ip_append_data+0x1fbd/0x31b0 [ 331.188040][T14558] ? ip_do_fragment+0x2290/0x2290 [ 331.193065][T14558] ? ip_output+0x318/0x400 [ 331.197491][T14558] ? ip_setup_cork+0x810/0x810 [ 331.202254][T14558] ? ipv4_mtu+0x212/0x2c0 [ 331.206590][T14558] ? ip_setup_cork+0x46b/0x810 [ 331.211531][T14558] ip_make_skb+0x1c9/0x4d0 [ 331.215953][T14558] ? ip_do_fragment+0x2290/0x2290 [ 331.220980][T14558] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 331.226611][T14558] ? __sk_dst_check+0x1b0/0x1b0 [ 331.231462][T14558] udp_sendmsg+0x1d1b/0x2e80 [ 331.236060][T14558] ? ip_do_fragment+0x2290/0x2290 [ 331.241088][T14558] ? udp_cmsg_send+0x340/0x340 [ 331.245857][T14558] ? selinux_socket_sendmsg+0x10b/0x320 [ 331.251415][T14558] ? selinux_socket_accept+0x580/0x580 [ 331.256894][T14558] ? rw_copy_check_uvector+0x6b/0x310 [ 331.262291][T14558] ? inet_send_prepare+0x1b7/0x470 [ 331.267417][T14558] ? inet_send_prepare+0x470/0x470 [ 331.272533][T14558] ____sys_sendmsg+0x56f/0x860 [ 331.277312][T14558] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 331.282520][T14558] ? udp_sendmsg+0x75b/0x2e80 [ 331.287199][T14558] ? __sys_sendmmsg+0x46f/0x680 [ 331.292054][T14558] __sys_sendmmsg+0x338/0x680 [ 331.296739][T14558] ? __ia32_sys_sendmsg+0x90/0x90 [ 331.301802][T14558] ? __rcu_read_lock+0x50/0x50 [ 331.306566][T14558] ? __kasan_slab_free+0x1e2/0x220 [ 331.311676][T14558] ? __kasan_slab_free+0x168/0x220 [ 331.316790][T14558] ? slab_free_freelist_hook+0xd0/0x150 [ 331.322365][T14558] ? kmem_cache_free+0xac/0x5c0 [ 331.327220][T14558] ? do_sys_open+0x4a3/0x620 [ 331.331817][T14558] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 331.337892][T14558] ? do_sys_open+0x2fc/0x620 [ 331.342489][T14558] ? proc_fail_nth_write+0x166/0x200 [ 331.347809][T14558] ? proc_fail_nth_read+0x1c0/0x1c0 [ 331.353016][T14558] ? ip4_datagram_release_cb+0x864/0xde0 [ 331.358655][T14558] ? proc_fail_nth_read+0x1c0/0x1c0 [ 331.363864][T14558] ? memset+0x1f/0x40 [ 331.367842][T14558] ? fsnotify+0x13a0/0x1460 [ 331.372347][T14558] ? __kernel_write+0x340/0x340 [ 331.377201][T14558] ? fsnotify+0x13a0/0x1460 [ 331.381716][T14558] ? security_file_permission+0x128/0x300 [ 331.387458][T14558] ? __sb_end_write+0xa4/0xf0 [ 331.392140][T14558] ? vfs_write+0x427/0x4f0 [ 331.396555][T14558] ? ksys_write+0x237/0x2a0 [ 331.401051][T14558] ? __ia32_sys_read+0x80/0x80 [ 331.405814][T14558] __x64_sys_sendmmsg+0x9c/0xb0 [ 331.410660][T14558] do_syscall_64+0xcb/0x150 [ 331.415164][T14558] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 331.421084][T14558] RIP: 0033:0x45de59 [ 331.424993][T14558] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.444592][T14558] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 331.453101][T14558] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 331.461069][T14558] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 331.469033][T14558] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 331.476996][T14558] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003c [ 331.485144][T14558] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c [ 331.510682][T14560] overlayfs: failed to resolve './file1': -2 13:14:18 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x12000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:18 executing program 0 (fault-call:6 fault-nth:61): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:18 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x40003c, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 331.669795][T14560] overlayfs: filesystem on './file1' not supported [ 331.676529][T14563] EXT4-fs (loop2): inodes count not valid: 3872 vs 32 [ 331.830325][T14578] overlayfs: filesystem on './file1' not supported [ 331.843054][T14580] FAULT_INJECTION: forcing a failure. [ 331.843054][T14580] name failslab, interval 1, probability 0, space 0, times 0 [ 331.855723][T14580] CPU: 1 PID: 14580 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 331.865872][T14580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.875928][T14580] Call Trace: [ 331.879222][T14580] dump_stack+0x1b0/0x21e [ 331.883554][T14580] ? devkmsg_release+0x11c/0x11c [ 331.888499][T14580] ? show_regs_print_info+0x12/0x12 [ 331.893729][T14580] ? _raw_spin_lock+0xa1/0x170 [ 331.898495][T14580] should_fail+0x6fb/0x860 [ 331.902921][T14580] ? setup_fault_attr+0x2b0/0x2b0 [ 331.907958][T14580] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 331.913337][T14580] ? ___slab_alloc+0x297/0x450 [ 331.918375][T14580] ? skb_clone+0x1b2/0x370 [ 331.922797][T14580] should_failslab+0x5/0x20 [ 331.927393][T14580] kmem_cache_alloc+0x36/0x250 [ 331.932161][T14580] skb_clone+0x1b2/0x370 [ 331.936411][T14580] dev_queue_xmit_nit+0x279/0x9e0 [ 331.941443][T14580] xmit_one+0x7b/0x460 [ 331.945611][T14580] __dev_queue_xmit+0x1858/0x25d0 [ 331.950644][T14580] ? dev_queue_xmit+0x20/0x20 [ 331.955331][T14580] ? ip_finish_output2+0x936/0x1810 [ 331.960541][T14580] ip_finish_output2+0xbdf/0x1810 [ 331.965564][T14580] ? ip_fragment+0x210/0x210 [ 331.970164][T14580] ? __ip_finish_output+0x4e1/0x6d0 [ 331.975366][T14580] ip_output+0x318/0x400 [ 331.979614][T14580] ? ip_finish_output+0x1d0/0x1d0 [ 331.984642][T14580] ? ip_mc_finish_output+0x3a0/0x3a0 [ 331.989932][T14580] ? udp4_hwcsum+0x26b/0x430 [ 331.994529][T14580] ip_send_skb+0xaa/0x140 [ 331.998865][T14580] udp_send_skb+0x8e9/0x1100 [ 332.003556][T14580] udp_sendmsg+0x1d45/0x2e80 [ 332.008167][T14580] ? ip_do_fragment+0x2290/0x2290 [ 332.013228][T14580] ? udp_cmsg_send+0x340/0x340 [ 332.018003][T14580] ? selinux_socket_sendmsg+0x10b/0x320 [ 332.023548][T14580] ? selinux_socket_accept+0x580/0x580 [ 332.029020][T14580] ? rw_copy_check_uvector+0x6b/0x310 [ 332.034405][T14580] ? inet_send_prepare+0x1b7/0x470 [ 332.039525][T14580] ? inet_send_prepare+0x470/0x470 [ 332.044669][T14580] ____sys_sendmsg+0x56f/0x860 [ 332.049438][T14580] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 332.054637][T14580] ? udp_sendmsg+0x75b/0x2e80 [ 332.059324][T14580] ? __sys_sendmmsg+0x46f/0x680 [ 332.064178][T14580] __sys_sendmmsg+0x338/0x680 [ 332.068857][T14580] ? __ia32_sys_sendmsg+0x90/0x90 [ 332.073884][T14580] ? __rcu_read_lock+0x50/0x50 [ 332.078646][T14580] ? __kasan_slab_free+0x1e2/0x220 [ 332.083875][T14580] ? __kasan_slab_free+0x168/0x220 [ 332.089013][T14580] ? slab_free_freelist_hook+0xd0/0x150 [ 332.094565][T14580] ? kmem_cache_free+0xac/0x5c0 [ 332.099420][T14580] ? do_sys_open+0x4a3/0x620 [ 332.104014][T14580] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 332.110092][T14580] ? do_sys_open+0x2fc/0x620 [ 332.114696][T14580] ? proc_fail_nth_write+0x166/0x200 [ 332.119985][T14580] ? proc_fail_nth_read+0x1c0/0x1c0 [ 332.125190][T14580] ? ip4_datagram_release_cb+0x864/0xde0 [ 332.130828][T14580] ? proc_fail_nth_read+0x1c0/0x1c0 [ 332.136034][T14580] ? memset+0x1f/0x40 [ 332.140029][T14580] ? fsnotify+0x13a0/0x1460 [ 332.144548][T14580] ? __kernel_write+0x340/0x340 [ 332.149400][T14580] ? fsnotify+0x13a0/0x1460 [ 332.153949][T14580] ? security_file_permission+0x128/0x300 [ 332.159672][T14580] ? __sb_end_write+0xa4/0xf0 [ 332.164361][T14580] ? vfs_write+0x427/0x4f0 [ 332.168886][T14580] ? ksys_write+0x237/0x2a0 [ 332.173399][T14580] ? __ia32_sys_read+0x80/0x80 [ 332.178164][T14580] __x64_sys_sendmmsg+0x9c/0xb0 [ 332.183711][T14580] do_syscall_64+0xcb/0x150 [ 332.185411][T14578] overlayfs: filesystem on './file1' not supported [ 332.188207][T14580] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 332.188215][T14580] RIP: 0033:0x45de59 [ 332.188230][T14580] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.224056][T14580] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 13:14:19 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400046, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:14:19 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x13000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:19 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) 13:14:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="201000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 332.232484][T14580] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 332.240474][T14580] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 332.248448][T14580] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 332.256557][T14580] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003d [ 332.264815][T14580] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:19 executing program 0 (fault-call:6 fault-nth:62): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 332.458109][T14584] EXT4-fs (loop2): inodes count not valid: 4128 vs 32 [ 332.475801][T14596] FAULT_INJECTION: forcing a failure. [ 332.475801][T14596] name failslab, interval 1, probability 0, space 0, times 0 [ 332.489539][T14596] CPU: 1 PID: 14596 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 332.500052][T14596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.501532][T14594] overlayfs: workdir and upperdir must be separate subtrees [ 332.510430][T14596] Call Trace: [ 332.510454][T14596] dump_stack+0x1b0/0x21e [ 332.510465][T14596] ? devkmsg_release+0x11c/0x11c [ 332.510475][T14596] ? show_regs_print_info+0x12/0x12 [ 332.510484][T14596] should_fail+0x6fb/0x860 [ 332.510493][T14596] ? setup_fault_attr+0x2b0/0x2b0 [ 332.510503][T14596] ? eth_get_headlen+0x240/0x240 [ 332.510513][T14596] ? sock_def_write_space+0x1b9/0x2a0 [ 332.510521][T14596] ? __alloc_skb+0x88/0x4d0 [ 332.510529][T14596] should_failslab+0x5/0x20 [ 332.510537][T14596] kmem_cache_alloc+0x36/0x250 [ 332.510548][T14596] ? netif_rx+0x157/0x2b0 [ 332.510556][T14596] __alloc_skb+0x88/0x4d0 [ 332.510566][T14596] ? dev_queue_xmit_nit+0x946/0x9e0 [ 332.510584][T14596] alloc_skb_with_frags+0xb1/0x580 [ 332.594136][T14596] ? _local_bh_enable+0x30/0x30 [ 332.599855][T14596] sock_alloc_send_pskb+0x87e/0xcc0 [ 332.605105][T14596] ? sock_kzfree_s+0x50/0x50 [ 332.609691][T14596] __ip_append_data+0x1fbd/0x31b0 [ 332.614733][T14596] ? ip_do_fragment+0x2290/0x2290 [ 332.620948][T14596] ? ip_output+0x318/0x400 [ 332.625552][T14596] ? ip_setup_cork+0x810/0x810 [ 332.630304][T14596] ? ipv4_mtu+0x212/0x2c0 [ 332.634625][T14596] ? ip_setup_cork+0x46b/0x810 [ 332.639554][T14596] ip_make_skb+0x1c9/0x4d0 [ 332.643966][T14596] ? ip_do_fragment+0x2290/0x2290 [ 332.649019][T14596] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 332.654647][T14596] ? __sk_dst_check+0x1b0/0x1b0 [ 332.659507][T14596] udp_sendmsg+0x1d1b/0x2e80 [ 332.664098][T14596] ? ip_do_fragment+0x2290/0x2290 [ 332.669116][T14596] ? udp_cmsg_send+0x340/0x340 [ 332.673887][T14596] ? selinux_socket_sendmsg+0x10b/0x320 [ 332.679465][T14596] ? selinux_socket_accept+0x580/0x580 [ 332.684926][T14596] ? rw_copy_check_uvector+0x6b/0x310 [ 332.690776][T14596] ? inet_send_prepare+0x1b7/0x470 [ 332.695889][T14596] ? inet_send_prepare+0x470/0x470 [ 332.700998][T14596] ____sys_sendmsg+0x56f/0x860 [ 332.705764][T14596] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 332.710959][T14596] ? udp_sendmsg+0x75b/0x2e80 [ 332.715637][T14596] ? __sys_sendmmsg+0x46f/0x680 [ 332.720507][T14596] __sys_sendmmsg+0x338/0x680 [ 332.725208][T14596] ? __ia32_sys_sendmsg+0x90/0x90 [ 332.730233][T14596] ? __rcu_read_lock+0x50/0x50 [ 332.734996][T14596] ? __kasan_slab_free+0x1e2/0x220 [ 332.740107][T14596] ? __kasan_slab_free+0x168/0x220 [ 332.745222][T14596] ? slab_free_freelist_hook+0xd0/0x150 [ 332.750767][T14596] ? kmem_cache_free+0xac/0x5c0 [ 332.755622][T14596] ? do_sys_open+0x4a3/0x620 [ 332.760210][T14596] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 332.766413][T14596] ? proc_fail_nth_write+0x166/0x200 [ 332.771709][T14596] ? proc_fail_nth_read+0x1c0/0x1c0 [ 332.777434][T14596] ? is_mmconf_reserved+0x420/0x420 [ 332.782636][T14596] ? ip4_datagram_release_cb+0x864/0xde0 [ 332.788359][T14596] ? proc_fail_nth_read+0x1c0/0x1c0 [ 332.793584][T14596] ? memset+0x1f/0x40 [ 332.797558][T14596] ? fsnotify+0x13a0/0x1460 [ 332.802057][T14596] ? __kernel_write+0x340/0x340 [ 332.806908][T14596] ? fsnotify+0x13a0/0x1460 [ 332.811420][T14596] ? security_file_permission+0x128/0x300 [ 332.817146][T14596] ? __sb_end_write+0xa4/0xf0 [ 332.821828][T14596] ? vfs_write+0x427/0x4f0 [ 332.826249][T14596] ? ksys_write+0x237/0x2a0 [ 332.830755][T14596] ? __ia32_sys_read+0x80/0x80 [ 332.835524][T14596] __x64_sys_sendmmsg+0x9c/0xb0 [ 332.840382][T14596] do_syscall_64+0xcb/0x150 [ 332.844892][T14596] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 332.850787][T14596] RIP: 0033:0x45de59 [ 332.854682][T14596] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.874282][T14596] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 332.882709][T14596] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 332.890687][T14596] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 332.898662][T14596] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 13:14:19 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$HIDIOCSFLAG(r1, 0x4004480f, &(0x7f0000000100)=0x1) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) [ 332.906638][T14596] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003e [ 332.914614][T14596] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:19 executing program 0 (fault-call:6 fault-nth:63): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="201100000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:19 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400048, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 332.961054][T14588] overlayfs: filesystem on './file1' not supported 13:14:19 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x24000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 333.013821][T14610] EXT4-fs (loop2): inodes count not valid: 4384 vs 32 [ 333.043125][T14609] FAULT_INJECTION: forcing a failure. [ 333.043125][T14609] name failslab, interval 1, probability 0, space 0, times 0 [ 333.056220][T14609] CPU: 0 PID: 14609 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 333.066372][T14609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.076429][T14609] Call Trace: [ 333.079730][T14609] dump_stack+0x1b0/0x21e [ 333.084063][T14609] ? devkmsg_release+0x11c/0x11c [ 333.089008][T14609] ? show_regs_print_info+0x12/0x12 [ 333.094209][T14609] ? _raw_spin_lock+0xa1/0x170 [ 333.098979][T14609] ? _raw_spin_trylock_bh+0x190/0x190 [ 333.104363][T14609] should_fail+0x6fb/0x860 [ 333.108791][T14609] ? setup_fault_attr+0x2b0/0x2b0 [ 333.113817][T14609] ? _raw_spin_unlock+0x5/0x20 [ 333.118583][T14609] ? ___slab_alloc+0x297/0x450 [ 333.123352][T14609] ? alloc_skb_with_frags+0xb1/0x580 [ 333.128642][T14609] should_failslab+0x5/0x20 [ 333.131919][T14615] overlayfs: failed to resolve './file1': -2 [ 333.133146][T14609] __kmalloc_track_caller+0x5d/0x2b0 [ 333.133156][T14609] ? kmem_cache_alloc+0x1d5/0x250 [ 333.133176][T14609] ? alloc_skb_with_frags+0xb1/0x580 [ 333.154694][T14609] __alloc_skb+0xd1/0x4d0 [ 333.159048][T14609] alloc_skb_with_frags+0xb1/0x580 [ 333.164158][T14609] ? _local_bh_enable+0x30/0x30 [ 333.169009][T14609] sock_alloc_send_pskb+0x87e/0xcc0 [ 333.174251][T14609] ? sock_kzfree_s+0x50/0x50 [ 333.178847][T14609] __ip_append_data+0x1fbd/0x31b0 [ 333.183880][T14609] ? ip_do_fragment+0x2290/0x2290 [ 333.189036][T14609] ? ip_output+0x318/0x400 [ 333.193461][T14609] ? ip_setup_cork+0x810/0x810 [ 333.198577][T14609] ? ipv4_mtu+0x212/0x2c0 [ 333.202911][T14609] ? ip_setup_cork+0x46b/0x810 [ 333.207677][T14609] ip_make_skb+0x1c9/0x4d0 [ 333.212100][T14609] ? ip_do_fragment+0x2290/0x2290 [ 333.217127][T14609] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 333.222771][T14609] ? __sk_dst_check+0x1b0/0x1b0 [ 333.227626][T14609] udp_sendmsg+0x1d1b/0x2e80 [ 333.232316][T14609] ? ip_do_fragment+0x2290/0x2290 [ 333.237348][T14609] ? udp_cmsg_send+0x340/0x340 [ 333.242131][T14609] ? selinux_socket_sendmsg+0x10b/0x320 [ 333.247719][T14609] ? selinux_socket_accept+0x580/0x580 [ 333.253221][T14609] ? rw_copy_check_uvector+0x6b/0x310 [ 333.258715][T14609] ? inet_send_prepare+0x1b7/0x470 [ 333.263834][T14609] ? inet_send_prepare+0x470/0x470 [ 333.269107][T14609] ____sys_sendmsg+0x56f/0x860 [ 333.273890][T14609] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 333.279144][T14609] ? udp_sendmsg+0x75b/0x2e80 [ 333.283919][T14609] ? __sys_sendmmsg+0x46f/0x680 [ 333.288776][T14609] __sys_sendmmsg+0x338/0x680 [ 333.293464][T14609] ? __ia32_sys_sendmsg+0x90/0x90 [ 333.298507][T14609] ? __rcu_read_lock+0x50/0x50 [ 333.303275][T14609] ? __kasan_slab_free+0x1e2/0x220 [ 333.308383][T14609] ? __kasan_slab_free+0x168/0x220 [ 333.313493][T14609] ? slab_free_freelist_hook+0xd0/0x150 [ 333.319039][T14609] ? kmem_cache_free+0xac/0x5c0 [ 333.323893][T14609] ? do_sys_open+0x4a3/0x620 [ 333.328484][T14609] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 333.334553][T14609] ? do_sys_open+0x2fc/0x620 [ 333.339167][T14609] ? proc_fail_nth_write+0x166/0x200 [ 333.344453][T14609] ? proc_fail_nth_read+0x1c0/0x1c0 [ 333.349655][T14609] ? ip4_datagram_release_cb+0x864/0xde0 [ 333.355299][T14609] ? proc_fail_nth_read+0x1c0/0x1c0 [ 333.360504][T14609] ? memset+0x1f/0x40 [ 333.364483][T14609] ? fsnotify+0x13a0/0x1460 [ 333.368988][T14609] ? __kernel_write+0x340/0x340 [ 333.373853][T14609] ? fsnotify+0x13a0/0x1460 [ 333.378361][T14609] ? security_file_permission+0x128/0x300 [ 333.384084][T14609] ? __sb_end_write+0xa4/0xf0 [ 333.388782][T14609] ? vfs_write+0x427/0x4f0 [ 333.393193][T14609] ? ksys_write+0x237/0x2a0 [ 333.397690][T14609] ? __ia32_sys_read+0x80/0x80 [ 333.402462][T14609] __x64_sys_sendmmsg+0x9c/0xb0 [ 333.407327][T14609] do_syscall_64+0xcb/0x150 [ 333.411855][T14609] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 333.417749][T14609] RIP: 0033:0x45de59 [ 333.421651][T14609] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.441248][T14609] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 333.449657][T14609] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 333.457626][T14609] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 333.465601][T14609] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 333.473840][T14609] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003f [ 333.481802][T14609] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="201200000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:20 