open_writers comm="syz-executor.1" name="/root/syzkaller-testdir849591996/syzkaller.HxsKoo/138/bus" dev="sda1" ino=14212 res=1 errno=0 01:27:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000002d00)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x1eb0, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x1001, 0x3, "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"}, @TIPC_NLA_NODE_ID={0xbd, 0x3, "e79bf609bac0c62c9f93bedc87f0a65227f81a8dac01f2a3c1da7872ffa5a20ccf181a82a072022025154a08f9ee07fb19692fe18380414fa446f5410654487a6b2e469f9e612bbc5c9c07082138bef34352aefd1b0175ff5960285a9b37ea6b9e86fae8e179c22cd5ecd4f287160add9cc19fb7012a5449bce44e8553b76e6c0061886429f084d621b420f70d2a850dc0ce7e0104e9cf21ae55ef787606f7756962b901311309167d06c7301b2970bb339871290197ed29e7"}, @TIPC_NLA_NODE_KEY={0x3d, 0x4, {'gcm(aes)\x00', 0x15, "e43ceee4143a9e7db84183e26a5f7954f040708101"}}, @TIPC_NLA_NODE_KEY={0x45, 0x4, {'gcm(aes)\x00', 0x1d, "10d9fe674fdeba06be171f21b56f0a277debd55cab721e8a875ff2296e"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0xd59, 0x3, "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"}]}]}, 0x1ec4}}, 0x0) 01:27:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000240)) 01:27:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002140)={0x0, 0x0, 0x0}, 0x0) 01:27:09 executing program 2: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000040), 0x8000, 0x0) 01:27:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) 01:27:09 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000002980)={0x0, 0x0, 0x0}, 0x0) 01:27:09 executing program 1: move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ff8000/0x4000)=nil], &(0x7f0000000040), 0x0, 0x0) 01:27:09 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002100)='/sys/kernel/config', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 01:27:09 executing program 5: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mbind(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000000)=0x5, 0x3, 0x1) 01:27:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) 01:27:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 01:27:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4801) 01:27:09 executing program 5: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000300)=@hat={'changehat ', 0x1}, 0x1d) 01:27:09 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002100)='/sys/fs/cgroup', 0x0, 0x0) lseek(r0, 0x400000, 0x1) 01:27:09 executing program 4: mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 01:27:09 executing program 0: prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rt_acct\x00') 01:27:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@RTM_GETNSID={0x1c, 0x5a, 0x1, 0x0, 0x0, {}, [@NETNSA_PID={0x8}]}, 0x1c}}, 0x4040004) 01:27:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 01:27:09 executing program 5: r0 = gettid() move_pages(r0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) [ 279.385582][ T37] audit: type=1400 audit(1630459629.872:7): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=12361 comm="syz-executor.5" 01:27:09 executing program 1: add_key$fscrypt_provisioning(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:27:09 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2219004, 0x0) 01:27:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x1c, 0x2, 0x2, 0x801, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}]}, 0x1c}}, 0x0) 01:27:09 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 01:27:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='statm\x00') close(r0) close(0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$nl_route_sched(r0, &(0x7f0000007100)={&(0x7f0000000000), 0xc, &(0x7f00000070c0)={0x0}}, 0x0) [ 279.454936][T12375] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 279.480462][T12377] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 01:27:10 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='hugetlbfs\x00', 0x0, 0x0) 01:27:10 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='permhat 0'], 0x59) 01:27:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0xa, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2}]}, 0x20}}, 0x0) 01:27:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x18, 0x2, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0x4}]}, 0x18}}, 0x0) 01:27:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=[@rights={{0x1c, 0x1, 0x1, [r0, r0, 0xffffffffffffffff]}}], 0x20}, 0x0) 01:27:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000001900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1, 0x0) 01:27:10 executing program 5: move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x8) 01:27:10 executing program 0: mprotect(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 