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) getsockopt$inet_mreqsrc(r3, 0x0, 0xd, &(0x7f0000000100)={@multicast1, @multicast2, @loopback}, &(0x7f0000000140)=0xc) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) getpeername$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x1c) [ 333.615561][T14622] EXT4-fs (loop2): inodes count not valid: 4640 vs 32 13:14:20 executing program 0 (fault-call:6 fault-nth:64): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="202200000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 333.726280][T14615] overlayfs: filesystem on './file1' not supported [ 333.770855][T14633] FAULT_INJECTION: forcing a failure. [ 333.770855][T14633] name failslab, interval 1, probability 0, space 0, times 0 [ 333.783614][T14633] CPU: 1 PID: 14633 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 333.793756][T14633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.803813][T14633] Call Trace: [ 333.807119][T14633] dump_stack+0x1b0/0x21e [ 333.811459][T14633] ? devkmsg_release+0x11c/0x11c [ 333.816421][T14633] ? show_regs_print_info+0x12/0x12 [ 333.821624][T14633] ? __copy_skb_header+0x429/0x560 [ 333.826748][T14633] should_fail+0x6fb/0x860 [ 333.831171][T14633] ? setup_fault_attr+0x2b0/0x2b0 [ 333.836194][T14633] ? eth_type_trans+0x2a3/0x680 [ 333.841051][T14633] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 333.846429][T14633] ? skb_clone+0x1b2/0x370 [ 333.850848][T14633] should_failslab+0x5/0x20 [ 333.855365][T14633] kmem_cache_alloc+0x36/0x250 [ 333.860137][T14633] skb_clone+0x1b2/0x370 [ 333.864385][T14633] dev_queue_xmit_nit+0x279/0x9e0 [ 333.869438][T14633] xmit_one+0x7b/0x460 [ 333.873513][T14633] __dev_queue_xmit+0x1858/0x25d0 [ 333.878578][T14633] ? dev_queue_xmit+0x20/0x20 [ 333.883265][T14633] ? ip_finish_output2+0x936/0x1810 [ 333.888466][T14633] ip_finish_output2+0xbdf/0x1810 [ 333.893499][T14633] ? ip_fragment+0x210/0x210 [ 333.898110][T14633] ? __ip_finish_output+0x4e1/0x6d0 [ 333.903317][T14633] ip_output+0x318/0x400 [ 333.907574][T14633] ? ip_finish_output+0x1d0/0x1d0 [ 333.912606][T14633] ? ip_mc_finish_output+0x3a0/0x3a0 [ 333.917898][T14633] ? udp4_hwcsum+0x26b/0x430 [ 333.922491][T14633] ip_send_skb+0xaa/0x140 [ 333.926833][T14633] udp_send_skb+0x8e9/0x1100 [ 333.931465][T14633] udp_sendmsg+0x1d45/0x2e80 [ 333.936066][T14633] ? ip_do_fragment+0x2290/0x2290 [ 333.941094][T14633] ? udp_cmsg_send+0x340/0x340 [ 333.945866][T14633] ? selinux_socket_sendmsg+0x10b/0x320 [ 333.951424][T14633] ? selinux_socket_accept+0x580/0x580 [ 333.956978][T14633] ? rw_copy_check_uvector+0x6b/0x310 [ 333.962469][T14633] ? inet_send_prepare+0x1b7/0x470 [ 333.967590][T14633] ? inet_send_prepare+0x470/0x470 [ 333.972710][T14633] ____sys_sendmsg+0x56f/0x860 [ 333.977518][T14633] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 333.982773][T14633] ? udp_sendmsg+0x75b/0x2e80 [ 333.988015][T14633] ? __sys_sendmmsg+0x46f/0x680 [ 333.992891][T14633] __sys_sendmmsg+0x338/0x680 [ 333.997571][T14633] ? __ia32_sys_sendmsg+0x90/0x90 [ 334.002605][T14633] ? __rcu_read_lock+0x50/0x50 [ 334.007379][T14633] ? __kasan_slab_free+0x1e2/0x220 [ 334.012516][T14633] ? __kasan_slab_free+0x168/0x220 [ 334.017645][T14633] ? slab_free_freelist_hook+0xd0/0x150 [ 334.023203][T14633] ? kmem_cache_free+0xac/0x5c0 [ 334.028376][T14633] ? do_sys_open+0x4a3/0x620 [ 334.032968][T14633] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 334.039040][T14633] ? do_sys_open+0x2fc/0x620 [ 334.043749][T14633] ? proc_fail_nth_write+0x166/0x200 [ 334.049034][T14633] ? proc_fail_nth_read+0x1c0/0x1c0 [ 334.054330][T14633] ? ip4_datagram_release_cb+0x864/0xde0 [ 334.059967][T14633] ? proc_fail_nth_read+0x1c0/0x1c0 [ 334.065611][T14633] ? memset+0x1f/0x40 [ 334.069695][T14633] ? fsnotify+0x13a0/0x1460 [ 334.074202][T14633] ? __kernel_write+0x340/0x340 [ 334.079059][T14633] ? fsnotify+0x13a0/0x1460 [ 334.083571][T14633] ? security_file_permission+0x128/0x300 [ 334.089304][T14633] ? __sb_end_write+0xa4/0xf0 [ 334.094017][T14633] ? vfs_write+0x427/0x4f0 [ 334.098439][T14633] ? ksys_write+0x237/0x2a0 [ 334.102944][T14633] ? __ia32_sys_read+0x80/0x80 [ 334.107719][T14633] __x64_sys_sendmmsg+0x9c/0xb0 [ 334.112595][T14633] do_syscall_64+0xcb/0x150 [ 334.117101][T14633] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 334.122986][T14633] RIP: 0033:0x45de59 [ 334.126877][T14633] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.149698][T14633] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 334.158113][T14633] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 13:14:20 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000200)=0xc) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) setsockopt(r2, 0x20, 0x0, &(0x7f0000000100)="36d9d7aee5d751fcb92dd564a7b72e6255d82bab3515326e", 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 13:14:20 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x40004c, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 334.166088][T14633] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 334.174064][T14633] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 334.182070][T14633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000040 [ 334.190042][T14633] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:21 executing program 0 (fault-call:6 fault-nth:65): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 334.341591][T14643] FAULT_INJECTION: forcing a failure. [ 334.341591][T14643] name failslab, interval 1, probability 0, space 0, times 0 [ 334.356675][T14635] EXT4-fs (loop2): inodes count not valid: 8736 vs 32 [ 334.362456][T14643] CPU: 0 PID: 14643 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 334.373686][T14643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.383782][T14643] Call Trace: [ 334.387087][T14643] dump_stack+0x1b0/0x21e [ 334.391432][T14643] ? devkmsg_release+0x11c/0x11c [ 334.396383][T14643] ? show_regs_print_info+0x12/0x12 [ 334.401609][T14643] ? get_random_u32+0x112/0x210 [ 334.406486][T14643] ? kasan_init_slab_obj+0x20/0x30 [ 334.411630][T14643] should_fail+0x6fb/0x860 [ 334.416060][T14643] ? setup_fault_attr+0x2b0/0x2b0 [ 334.421092][T14643] ? ___slab_alloc+0x2e0/0x450 [ 334.425869][T14643] ? switch_mm_irqs_off+0x46e/0x870 [ 334.431081][T14643] ? alloc_skb_with_frags+0xb1/0x580 [ 334.436379][T14643] should_failslab+0x5/0x20 [ 334.441171][T14643] __kmalloc_track_caller+0x5d/0x2b0 [ 334.446495][T14643] ? kmem_cache_alloc+0x1d5/0x250 [ 334.447766][T14646] overlayfs: failed to resolve './file1': -2 [ 334.451528][T14643] ? alloc_skb_with_frags+0xb1/0x580 [ 334.451537][T14643] __alloc_skb+0xd1/0x4d0 [ 334.451554][T14643] alloc_skb_with_frags+0xb1/0x580 [ 334.472395][T14643] sock_alloc_send_pskb+0x87e/0xcc0 [ 334.477931][T14643] ? sock_kzfree_s+0x50/0x50 [ 334.482539][T14643] ? ___preempt_schedule+0x16/0x20 [ 334.487918][T14643] ? __kfree_skb_flush+0x48/0xc0 [ 334.492864][T14643] ? __local_bh_enable_ip+0xb1/0x170 [ 334.498215][T14643] __ip_append_data+0x1fbd/0x31b0 [ 334.503261][T14643] ? ip_do_fragment+0x2290/0x2290 [ 334.508316][T14643] ? ip_output+0x318/0x400 [ 334.512740][T14643] ? ip_setup_cork+0x810/0x810 [ 334.517542][T14643] ? ipv4_mtu+0x212/0x2c0 [ 334.521879][T14643] ? ip_setup_cork+0x46b/0x810 [ 334.526738][T14643] ip_make_skb+0x1c9/0x4d0 [ 334.531165][T14643] ? ip_do_fragment+0x2290/0x2290 [ 334.536202][T14643] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 334.541846][T14643] ? __sk_dst_check+0x1b0/0x1b0 [ 334.546704][T14643] udp_sendmsg+0x1d1b/0x2e80 [ 334.551312][T14643] ? ip_do_fragment+0x2290/0x2290 [ 334.556343][T14643] ? udp_cmsg_send+0x340/0x340 [ 334.561116][T14643] ? selinux_socket_sendmsg+0x10b/0x320 [ 334.566668][T14643] ? selinux_socket_accept+0x580/0x580 [ 334.572134][T14643] ? rw_copy_check_uvector+0x6b/0x310 [ 334.577542][T14643] ? inet_send_prepare+0x1b7/0x470 [ 334.582660][T14643] ? inet_send_prepare+0x470/0x470 [ 334.587781][T14643] ____sys_sendmsg+0x56f/0x860 [ 334.592556][T14643] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 334.597865][T14643] ? udp_sendmsg+0x75b/0x2e80 [ 334.602835][T14643] ? __sys_sendmmsg+0x46f/0x680 [ 334.607699][T14643] __sys_sendmmsg+0x338/0x680 [ 334.612390][T14643] ? __ia32_sys_sendmsg+0x90/0x90 [ 334.617439][T14643] ? __rcu_read_lock+0x50/0x50 [ 334.622216][T14643] ? __kasan_slab_free+0x1e2/0x220 [ 334.627321][T14643] ? __kasan_slab_free+0x168/0x220 [ 334.632432][T14643] ? slab_free_freelist_hook+0xd0/0x150 [ 334.638251][T14643] ? kmem_cache_free+0xac/0x5c0 [ 334.643108][T14643] ? do_sys_open+0x4a3/0x620 [ 334.647698][T14643] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 334.653760][T14643] ? do_sys_open+0x2fc/0x620 [ 334.658367][T14643] ? proc_fail_nth_write+0x166/0x200 [ 334.663699][T14643] ? proc_fail_nth_read+0x1c0/0x1c0 [ 334.668941][T14643] ? ip4_datagram_release_cb+0x864/0xde0 [ 334.674571][T14643] ? proc_fail_nth_read+0x1c0/0x1c0 [ 334.679786][T14643] ? memset+0x1f/0x40 [ 334.683766][T14643] ? fsnotify+0x13a0/0x1460 [ 334.688290][T14643] ? __kernel_write+0x340/0x340 [ 334.693151][T14643] ? fsnotify+0x13a0/0x1460 [ 334.697673][T14643] ? security_file_permission+0x128/0x300 [ 334.703395][T14643] ? __sb_end_write+0xa4/0xf0 [ 334.708098][T14643] ? vfs_write+0x427/0x4f0 [ 334.712528][T14643] ? ksys_write+0x237/0x2a0 [ 334.717030][T14643] ? __ia32_sys_read+0x80/0x80 [ 334.721785][T14643] __x64_sys_sendmmsg+0x9c/0xb0 [ 334.726636][T14643] do_syscall_64+0xcb/0x150 [ 334.731240][T14643] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 334.737138][T14643] RIP: 0033:0x45de59 [ 334.741046][T14643] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.760642][T14643] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 334.769058][T14643] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 334.777026][T14643] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 334.784991][T14643] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 13:14:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="202500000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:21 executing program 0 (fault-call:6 fault-nth:66): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 334.792955][T14643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000041 [ 334.800918][T14643] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:21 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tee(r3, r1, 0x3, 0x6) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r5 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r5, 0x82307201, &(0x7f00000001c0)) 13:14:21 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x3f000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:21 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x40005c, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 334.896117][T14644] overlayfs: filesystem on './file1' not supported [ 334.924993][T14651] EXT4-fs (loop2): inodes count not valid: 9504 vs 32 [ 334.944849][T14657] FAULT_INJECTION: forcing a failure. [ 334.944849][T14657] name failslab, interval 1, probability 0, space 0, times 0 [ 334.958047][T14657] CPU: 0 PID: 14657 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 334.968311][T14657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.978371][T14657] Call Trace: [ 334.981701][T14657] dump_stack+0x1b0/0x21e [ 334.986039][T14657] ? devkmsg_release+0x11c/0x11c [ 334.990985][T14657] ? show_regs_print_info+0x12/0x12 [ 334.996190][T14657] should_fail+0x6fb/0x860 [ 335.000641][T14657] ? setup_fault_attr+0x2b0/0x2b0 [ 335.005669][T14657] ? ___slab_alloc+0x9b/0x450 [ 335.010354][T14657] ? eth_get_headlen+0x240/0x240 [ 335.015297][T14657] ? sock_def_write_space+0x1b9/0x2a0 [ 335.020678][T14657] ? alloc_skb_with_frags+0xb1/0x580 [ 335.025972][T14657] should_failslab+0x5/0x20 [ 335.030487][T14657] __kmalloc_track_caller+0x5d/0x2b0 [ 335.035782][T14657] ? kmem_cache_alloc+0x1d5/0x250 [ 335.040820][T14657] ? alloc_skb_with_frags+0xb1/0x580 [ 335.046113][T14657] __alloc_skb+0xd1/0x4d0 [ 335.050453][T14657] alloc_skb_with_frags+0xb1/0x580 [ 335.055586][T14657] ? _local_bh_enable+0x30/0x30 [ 335.060447][T14657] sock_alloc_send_pskb+0x87e/0xcc0 [ 335.065656][T14657] ? sock_kzfree_s+0x50/0x50 [ 335.070260][T14657] __ip_append_data+0x1fbd/0x31b0 [ 335.075302][T14657] ? ip_do_fragment+0x2290/0x2290 [ 335.080334][T14657] ? ip_output+0x318/0x400 [ 335.084757][T14657] ? ip_setup_cork+0x810/0x810 [ 335.092132][T14657] ? ipv4_mtu+0x212/0x2c0 [ 335.096471][T14657] ? ip_setup_cork+0x46b/0x810 [ 335.101241][T14657] ip_make_skb+0x1c9/0x4d0 [ 335.105667][T14657] ? ip_do_fragment+0x2290/0x2290 [ 335.110703][T14657] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 335.116342][T14657] ? __sk_dst_check+0x1b0/0x1b0 [ 335.121200][T14657] udp_sendmsg+0x1d1b/0x2e80 [ 335.125803][T14657] ? ip_do_fragment+0x2290/0x2290 [ 335.130833][T14657] ? udp_cmsg_send+0x340/0x340 [ 335.135608][T14657] ? selinux_socket_sendmsg+0x10b/0x320 [ 335.141165][T14657] ? selinux_socket_accept+0x580/0x580 [ 335.146660][T14657] ? rw_copy_check_uvector+0x6b/0x310 [ 335.152046][T14657] ? inet_send_prepare+0x1b7/0x470 [ 335.157166][T14657] ? inet_send_prepare+0x470/0x470 [ 335.162289][T14657] ____sys_sendmsg+0x56f/0x860 [ 335.167066][T14657] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 335.172293][T14657] ? udp_sendmsg+0x75b/0x2e80 [ 335.176978][T14657] ? __sys_sendmmsg+0x46f/0x680 [ 335.181841][T14657] __sys_sendmmsg+0x338/0x680 [ 335.186528][T14657] ? __ia32_sys_sendmsg+0x90/0x90 [ 335.191609][T14657] ? __rcu_read_lock+0x50/0x50 [ 335.196386][T14657] ? __kasan_slab_free+0x1e2/0x220 [ 335.201505][T14657] ? __kasan_slab_free+0x168/0x220 [ 335.206625][T14657] ? slab_free_freelist_hook+0xd0/0x150 [ 335.212182][T14657] ? kmem_cache_free+0xac/0x5c0 [ 335.217044][T14657] ? do_sys_open+0x4a3/0x620 [ 335.221640][T14657] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 335.227709][T14657] ? do_sys_open+0x2fc/0x620 [ 335.232304][T14657] ? proc_fail_nth_write+0x166/0x200 [ 335.237601][T14657] ? proc_fail_nth_read+0x1c0/0x1c0 [ 335.242812][T14657] ? ip4_datagram_release_cb+0x864/0xde0 [ 335.248446][T14657] ? proc_fail_nth_read+0x1c0/0x1c0 [ 335.253776][T14657] ? memset+0x1f/0x40 [ 335.257896][T14657] ? fsnotify+0x13a0/0x1460 [ 335.263394][T14657] ? __kernel_write+0x340/0x340 [ 335.268365][T14657] ? fsnotify+0x13a0/0x1460 [ 335.272889][T14657] ? security_file_permission+0x128/0x300 [ 335.278605][T14657] ? __sb_end_write+0xa4/0xf0 [ 335.283286][T14657] ? vfs_write+0x427/0x4f0 [ 335.287710][T14657] ? ksys_write+0x237/0x2a0 [ 335.292222][T14657] ? __ia32_sys_read+0x80/0x80 [ 335.297031][T14657] __x64_sys_sendmmsg+0x9c/0xb0 [ 335.301913][T14657] do_syscall_64+0xcb/0x150 [ 335.306417][T14657] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 335.312305][T14657] RIP: 0033:0x45de59 [ 335.316196][T14657] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 335.335792][T14657] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 335.344195][T14657] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 335.352159][T14657] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 335.360297][T14657] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 335.368265][T14657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000042 [ 335.376229][T14657] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESHEX=r0, @ANYRESDEC, @ANYBLOB="a2740a5f5a48ed1d677d3663869deb147755c7401ffbb7a044b3bb75823589efdc3bddd289085c8ff048986f4bf456c8c5147a3d861c1efbe042ed47cdc4e44db45e919fb6cc45b2a020a91495c32db7085ec4cadd047f8f51262c7d1ac918f2870e91168b97bb8e84bcdd33c36e7375a023b544"]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r3, 0x82307201, &(0x7f00000001c0)) 13:14:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="202e00000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 335.555639][T14669] FAT-fs (loop5): Unrecognized mount option "ÿÿÿÿ0x000000000000000318446744073709551615¢t [ 335.555639][T14669] _ZHíg}6c†ëwUÇ@û· D³»u‚5‰ïÜ;ÝÒ‰\ðH˜oKôVÈÅz=†ûàBíGÍÄäM´^‘Ÿ¶ÌE²  ©•Ã-·^ÄÊÝQ&" or missing value [ 335.558875][T14664] overlayfs: filesystem on './file1' not supported 13:14:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="204800000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 335.600832][T14668] EXT4-fs (loop2): inodes count not valid: 11808 vs 32 13:14:22 executing program 0 (fault-call:6 fault-nth:67): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:22 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400060, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:14:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="204c00000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 335.744610][T14664] overlayfs: filesystem on './file1' not supported [ 335.772864][T14676] EXT4-fs (loop2): inodes count not valid: 18464 vs 32 [ 335.802381][T14681] FAULT_INJECTION: forcing a failure. [ 335.802381][T14681] name failslab, interval 1, probability 0, space 0, times 0 [ 335.815040][T14681] CPU: 0 PID: 14681 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 335.825223][T14681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.835282][T14681] Call Trace: [ 335.838574][T14681] dump_stack+0x1b0/0x21e [ 335.842905][T14681] ? devkmsg_release+0x11c/0x11c [ 335.847872][T14681] ? show_regs_print_info+0x12/0x12 [ 335.853075][T14681] ? __copy_skb_header+0x429/0x560 [ 335.858194][T14681] should_fail+0x6fb/0x860 [ 335.862607][T14681] ? setup_fault_attr+0x2b0/0x2b0 [ 335.867632][T14681] ? skb_crc32c_csum_help+0x7c0/0x7c0 [ 335.872999][T14681] ? update_load_avg+0x410/0x8f0 [ 335.877932][T14681] ? skb_clone+0x1b2/0x370 [ 335.882356][T14681] should_failslab+0x5/0x20 [ 335.886859][T14681] kmem_cache_alloc+0x36/0x250 [ 335.891619][T14681] skb_clone+0x1b2/0x370 [ 335.895885][T14681] dev_queue_xmit_nit+0x279/0x9e0 [ 335.900962][T14681] xmit_one+0x7b/0x460 [ 335.905036][T14681] __dev_queue_xmit+0x1858/0x25d0 [ 335.910153][T14681] ? dev_queue_xmit+0x20/0x20 [ 335.914834][T14681] ? ip_finish_output2+0x936/0x1810 [ 335.920034][T14681] ip_finish_output2+0xbdf/0x1810 [ 335.925067][T14681] ? ip_fragment+0x210/0x210 [ 335.929654][T14681] ? __ip_finish_output+0x4e1/0x6d0 [ 335.934849][T14681] ip_output+0x318/0x400 [ 335.939088][T14681] ? ip_finish_output+0x1d0/0x1d0 [ 