01:27:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="20000000030705000000000000000000000000000900010073797a00e4"], 0x20}}, 0x0) 01:27:10 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000002040)='smaps\x00') 01:27:10 executing program 1: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 01:27:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x23, 0x4, 0x8, 0x801, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x5}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8}]}]}, 0x3c}}, 0x0) 01:27:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000003500)=[{{0x0, 0x0, 0x0, 0xfffffffffffffea7}}], 0x1, 0x0, 0x0) 01:27:10 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x10) 01:27:10 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000007400)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000007200), 0x0, 0x0, &(0x7f0000007440)={0x0, r1+10000000}) [ 279.651406][T12397] AppArmor: change_hat: Invalid input '0' [ 279.769765][T12413] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.5'. 01:27:10 executing program 2: mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, &(0x7f0000000000)=0x1, 0x5, 0x0) 01:27:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080), 0x4) 01:27:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x4, 0x8, 0x801, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5}]}, 0x24}}, 0x0) 01:27:10 executing program 3: socket$nl_route(0x10, 0x3, 0x0) select(0x40, &(0x7f0000000100), &(0x7f0000000140)={0xd}, 0x0, 0x0) 01:27:10 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x4002, 0x0) 01:27:10 executing program 0: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) 01:27:10 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12060, 0x0) 01:27:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x4, 0x8, 0x801, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6005}]}, 0x24}}, 0x0) 01:27:10 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) 01:27:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="28000000030601010000000000000000050000070900020073797a30000000000500f2"], 0x28}}, 0x0) 01:27:10 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x105542e, 0x0) 01:27:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x40002081, 0x0) 01:27:10 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg$unix(r0, &(0x7f0000001680)=[{{0x0, 0x0, &(0x7f00000014c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0, 0x0) 01:27:10 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001e80), 0x0, 0x0) 01:27:10 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req={0x6, 0x3}, 0x10) 01:27:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 01:27:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="2000000002070500000000000000000000000000090001"], 0x20}}, 0x0) 01:27:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f00000041c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x141, 0x0) 01:27:10 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005540)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:27:10 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='permhat 0x0(00000000000000^/proc/thread-self/attr/current\x00/proc/thread-self/attr/current\x00'], 0x59) 01:27:10 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x103200, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x8000}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1ff}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x20000004) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8418404}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, 0x0, 0x800, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x154, 0x0, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x84, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x60}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xffff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a88}]}, @TIPC_NLA_MEDIA={0x74, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff3d54}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x95c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8001}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x10}, 0x4000) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f00000004c0)=""/252, 0xfc}, {&(0x7f00000005c0)=""/97, 0x61}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/149, 0x95}, {&(0x7f0000001700)=""/45, 0x2d}, {&(0x7f0000001740)}, {&(0x7f0000001780)=""/174, 0xae}], 0x7, &(0x7f00000018c0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x48}}, {{&(0x7f0000001940), 0x6e, &(0x7f0000001f80)=[{&(0x7f00000019c0)=""/95, 0x5f}, {&(0x7f0000001a40)=""/11, 0xb}, {&(0x7f0000001a80)=""/249, 0xf9}, {&(0x7f0000001b80)=""/6, 0x6}, {&(0x7f0000001bc0)=""/223, 0xdf}, {&(0x7f0000001cc0)=""/146, 0x92}, {&(0x7f0000001d80)=""/70, 0x46}, {&(0x7f0000001e00)=""/125, 0x7d}, {&(0x7f0000001e80)=""/247, 0xf7}], 