335.944107][T14681] ? ip_mc_finish_output+0x3a0/0x3a0 [ 335.949389][T14681] ? udp4_hwcsum+0x26b/0x430 [ 335.953978][T14681] ip_send_skb+0xaa/0x140 [ 335.958392][T14681] udp_send_skb+0x8e9/0x1100 [ 335.962981][T14681] udp_sendmsg+0x1d45/0x2e80 [ 335.967579][T14681] ? ip_do_fragment+0x2290/0x2290 [ 335.972616][T14681] ? udp_cmsg_send+0x340/0x340 [ 335.977381][T14681] ? selinux_socket_sendmsg+0x10b/0x320 [ 335.982935][T14681] ? selinux_socket_accept+0x580/0x580 [ 335.988395][T14681] ? rw_copy_check_uvector+0x6b/0x310 [ 335.993771][T14681] ? inet_send_prepare+0x1b7/0x470 [ 335.998908][T14681] ? inet_send_prepare+0x470/0x470 [ 336.004027][T14681] ____sys_sendmsg+0x56f/0x860 [ 336.008799][T14681] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 336.013996][T14681] ? udp_sendmsg+0x75b/0x2e80 [ 336.018679][T14681] ? __sys_sendmmsg+0x46f/0x680 [ 336.023622][T14681] __sys_sendmmsg+0x338/0x680 [ 336.028301][T14681] ? __ia32_sys_sendmsg+0x90/0x90 [ 336.033323][T14681] ? __rcu_read_lock+0x50/0x50 [ 336.038083][T14681] ? __kasan_slab_free+0x1e2/0x220 [ 336.043206][T14681] ? __kasan_slab_free+0x168/0x220 [ 336.048326][T14681] ? slab_free_freelist_hook+0xd0/0x150 [ 336.053869][T14681] ? kmem_cache_free+0xac/0x5c0 [ 336.058717][T14681] ? do_sys_open+0x4a3/0x620 [ 336.063308][T14681] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 336.069372][T14681] ? do_sys_open+0x2fc/0x620 [ 336.073966][T14681] ? proc_fail_nth_write+0x166/0x200 [ 336.079257][T14681] ? proc_fail_nth_read+0x1c0/0x1c0 [ 336.084454][T14681] ? proc_fail_nth_read+0x1c0/0x1c0 [ 336.089649][T14681] ? memset+0x1f/0x40 [ 336.093639][T14681] ? fsnotify+0x13a0/0x1460 [ 336.098148][T14681] ? __kernel_write+0x340/0x340 [ 336.102991][T14681] ? fsnotify+0x13a0/0x1460 [ 336.107496][T14681] ? security_file_permission+0x128/0x300 [ 336.113215][T14681] ? __sb_end_write+0xa4/0xf0 [ 336.117927][T14681] ? vfs_write+0x427/0x4f0 [ 336.122367][T14681] ? ksys_write+0x237/0x2a0 [ 336.126869][T14681] ? __ia32_sys_read+0x80/0x80 [ 336.131632][T14681] __x64_sys_sendmmsg+0x9c/0xb0 [ 336.136485][T14681] do_syscall_64+0xcb/0x150 [ 336.140987][T14681] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 336.146874][T14681] RIP: 0033:0x45de59 [ 336.150763][T14681] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.170386][T14681] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 336.178827][T14681] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 336.186816][T14681] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 336.194793][T14681] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 13:14:23 executing program 5: syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x8, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x5c600, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snd/timer\x00', 0x200000) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000400)={{r2}, {@val, @actul_num={@void, 0x18000000000000, 0x54}}}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_EXTERNAL_AUTH(r3, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="200010e18191bd2c7a7f000000", @ANYRES16=r4, @ANYBLOB="200027bd7000fedbdf257f0000000c009900020000001c000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x80) r5 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r5, 0x82307201, &(0x7f00000001c0)) 13:14:23 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x40000000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 336.202765][T14681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000043 [ 336.210734][T14681] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:23 executing program 0 (fault-call:6 fault-nth:68): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 336.324576][T14692] EXT4-fs (loop2): inodes count not valid: 19488 vs 32 [ 336.348214][T14695] FAT-fs (loop5): bogus number of reserved sectors [ 336.359673][T14700] FAULT_INJECTION: forcing a failure. [ 336.359673][T14700] name failslab, interval 1, probability 0, space 0, times 0 13:14:23 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x40000800, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 336.368912][T14695] FAT-fs (loop5): Can't find a valid FAT filesystem [ 336.381993][T14700] CPU: 1 PID: 14700 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 336.392155][T14700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.402205][T14700] Call Trace: [ 336.405493][T14700] dump_stack+0x1b0/0x21e [ 336.409811][T14700] ? devkmsg_release+0x11c/0x11c [ 336.414742][T14700] ? show_regs_print_info+0x12/0x12 [ 336.419938][T14700] should_fail+0x6fb/0x860 [ 336.425301][T14700] ? setup_fault_attr+0x2b0/0x2b0 [ 336.430323][T14700] ? eth_get_headlen+0x240/0x240 [ 336.435245][T14700] ? sock_def_write_space+0x1b9/0x2a0 [ 336.440615][T14700] ? __alloc_skb+0x88/0x4d0 [ 336.445107][T14700] should_failslab+0x5/0x20 [ 336.449598][T14700] kmem_cache_alloc+0x36/0x250 [ 336.454368][T14700] ? netif_rx+0x157/0x2b0 [ 336.458685][T14700] __alloc_skb+0x88/0x4d0 [ 336.463001][T14700] ? dev_queue_xmit_nit+0x946/0x9e0 [ 336.468191][T14700] alloc_skb_with_frags+0xb1/0x580 [ 336.473318][T14700] ? _local_bh_enable+0x30/0x30 [ 336.478172][T14700] sock_alloc_send_pskb+0x87e/0xcc0 [ 336.483366][T14700] ? sock_kzfree_s+0x50/0x50 [ 336.487949][T14700] __ip_append_data+0x1fbd/0x31b0 [ 336.492964][T14700] ? ip_do_fragment+0x2290/0x2290 [ 336.497977][T14700] ? ip_output+0x318/0x400 [ 336.502382][T14700] ? ip_setup_cork+0x810/0x810 [ 336.507131][T14700] ? ipv4_mtu+0x212/0x2c0 [ 336.511449][T14700] ? ip_setup_cork+0x46b/0x810 [ 336.516207][T14700] ip_make_skb+0x1c9/0x4d0 [ 336.520639][T14700] ? ip_do_fragment+0x2290/0x2290 [ 336.525655][T14700] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 336.531364][T14700] ? __sk_dst_check+0x1b0/0x1b0 [ 336.536203][T14700] udp_sendmsg+0x1d1b/0x2e80 [ 336.540790][T14700] ? ip_do_fragment+0x2290/0x2290 [ 336.545802][T14700] ? udp_cmsg_send+0x340/0x340 [ 336.550572][T14700] ? selinux_socket_sendmsg+0x10b/0x320 [ 336.556109][T14700] ? selinux_socket_accept+0x580/0x580 [ 336.561625][T14700] ? rw_copy_check_uvector+0x6b/0x310 [ 336.566990][T14700] ? inet_send_prepare+0x1b7/0x470 [ 336.572092][T14700] ? inet_send_prepare+0x470/0x470 [ 336.577191][T14700] ____sys_sendmsg+0x56f/0x860 [ 336.581946][T14700] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 336.587134][T14700] ? udp_sendmsg+0x75b/0x2e80 [ 336.591801][T14700] ? __sys_sendmmsg+0x46f/0x680 [ 336.596645][T14700] __sys_sendmmsg+0x338/0x680 [ 336.601354][T14700] ? __ia32_sys_sendmsg+0x90/0x90 [ 336.606376][T14700] ? __rcu_read_lock+0x50/0x50 [ 336.611133][T14700] ? __kasan_slab_free+0x1e2/0x220 [ 336.616270][T14700] ? __kasan_slab_free+0x168/0x220 [ 336.621638][T14700] ? slab_free_freelist_hook+0xd0/0x150 [ 336.627176][T14700] ? kmem_cache_free+0xac/0x5c0 [ 336.632093][T14700] ? do_sys_open+0x4a3/0x620 [ 336.636693][T14700] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 336.642747][T14700] ? do_sys_open+0x2fc/0x620 [ 336.647325][T14700] ? proc_fail_nth_write+0x166/0x200 [ 336.655556][T14700] ? proc_fail_nth_read+0x1c0/0x1c0 [ 336.660746][T14700] ? ip4_datagram_release_cb+0x864/0xde0 [ 336.666378][T14700] ? proc_fail_nth_read+0x1c0/0x1c0 [ 336.671560][T14700] ? memset+0x1f/0x40 [ 336.675524][T14700] ? fsnotify+0x13a0/0x1460 [ 336.680046][T14700] ? __kernel_write+0x340/0x340 [ 336.684888][T14700] ? fsnotify+0x13a0/0x1460 [ 336.689382][T14700] ? security_file_permission+0x128/0x300 [ 336.695088][T14700] ? __sb_end_write+0xa4/0xf0 [ 336.699757][T14700] ? vfs_write+0x427/0x4f0 [ 336.704157][T14700] ? ksys_write+0x237/0x2a0 [ 336.708640][T14700] ? __ia32_sys_read+0x80/0x80 [ 336.713387][T14700] __x64_sys_sendmmsg+0x9c/0xb0 [ 336.718225][T14700] do_syscall_64+0xcb/0x150 [ 336.722985][T14700] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 336.728875][T14700] RIP: 0033:0x45de59 [ 336.732755][T14700] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.752464][T14700] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 336.760887][T14700] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 336.768851][T14700] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 336.776812][T14700] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 336.784780][T14700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000044 [ 336.792765][T14700] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:23 executing program 0 (fault-call:6 fault-nth:69): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 336.817428][T14702] overlayfs: filesystem on './file1' not supported 13:14:23 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000940)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000b00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000240)={0x158, r3, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}]}, @TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x4a, 0x4, {'gcm(aes)\x00', 0x22, "eaf732e9902d98bd41bcfb99878ef87c597446c63606c164b1576e9a88eabcca2877"}}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_LINK={0x38, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf28}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x40807}, 