0x9, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}}, {{0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f0000002140)=""/14, 0xe}, {&(0x7f0000002180)=""/174, 0xae}, {&(0x7f0000002240)=""/87, 0x57}], 0x3, &(0x7f0000002300)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}}, {{&(0x7f0000002380)=@abs, 0x6e, &(0x7f0000003540)=[{&(0x7f0000002400)=""/232, 0xe8}, {&(0x7f0000002500)=""/35, 0x23}, {&(0x7f0000002540)=""/4096, 0x1000}], 0x3}}, {{&(0x7f0000003580), 0x6e, &(0x7f0000005800)=[{&(0x7f0000003600)=""/38, 0x26}, {&(0x7f0000003640)=""/4096, 0x1000}, {&(0x7f0000004640)=""/232, 0xe8}, {&(0x7f0000004740)=""/62, 0x3e}, {&(0x7f0000004780)=""/106, 0x6a}, {&(0x7f0000004800)=""/4096, 0x1000}], 0x6, &(0x7f0000005880)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x158}}], 0x5, 0x100, 0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000005c40)={&(0x7f0000005b40)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000005c00)={&(0x7f0000005b80)={0x44, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @remote}, @FOU_ATTR_PEER_V6={0x14, 0x9, @remote}, @FOU_ATTR_PEER_V6={0x14, 0x9, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}}]}, 0x44}}, 0x3251511f8cddf365) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000005c80)={'batadv0\x00', 0x0}) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000005cc0)={'geneve1', 0x32, 0x31}, 0xa) recvmmsg$unix(r4, &(0x7f0000009800)=[{{&(0x7f0000005d00), 0x6e, &(0x7f0000005f80)=[{&(0x7f0000005d80)=""/72, 0x48}, {&(0x7f0000005e00)=""/85, 0x55}, {&(0x7f0000005e80)=""/159, 0x9f}, {&(0x7f0000005f40)=""/14, 0xe}], 0x4, &(0x7f0000005fc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}, {{&(0x7f0000006000), 0x6e, &(0x7f00000060c0)=[{&(0x7f0000006080)=""/3, 0x3}], 0x1, &(0x7f0000006100)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x78}}, {{0x0, 0x0, &(0x7f00000075c0)=[{&(0x7f0000006180)=""/239, 0xef}, {&(0x7f0000006280)=""/65, 0x41}, {&(0x7f0000006300)=""/182, 0xb6}, {&(0x7f00000063c0)=""/187, 0xbb}, {&(0x7f0000006480)=""/216, 0xd8}, {&(0x7f0000006580)=""/6, 0x6}, {&(0x7f00000065c0)=""/4096, 0x1000}], 0x7, &(0x7f0000007640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78}}, {{&(0x7f00000076c0)=@abs, 0x6e, &(0x7f0000007a40)=[{&(0x7f0000007740)=""/178, 0xb2}, {&(0x7f0000007800)=""/105, 0x69}, {&(0x7f0000007880)=""/146, 0x92}, {&(0x7f0000007940)=""/160, 0xa0}, {&(0x7f0000007a00)=""/55, 0x37}], 0x5, &(0x7f0000007ac0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}}, {{0x0, 0x0, &(0x7f0000008f40)=[{&(0x7f0000007b80)=""/4096, 0x1000}, {&(0x7f0000008b80)=""/247, 0xf7}, {&(0x7f0000008c80)=""/52, 0x34}, {&(0x7f0000008cc0)=""/201, 0xc9}, {&(0x7f0000008dc0)=""/130, 0x82}, {&(0x7f0000008e80)}, {&(0x7f0000008ec0)=""/106, 0x6a}], 0x7, &(0x7f0000008fc0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000009000)=@abs, 0x6e, &(0x7f0000009480)=[{&(0x7f0000009080)=""/32, 0x20}, {&(0x7f00000090c0)=""/148, 0x94}, {&(0x7f0000009180)=""/214, 0xd6}, {&(0x7f0000009280)=""/150, 0x96}, {&(0x7f0000009340)=""/50, 0x32}, {&(0x7f0000009380)=""/207, 0xcf}], 0x6, &(0x7f0000009500)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}}, {{0x0, 0x0, &(0x7f00000097c0)=[{&(0x7f0000009600)=""/252, 0xfc}, {&(0x7f0000009700)=""/142, 0x8e}], 0x2}}], 0x7, 0x10000, 0x0) accept$alg(r7, 0x0, 0x0) socketpair(0x1, 0x2, 0x9, &(0x7f00000099c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$FOU_CMD_ADD(r8, &(0x7f0000009ac0)={&(0x7f0000009a00)={0x10, 0x0, 0x0, 0x80000200}, 0xc, &(0x7f0000009a80)={&(0x7f0000009a40)={0x28, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e24}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000080}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000009b00)) clock_gettime(0x0, &(0x7f000000be00)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f000000bcc0)=[{{&(0x7f0000009b40)=@abs, 0x6e, &(0x7f0000009d40)=[{&(0x7f0000009bc0)=""/6, 0x6}, {&(0x7f0000009c00)=""/62, 0x3e}, {&(0x7f0000009c40)=""/251, 0xfb}], 0x3}}, {{&(0x7f0000009d80), 0x6e, &(0x7f000000a0c0)=[{&(0x7f0000009e00)=""/201, 0xc9}, {&(0x7f0000009f00)=""/208, 0xd0}, {&(0x7f000000a000)=""/161, 0xa1}], 0x3, &(0x7f000000a100)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x170}}, {{0x0, 0x0, &(0x7f000000a680)=[{&(0x7f000000a280)}, {&(0x7f000000a2c0)=""/9, 0x9}, {&(0x7f000000a300)=""/163, 0xa3}, {&(0x7f000000a3c0)=""/220, 0xdc}, {&(0x7f000000a4c0)=""/177, 0xb1}, {&(0x7f000000a580)=""/249, 0xf9}], 0x6}}, {{&(0x7f000000a700)=@abs, 0x6e, &(0x7f000000a7c0)=[{&(0x7f000000a780)=""/41, 0x29}], 0x1}}, {{&(0x7f000000a800)=@abs, 0x6e, &(0x7f000000bb40)=[{&(0x7f000000a880)=""/66, 0x42}, {&(0x7f000000a900)=""/31, 0x1f}, {&(0x7f000000a940)=""/213, 0xd5}, {&(0x7f000000aa40)=""/18, 0x12}, {&(0x7f000000aa80)=""/173, 0xad}, {&(0x7f000000ab40)=""/4096, 0x1000}], 0x6, &(0x7f000000bbc0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe0}}], 0x5, 0x40000100, &(0x7f000000be40)={r9, r10+10000000}) r13 = syz_genetlink_get_family_id$fou(&(0x7f000000bec0), r6) sendmsg$FOU_CMD_ADD(r11, &(0x7f000000bf80)={&(0x7f000000be80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f000000bf40)={&(0x7f000000bf00)={0x1c, r13, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004004}, 0x40004) syz_genetlink_get_family_id$fou(&(0x7f000000bfc0), r12) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f000000c100)={&(0x7f000000c000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f000000c0c0)={&(0x7f000000c080)={0x24, 0x0, 0x400, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) 01:27:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 01:27:10 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000140)) 01:27:10 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x200055, 0x0) 01:27:10 executing program 5: shmget$private(0x0, 0x3000, 0x904e8dc3e1d3cf6f, &(0x7f0000ff3000/0x3000)=nil) 01:27:10 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, &(0x7f00000000c0)=')!#%\x00') 01:27:10 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@bridge_delneigh={0x28, 0x1c, 0xc07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0xc0}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) 01:27:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 01:27:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x20, 0x3, 0x7, 0x5, 0x0, 0x0, {}, [@NFACCT_PKTS, @NFACCT_FLAGS, @NFACCT_BYTES, @NFACCT_NAME={0x0, 0x1, 'syz0\x00'}, @NFACCT_NAME={0x0, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 01:27:10 executing program 1: shmget(0x3, 0xc00000, 0x0, &(0x7f0000400000/0xc00000)=nil) 01:27:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 01:27:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x18}, 0x0) 01:27:10 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00'}) 01:27:10 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x21004, 0x0) [ 280.219033][T12468] AppArmor: change_hat: Invalid input '0x0(00000000000000^/proc/thread-self/attr/current' [ 280.397576][T12492] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:27:10 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', ',\x00'}, 0x7) 01:27:10 executing program 4: mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000000), 0x0, 0x0) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) 01:27:11 executing program 5: mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x4) 01:27:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x54, 0x3, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_SYNPROXY={0x4}, @CTA_ZONE={0x6}, @CTA_TUPLE_ORIG={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @dev}}}]}, @CTA_LABELS_MASK={0x4}]}, 0x54}}, 0x0) 01:27:11 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) read$alg(r0, 0x0, 0x0) 01:27:11 executing program 1: mlock(&(0x7f0000fee000/0x12000)=nil, 0x12000) 01:27:11 executing program 3: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0) 01:27:11 executing program 0: madvise(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x3) [ 280.548647][ T37] audit: type=1400 audit(1630459631.032:8): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="," pid=12505 comm="syz-executor.0" 01:27:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x3}, 0x4) 01:27:11 executing program 2: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000004c0)=[0x6, 0x2, 0x4]) 01:27:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000001900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2042, 0x0) 01:27:11 executing program 5: mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0xe) 01:27:11 executing program 4: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xe) sigaltstack(&(0x7f0000ffb000/0x4000)=nil, 0x0) 01:27:11 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') 01:27:11 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) 01:27:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:27:11 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='oom_adj\x00') write$FUSE_LSEEK(r0, 0x0, 0x0) 01:27:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvmsg$unix(r0, &(0x7f0000002300)={0x0, 0x0, 0x0}, 0x140) 01:27:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000020c0)='net/softnet_stat\x00') read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 01:27:11 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup3(r2, r1, 0x0) read$FUSE(r3, &(0x7f0000003540)={0x2020}, 0x2020) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000070000000000000020002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) 01:27:11 executing program 3: semget$private(0x0, 0x62361cff16d32458, 0x0) 01:27:11 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d00), 0x0, 0x0) write$cgroup_devices(r0, 0x0, 0x0) 01:27:11 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000002100)='/sys/fs/cgroup', 0x298000, 0x0) 01:27:11 executing