0x4000) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r6, 0x10f, 0x7f, &(0x7f0000000140), &(0x7f0000000200)=0x4) chdir(&(0x7f0000000000)='./file1\x00') open(&(0x7f0000000100)='./file1\x00', 0x80, 0x220) r7 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r7, 0x82307201, &(0x7f00000001c0)) 13:14:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="206000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:23 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400068, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 336.922312][T14689] overlayfs: filesystem on './file1' not supported [ 336.961505][T14709] FAULT_INJECTION: forcing a failure. [ 336.961505][T14709] name failslab, interval 1, probability 0, space 0, times 0 [ 336.974345][T14709] CPU: 1 PID: 14709 Comm: syz-executor.0 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 336.984501][T14709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.994563][T14709] Call Trace: [ 336.997864][T14709] dump_stack+0x1b0/0x21e [ 337.002198][T14709] ? devkmsg_release+0x11c/0x11c [ 337.007148][T14709] ? show_regs_print_info+0x12/0x12 [ 337.012452][T14709] should_fail+0x6fb/0x860 [ 337.016885][T14709] ? setup_fault_attr+0x2b0/0x2b0 [ 337.021938][T14709] ? update_load_avg+0x410/0x8f0 [ 337.026882][T14709] ? switch_mm_irqs_off+0x46e/0x870 [ 337.032087][T14709] ? alloc_skb_with_frags+0xb1/0x580 [ 337.037383][T14709] should_failslab+0x5/0x20 [ 337.041917][T14709] __kmalloc_track_caller+0x5d/0x2b0 [ 337.047204][T14709] ? kmem_cache_alloc+0x1d5/0x250 [ 337.052253][T14709] ? alloc_skb_with_frags+0xb1/0x580 [ 337.057539][T14709] __alloc_skb+0xd1/0x4d0 [ 337.061881][T14709] alloc_skb_with_frags+0xb1/0x580 [ 337.067001][T14709] sock_alloc_send_pskb+0x87e/0xcc0 [ 337.072211][T14709] ? sock_kzfree_s+0x50/0x50 [ 337.076806][T14709] ? ___preempt_schedule+0x16/0x20 [ 337.081921][T14709] ? __kfree_skb_flush+0x48/0xc0 [ 337.086859][T14709] ? __local_bh_enable_ip+0xb1/0x170 [ 337.092148][T14709] __ip_append_data+0x1fbd/0x31b0 [ 337.097183][T14709] ? ip_do_fragment+0x2290/0x2290 [ 337.102214][T14709] ? ip_output+0x318/0x400 [ 337.106635][T14709] ? ip_setup_cork+0x810/0x810 [ 337.111407][T14709] ? ipv4_mtu+0x212/0x2c0 [ 337.115751][T14709] ? ip_setup_cork+0x46b/0x810 [ 337.120519][T14709] ip_make_skb+0x1c9/0x4d0 [ 337.124969][T14709] ? ip_do_fragment+0x2290/0x2290 [ 337.129994][T14709] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 337.135633][T14709] ? __sk_dst_check+0x1b0/0x1b0 [ 337.140490][T14709] udp_sendmsg+0x1d1b/0x2e80 [ 337.145093][T14709] ? ip_do_fragment+0x2290/0x2290 [ 337.150132][T14709] ? udp_cmsg_send+0x340/0x340 [ 337.154929][T14709] ? selinux_socket_sendmsg+0x10b/0x320 [ 337.160478][T14709] ? selinux_socket_accept+0x580/0x580 [ 337.165940][T14709] ? rw_copy_check_uvector+0x6b/0x310 [ 337.171321][T14709] ? inet_send_prepare+0x1b7/0x470 [ 337.176467][T14709] ? inet_send_prepare+0x470/0x470 [ 337.181585][T14709] ____sys_sendmsg+0x56f/0x860 [ 337.186361][T14709] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 337.191573][T14709] ? udp_sendmsg+0x75b/0x2e80 [ 337.196257][T14709] ? __sys_sendmmsg+0x46f/0x680 [ 337.201117][T14709] __sys_sendmmsg+0x338/0x680 [ 337.205838][T14709] ? __ia32_sys_sendmsg+0x90/0x90 [ 337.210877][T14709] ? __rcu_read_lock+0x50/0x50 [ 337.215663][T14709] ? __kasan_slab_free+0x1e2/0x220 [ 337.220780][T14709] ? __kasan_slab_free+0x168/0x220 [ 337.225897][T14709] ? slab_free_freelist_hook+0xd0/0x150 [ 337.231474][T14709] ? kmem_cache_free+0xac/0x5c0 [ 337.236581][T14709] ? do_sys_open+0x4a3/0x620 [ 337.241192][T14709] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 337.247270][T14709] ? do_sys_open+0x2fc/0x620 [ 337.251878][T14709] ? proc_fail_nth_write+0x166/0x200 [ 337.257179][T14709] ? proc_fail_nth_read+0x1c0/0x1c0 [ 337.262398][T14709] ? ip4_datagram_release_cb+0x864/0xde0 [ 337.268038][T14709] ? proc_fail_nth_read+0x1c0/0x1c0 [ 337.273247][T14709] ? memset+0x1f/0x40 [ 337.277235][T14709] ? fsnotify+0x13a0/0x1460 [ 337.281746][T14709] ? __kernel_write+0x340/0x340 [ 337.286777][T14709] ? fsnotify+0x13a0/0x1460 [ 337.291309][T14709] ? security_file_permission+0x128/0x300 [ 337.297034][T14709] ? __sb_end_write+0xa4/0xf0 [ 337.301826][T14709] ? vfs_write+0x427/0x4f0 [ 337.306269][T14709] ? ksys_write+0x237/0x2a0 [ 337.310772][T14709] ? __ia32_sys_read+0x80/0x80 [ 337.315537][T14709] __x64_sys_sendmmsg+0x9c/0xb0 [ 337.320390][T14709] do_syscall_64+0xcb/0x150 [ 337.324904][T14709] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 337.330887][T14709] RIP: 0033:0x45de59 [ 337.334777][T14709] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.354383][T14709] RSP: 002b:00007f1ca0d1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 337.362792][T14709] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 [ 337.370862][T14709] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000004 [ 337.378838][T14709] RBP: 00007f1ca0d1bca0 R08: 0000000000000000 R09: 0000000000000000 [ 337.386824][T14709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000045 [ 337.394923][T14709] R13: 00007ffed48b412f R14: 00007f1ca0d1c9c0 R15: 000000000118bf2c 13:14:24 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x80040000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 337.446174][T14708] EXT4-fs (loop2): inodes count not valid: 24608 vs 32 13:14:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="206800000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:24 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x8cffffff, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:24 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000100)='./file1\x00', 0x80200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000400)='/dev/bsg\x00', 0x10100, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000440)={0xc, @empty, 0x4e23, 0x0, 'sh\x00', 0x20, 0x86, 0x7f}, 0x2c) [ 337.540628][T14719] overlayfs: filesystem on './file1' not supported [ 337.580753][T14719] overlayfs: filesystem on './file1' not supported 13:14:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x40006c, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 337.708733][T14729] EXT4-fs (loop2): inodes count not valid: 26656 vs 32 13:14:24 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x7fff, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="04000509de6273c0426129a6e12cf07a844f7400c7cfe6122b20046e9b852788a4b5a546e5e7c2d10088dea101b67eef7bf84c08f75eb72bc7a6b5fd07e8e511176a2e012fe0b2a78d58fc1080028454f80fb35a98016853a0a2e58323317d73cbb0eccc69bc18a5c0a16b133d3961c701fb11c85add71", 0x77}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) recvmsg(r3, &(0x7f0000002700)={0x0, 0x0, &(0x7f0000002640)=[{&(0x7f0000000200)=""/118, 0x76}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/18, 0x12}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000000280)=""/99, 0x63}, {&(0x7f0000000300)=""/49, 0x31}, {&(0x7f0000000340)=""/99, 0x63}, {&(0x7f0000002400)=""/183, 0xb7}, {&(0x7f00000024c0)=""/248, 0xf8}, {&(0x7f00000025c0)=""/84, 0x54}], 0xa}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:14:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="206c00000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 337.837227][T14744] overlayfs: workdir and upperdir must be separate subtrees 13:14:24 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xa1ffffff, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 337.877949][T14744] overlayfs: filesystem on './file1' not supported 13:14:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:14:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400074, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:14:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="207400000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 337.979176][T14751] EXT4-fs (loop2): inodes count not valid: 27680 vs 32 [ 337.979448][T14750] FAT-fs (loop5): invalid media value (0xcf) [ 338.013879][T14750] FAT-fs (loop5): Can't find a valid FAT filesystem 13:14:24 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xcb260000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000002, 0x0) [ 338.149349][T14761] overlayfs: filesystem on './file1' not supported [ 338.167511][T14762] EXT4-fs (loop2): inodes count not valid: 29728 vs 32 [ 338.176005][T14750] FAT-fs (loop5): invalid media value (0xcf) [ 338.187585][T14750] FAT-fs (loop5): Can't find a valid FAT filesystem 13:14:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x40007a, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:14:25 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x10200, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, r4, 0x10, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x7, @link='syz0\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40c4}, 0x200440c1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:14:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="207a00000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 338.292709][T14778] overlayfs: filesystem on './file1' not supported 13:14:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000003, 0x0) 13:14:25 