program 3: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="707d726d6861742030783030303030305e2f70726f632f7468726561642d0800000097617474ce510d0c14c857ed74402f70726f632f746872656164519abf61ed4b2d73656c662f617474722f63757272656e7400eb1f7b38"], 0x59) 01:27:11 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000007440)) 01:27:11 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, &(0x7f0000001540)) 01:27:11 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d00), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x40010, r0, 0x0) 01:27:11 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) 01:27:11 executing program 1: sigaltstack(&(0x7f0000ffc000/0x3000)=nil, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 01:27:11 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000002100)='/sys/kernel/config', 0x0, 0x0) [ 280.990460][ T37] audit: type=1400 audit(1630459631.472:9): apparmor="DENIED" operation="setprocattr" info="current" error=-22 profile="unconfined" pid=12559 comm="syz-executor.3" 01:27:11 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="6bd9225354e9", @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @empty, @multicast1}, @info_request}}}}, 0x0) 01:27:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x4e, 0x0, 0x0) 01:27:12 executing program 3: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xf) 01:27:12 executing program 1: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x31, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000026c0)) 01:27:12 executing program 5: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_current(r0, 0x0, 0x1c1) 01:27:12 executing program 4: mprotect(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xf) 01:27:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000000), 0x4) 01:27:12 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 01:27:12 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000440)={&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000300)='[', 0x1}], 0x2}, 0x0) 01:27:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, 0x2, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}]}]}, 0x20}}, 0x0) 01:27:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @local}, 0x10) 01:27:12 executing program 1: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) msync(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 01:27:12 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x9}, 0x4) 01:27:13 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002100)='/sys/kernel/config', 0x0, 0x0) statx(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 01:27:13 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) read$FUSE(r0, 0x0, 0x0) 01:27:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x3, 0x7, 0x5}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40012040, 0x0) 01:27:13 executing program 5: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0}, 0x68) 01:27:13 executing program 1: get_mempolicy(0x0, &(0x7f0000000080), 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x0) 01:27:13 executing program 2: mlock2(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 01:27:13 executing program 4: get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x800, &(0x7f0000ffe000/0x1000)=nil, 0x2) 01:27:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_CREATE_OPEN(r0, 0x0, 0x0) 01:27:13 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, 0x0) 01:27:13 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=@profile={'changeprofile ', 'permhat '}, 0x16) 01:27:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='timerslack_ns\x00') write$FUSE_NOTIFY_INVAL_ENTRY(r0, 0x0, 0x0) 01:27:13 executing program 3: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x48, 0x0) 01:27:13 executing program 4: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x31, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4) 01:27:13 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/anycast6\x00') read$FUSE(r0, 0x0, 0x0) [ 282.804555][ T37] audit: type=1400 audit(1630459633.292:10): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name="permhat" pid=12643 comm="syz-executor.1" 01:27:13 executing program 0: syz_open_procfs(0x0, &(0x7f0000000180)='net/tcp\x00') 01:27:13 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d00), 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0x0) 01:27:13 executing program 2: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x100000e, 0x31, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x9) 01:27:13 executing program 3: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) r0 = fork() move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffb000/0x4000)=nil], 0x0, &(0x7f0000000040), 0x0) 01:27:13 executing program 4: syz_open_procfs(0x0, &(0x7f0000000440)='auxv\x00') 01:27:13 executing program 