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xe4ffffff, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:25 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x101040, 0x42) unlinkat(r3, &(0x7f0000000200)='./file1\x00', 0x200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000100)) [ 338.482407][T14788] EXT4-fs (loop2): inodes count not valid: 31264 vs 32 13:14:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000004, 0x0) 13:14:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20e000000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:25 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xf5040000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400300, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 338.614892][T14795] overlayfs: filesystem on './file1' not supported [ 338.640668][T14800] overlayfs: filesystem on './file1' not supported 13:14:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000005, 0x0) 13:14:25 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f0000000400)=""/230, &(0x7f0000000180)=0xe6) fallocate(r0, 0x40, 0x1, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r3) r4 = add_key(&(0x7f0000000100)='.dead\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_persistent(0x16, r3, r4) [ 338.716933][T14811] EXT4-fs (loop2): inodes count not valid: 57376 vs 32 13:14:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fc00000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000006, 0x0) 13:14:25 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xf6ffffff, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400500, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 338.853660][T14821] overlayfs: filesystem on './file1' not supported [ 338.863368][T14830] EXT4-fs (loop2): inodes count not valid: 64544 vs 32 [ 338.882768][T14821] overlayfs: filesystem on './file1' not supported 13:14:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200402000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000007, 0x0) 13:14:25 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r3, 0x80081270, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:14:26 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xfeffffff, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 339.167143][T14843] EXT4-fs (loop2): inodes count not valid: 132128 vs 32 [ 339.178243][T14846] overlayfs: filesystem on './file1' not supported 13:14:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000008, 0x0) 13:14:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200003000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400600, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 339.217920][T14846] overlayfs: filesystem on './file1' not supported 13:14:26 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x200, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x4100808, &(0x7f0000000100)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:14:26 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xff0f0000, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000009, 0x0) [ 339.387271][T14867] EXT4-fs (loop2): inodes count not valid: 196640 vs 32 [ 339.388292][T14862] overlayfs: filesystem on './file1' not supported 13:14:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400700, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:14:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20c103000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 339.532493][T14875] overlayfs: filesystem on './file1' not supported 13:14:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000000a, 0x0) 13:14:26 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="0400050900027400f8015dea239572b82ca9607552169f2668eca4dc5e8c9a929b39453b3501f2b3695f1e6c79cfee3896f222482d4a8c4bb9b9e8e259d98d0bc1d5611367bfeb01fd22758c772070c5b9ff860e9839b946ad101c06701fc5a5a239884c83461a388d93c823546438b0", 0x70}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) r2 = dup(r1) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r4 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r2, 0x541c, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r4, 0x82307201, &(0x7f00000001c0)) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f00000002c0)="e674ea8eb22cc69214b62dad4a2742da6b0411c149379c2667c7a1e4c8def09eb62a3d76cc54138f4e55bda691c905d427bc1036adeb9946d5fea8c4c0c0b7b47027e9868dd27d50490bc4063b00a7dea1ef4d0c859d2f1fd2d26b40296c16fe8201d251e4cde0004ca509e3110f9eb26310e0afc9eaf13b137dea93") [ 339.747346][T14886] EXT4-fs (loop2): inodes count not valid: 246048 vs 32 13:14:26 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xffffff7f, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200204000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 339.799864][T14897] FAT-fs (loop5): invalid media value (0x16) [ 339.812769][T14897] FAT-fs (loop5): Can't find a valid FAT filesystem [ 339.839307][T14901] overlayfs: filesystem on './file1' not supported 13:14:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000000b, 0x0) 13:14:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400900, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 339.945139][T14901] overlayfs: filesystem on './file1' not supported [ 339.957671][T14906] EXT4-fs (loop2): inodes count not valid: 262688 vs 32 13:14:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000000c, 0x0) 13:14:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200604000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 340.089774][T14897] FAT-fs (loop5): invalid media value (0x16) [ 340.112368][T14897] FAT-fs (loop5): Can't find a valid FAT filesystem [ 340.132820][T14925] EXT4-fs (loop2): inodes count not valid: 263712 vs 32 13:14:26 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xffffff8c, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) [ 340.133579][T14923] overlayfs: filesystem on './file1' not supported 13:14:27 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000000d, 0x0) 13:14:27 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000140)={0x1, 0x1, 0xbb, 0x2, 0x6}) timer_settime(0x0, 0x1, &(0x7f0000000200)={{0x77359400}, {0x77359400}}, &(0x7f0000000240)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r3, 0x82307201, &(0x7f00000001c0)) [ 340.254023][T14931] overlayfs: filesystem on './file1' not supported 13:14:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400a00, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:14:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200005000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) 13:14:27 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000000e, 0x0) 13:14:27 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xffffffa1, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:27 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r4, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x28, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_KEY={0xc, 0x50, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}]}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x400, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r7}, @void}}, ["", "", "", ""]}, 0x1c}}, 0x20004000) ioctl$FITRIM(r2, 0x82307201, &(0x7f00000001c0)) 13:14:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200006000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 340.457472][T14941] overlayfs: filesystem on './file1' not supported [ 340.460443][T14950] EXT4-fs (loop2): inodes count not valid: 327712 vs 32 13:14:27 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000000f, 0x0) [ 340.583562][T14957] overlayfs: filesystem on './file1' not supported 13:14:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400b00, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 13:14:27 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000010, 0x0) 13:14:27 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xffffffe4, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200406000002000019040200600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000040)) [ 340.690558][T14965] EXT4-fs (loop2): inodes count not valid: 393248 vs 32 13:14:27 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) fcntl$setsig(r0, 0xa, 0x1e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FITRIM(r3, 0x82307201, &(0x7f00000001c0)) [ 340.780406][T14979] overlayfs: failed to resolve './file1': -2 13:14:27 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000011, 0x0) 13:14:27 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0xfffffff6, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x0) 13:14:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400c00, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 340.862591][T14979] overlayfs: filesystem on './file1' not supported [ 340.875429][T14985] EXT4-fs (loop2): inodes count not valid: 394272 vs 32 13:14:27 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027496f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') lsetxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='trusted.overlay.opaque\x00', &(0x7f0000000740)='y\x00', 0x2, 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x28, r1, 0x1, 0x0, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}}, 0x4000000) sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x5c, 0x0, 0x800, 0x70bd25, 0x25dfdbff, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x29}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1000}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10000010}, 0x40800) r4 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000780)=ANY=[@ANYBLOB="12011001000000206a8a3e40400001020301468303f72ba3a64d2e2f64866f09022d0001010100eaff00000000756cb6d70800000003000400ff810905020300046a45b663b417659febd3cff06da8a0c3b4b652d335b6ba3b7aaef26e9ef3bf9241ff17f55200289bc0bd3c7c09c502dfcd95eb465c3cb5d4925a51e0aeca64d7d18a889d47184e2bcc4460d3e40f9d9a80e5cdc1a2fd5bee7e0f3e11442af0799e8a132588153b4ce57de67d094450ff858cf8c1450000005b0000000000aa8eed83c3fba463805d5f28695df134e14fef3c3a4b0eec0ad71529493c61d626dcc6766442692fd3034fe5fa1a5b4baa75b6f75812ca8672482836775976c62b8905e72a2d791fb2291a4d03af3a17c20554bd65e068717ea65dfd252fc4cc0c34f95ea4a53a22a8df5009005de3e6547c25fc1dd9402cd3ca11b6ca"], &(0x7f0000000640)={0xa, &(0x7f0000000340)={0xa, 0x6, 0x250, 0x1, 0x1, 0x7, 0xff, 0x4}, 0xf7, &(0x7f0000000400)={0x5, 0xf, 0xf7, 0x3, [@ext_cap={0x7, 0x10, 0x2, 0x2, 0xf, 0x0, 0x6}, @generic={0x30, 0x10, 0x2, "2ada310a23b09776a7a92450c9c92ecae10585d571dc1024932b6353e284b46384f6f45721f1be708894591cc6"}, @generic={0xbb, 0x10, 0xb, "062e7a53fea00c21add523bf2be03cda5015a196ba6183642a7404fe4bc6c1146fb1e22ecd6bb67bca306477b4aed8337cb06413d8a698623a293f8186a73fd9f514588f1c845f7fd31a075d9415f7ab9141d37b925f80c3db9475a6496807ead43815d9a29698878d271887a3bd0e79b311444d83fdd055c2cdb8fd82b1d606c1cc2a7aa2e9cd711929097e80fc4af583129e0a4e132544cf536770b768b714cbdab11717b2390df736f492012ac8189a8733abee38844b"}]}, 0x5, [{0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x41e}}, {0x4, &(0x7f0000000500)=@lang_id={0x4, 0x3, 0x562f}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x429}}, {0x38, &(0x7f0000000580)=@string={0x38, 0x3, "8cc3d4e350bdba46317f93aa931f1547d13c96fa70a44a067e78341838fe7de8a9a82c5736f6ece1cfa2614186881884af17c9177bc7"}}, {0x7c, &(0x7f00000005c0)=@string={0x7c, 0x3, "d04d134d7b522ae3ac17e9dd61affc48e087c166475db3a19ce0571970471052f74fb626301cf8c515e67fe56f9078d30fa902771c1f142ef99c7b8ac86d1474150f263c4f7a3876cc034f3cd99a83ba5c934a9c1c2a05df2dfc9254a33c5fc94a9df9356e05bc4effa499d2fc1b42e5908690efae04f9d23e8a"}}]}) ioctl$FITRIM(r4, 0x82307201, &(0x7f00000001c0)) 13:14:27 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x4ad}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000012, 0x0) [ 341.009640][T14999] kasan: CONFIG_KASAN_INLINE enabled [ 341.025734][T14999] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 341.034279][T14999] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 341.041229][T14999] CPU: 0 PID: 14999 Comm: syz-executor.5 Not tainted 5.4.70-syzkaller-00074-gf7bf709b223b #0 [ 341.051968][T14999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.062045][T14999] RIP: 0010:ieee80211_key_free+0x33/0x390 [ 341.068293][T14999] Code: 53 50 89 f5 49 89 fe e8 0b e1 8c fd 4d 85 f6 0f 84 b0 00 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8d 7e 08 4c 89 fb 48 c1 eb 03 <80> 3c 03 00 74 08 4c 89 ff e8 ff 9a ba fd 4d 8b 2f 4d 85 ed 0f 84 [ 341.088256][T14999] RSP: 0018:ffff8881cf1173a8 EFLAGS: 00010202 [ 341.094309][T14999] RAX: dffffc0000000000 RBX: 0fffffffe000098a RCX: 0000000000040000 [ 341.102266][T14999] RDX: ffffc9000323a000 RSI: 0000000000000198 RDI: 0000000000000199 [ 341.110248][T14999] RBP: 0000000000000000 R08: ffffffff83aec3e8 R09: ffffffff81f757eb [ 341.118207][T14999] R10: ffff8881d07acd80 R11: 000000000000000c R12: ffff8881c99bda68 [ 341.126184][T14999] R13: ffff8881c99bced8 R14: 7fffffff00004c4b R15: 7fffffff00004c53 [ 341.134146][T14999] FS: 00007f303d9f8700(0000) GS:ffff8881db800000(0000) knlGS:0000000000000000 [ 341.143065][T14999] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 341.149638][T14999] CR2: 00007fff5c788030 CR3: 00000001d34bb006 CR4: 00000000001606f0 [ 341.157597][T14999] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 341.165551][T14999] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 341.173522][T14999] Call Trace: [ 341.176810][T14999] ieee80211_del_key+0x139/0x180 [ 341.181731][T14999] rdev_del_key+0x1cf/0x330 [ 341.186242][T14999] ? mutex_is_locked+0xe/0x40 [ 341.190907][T14999] nl80211_del_key+0x410/0x550 [ 341.195659][T14999] ? nl80211_new_key+0x5b0/0x5b0 [ 341.200582][T14999] ? nl80211_pre_doit+0x445/0x5a0 [ 341.205606][T14999] genl_rcv_msg+0xe76/0x1330 [ 341.210183][T14999] ? genl_rcv+0x40/0x40 [ 341.214324][T14999] ? rhashtable_jhash2+0x1cf/0x2f0 [ 341.219420][T14999] ? jhash+0x740/0x740 [ 341.223472][T14999] ? rht_key_hashfn+0x157/0x240 [ 341.228303][T14999] ? deferred_put_nlk_sk+0x210/0x210 [ 341.233566][T14999] ? netlink_sendmsg+0x73b/0xd40 [ 341.238484][T14999] ? jhash+0x740/0x740 [ 341.242531][T14999] ? netlink_hash+0xd0/0xd0 [ 341.247036][T14999] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 341.253086][T14999] ? _raw_spin_lock_irq+0x180/0x180 [ 341.258279][T14999] netlink_rcv_skb+0x1f0/0x460 [ 341.263027][T14999] ? genl_rcv+0x40/0x40 [ 341.267169][T14999] ? netlink_ack+0xa90/0xa90 [ 341.271746][T14999] ? __down_read+0xf1/0x210 [ 341.276253][T14999] ? __init_rwsem+0x120/0x120 [ 341.280940][T14999] ? __rcu_read_lock+0x50/0x50 [ 341.285693][T14999] ? selinux_vm_enough_memory+0x160/0x160 [ 341.291408][T14999] ? setup_fault_attr+0x2b0/0x2b0 [ 341.296417][T14999] genl_rcv+0x24/0x40 [ 341.300386][T14999] netlink_unicast+0x87c/0xa20 [ 341.305152][T14999] ? netlink_detachskb+0x60/0x60 [ 341.310074][T14999] ? __virt_addr_valid+0x1fd/0x290 [ 341.315173][T14999] netlink_sendmsg+0x9a7/0xd40 [ 341.319944][T14999] ? netlink_getsockopt+0x8e0/0x8e0 [ 341.325128][T14999] ? security_socket_sendmsg+0xad/0xc0 [ 341.330571][T14999] ? netlink_getsockopt+0x8e0/0x8e0 [ 341.335753][T14999] ____sys_sendmsg+0x56f/0x860 [ 341.340500][T14999] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 341.345722][T14999] ? percpu_counter_add_batch+0x12d/0x150 [ 341.351472][T14999] __sys_sendmsg+0x26a/0x350 [ 341.356081][T14999] ? ____sys_sendmsg+0x860/0x860 [ 341.361044][T14999] ? selinux_file_ioctl+0x6e4/0x920 [ 341.366256][T14999] ? ioctl_preallocate+0x240/0x240 [ 341.371376][T14999] ? alloc_empty_file_noaccount+0x70/0x70 [ 341.377102][T14999] ? put_timespec64+0x106/0x150 [ 341.381961][T14999] ? ktime_get_raw+0x130/0x130 [ 341.386713][T14999] ? get_timespec64+0x1c0/0x1c0 [ 341.391660][T14999] ? __se_sys_futex+0x31d/0x440 [ 341.396505][T14999] do_syscall_64+0xcb/0x150 [ 341.401002][T14999] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 341.406899][T14999] RIP: 0033:0x45de59 [ 341.410801][T14999] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.430663][T14999] RSP: 002b:00007f303d9f7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 341.439071][T14999] RAX: ffffffffffffffda RBX: 000000000002b140 RCX: 000000000045de59 [ 341.447033][T14999] RDX: 0000000004000000 RSI: 0000000020001400 RDI: 0000000000000004 [ 341.455010][T14999] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 341.462986][T14999] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 341.470947][T14999] R13: 00007ffc3d5593ef R14: 00007f303d9f89c0 R15: 000000000118bf2c [ 341.478907][T14999] Modules linked in: [ 341.489340][T14999] ---[ end trace fa91668b2a6e2a5e ]--- [ 341.495794][T14999] RIP: 0010:ieee80211_key_free+0x33/0x390 [ 341.503890][T15011] overlayfs: failed to resolve './file1': -2 [ 341.513120][T14999] Code: 53 50 89 f5 49 89 fe e8 0b e1 8c fd 4d 85 f6 0f 84 b0 00 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8d 7e 08 4c 89 fb 48 c1 eb 03 <80> 3c 03 00 74 08 4c 89 ff e8 ff 9a ba fd 4d 8b 2f 4d 85 ed 0f 84 [ 341.534675][T14999] RSP: 0018:ffff8881cf1173a8 EFLAGS: 00010202 [ 341.540811][T14999] RAX: dffffc0000000000 RBX: 0fffffffe000098a RCX: 0000000000040000 [ 341.549445][T14999] RDX: ffffc9000323a000 RSI: 0000000000000198 RDI: 0000000000000199 13:14:28 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400d00, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.']) mkdir(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 341.567102][T15005] overlayfs: filesystem on './file1' not supported [ 341.568947][T14999] RBP: 0000000000000000 R08: ffffffff83aec3e8 R09: ffffffff81f757eb [ 341.588599][T14999] R10: ffff8881d07acd80 R11: 000000000000000c R12: ffff8881c99bda68 [ 341.597339][T14999] R13: ffff8881c99bced8 R14: 7fffffff00004c4b R15: 7fffffff00004c53 [ 341.607069][T14999] FS: 00007f303d9f8700(0000) GS:ffff8881db900000(0000) knlGS:0000000000000000 [ 341.616599][T14999] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 341.623844][T14999] CR2: 000056174288c8d0 CR3: 00000001d34bb004 CR4: 00000000001606e0 [ 341.632397][T14999] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 341.641336][T14999] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 341.650243][T14999] Kernel panic - not syncing: Fatal exception [ 341.656881][T14999] Kernel Offset: disabled [ 341.661196][T14999] Rebooting in 86400 seconds..