5: mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, &(0x7f0000000040), 0x1000, &(0x7f0000ffc000/0x2000)=nil, 0x2) 01:27:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/mcfilter6\x00') preadv(r0, &(0x7f0000003c40)=[{&(0x7f0000003bc0)=""/120, 0x78}], 0x1, 0x2, 0x0) 01:27:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000002640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 01:27:13 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) pipe(&(0x7f00000001c0)) select(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x11}, 0x0, 0x0) 01:27:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x2, 0x7, 0x201}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000002080)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001600)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x2, 0x40002102, 0x0) 01:27:13 executing program 3: sigaltstack(&(0x7f0000ffc000/0x2000)=nil, 0x0) mbind(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2, &(0x7f0000000040)=0x7, 0x1000, 0x1) 01:27:13 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d00), 0x190440, 0x0) 01:27:13 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000024c0), 0x101042, 0x0) 01:27:13 executing program 4: recvmsg$unix(0xffffffffffffffff, 0x0, 0x80000102) 01:27:13 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xa1025, 0x0) 01:27:13 executing program 5: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 01:27:13 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d00), 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r0}, 0x10) 01:27:13 executing program 2: mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0xd83c73d55acd6623) 01:27:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x8, 0x1, &(0x7f0000000540)=@raw=[@call], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 01:27:13 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') 01:27:13 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000006500), 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x1ff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'ip6erspan0\x00'}) 01:27:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(0xffffffffffffffff, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:13 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:13 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:13 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:13 executing program 2 (fault-call:8 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:13 executing program 1 (fault-call:2 fault-nth:0): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 283.376523][ T2044] nbd_handle_cmd: 4 callbacks suppressed [ 283.376543][ T2044] block nbd3: Attempted send on invalid socket [ 283.384067][ T3112] block nbd4: Attempted send on invalid socket [ 283.388829][ T2044] print_req_error: 4 callbacks suppressed [ 283.388840][ T2044] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 283.394826][ T3112] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 283.395912][T12716] hpfs: hpfs_map_sector(): read error [ 283.409204][T12712] hpfs: hpfs_map_sector(): read error [ 283.415711][T12718] FAULT_INJECTION: forcing a failure. [ 283.415711][T12718] name failslab, interval 1, probability 0, space 0, times 1 [ 283.440896][T12721] FAULT_INJECTION: forcing a failure. [ 283.440896][T12721] name failslab, interval 1, probability 0, space 0, times 1 [ 283.460711][T12721] CPU: 0 PID: 12721 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 283.469131][T12721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.479267][T12721] Call Trace: [ 283.482713][T12721] dump_stack_lvl+0xcd/0x134 [ 283.487338][T12721] should_fail.cold+0x5/0xa [ 283.491850][T12721] should_failslab+0x5/0x10 [ 283.492143][ T3112] block nbd0: Attempted send on invalid socket [ 283.496353][T12721] __kmalloc_track_caller+0x79/0x420 [ 283.496378][T12721] ? strndup_user+0x70/0xe0 [ 283.502556][ T3112] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 283.507785][T12721] ? lock_release+0x522/0x720 [ 283.521116][T12723] hpfs: hpfs_map_sector(): read error [ 283.522986][T12721] memdup_user+0x22/0xd0 [ 283.523018][T12721] strndup_user+0x70/0xe0 [ 283.541551][T12721] __x64_sys_mount+0x134/0x300 [ 283.546309][T12721] ? copy_mnt_ns+0xae0/0xae0 [ 283.550885][T12721] ? syscall_enter_from_user_mode+0x21/0x70 [ 283.556765][T12721] do_syscall_64+0x35/0xb0 [ 283.561170][T12721] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 283.567054][T12721] RIP: 0033:0x4665f9 [ 283.570937][T12721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 283.590536][T12721] RSP: 002b:00007febb2d43188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 283.599116][T12721] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 283.607072][T12721] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000020000000 [ 283.615146][T12721] RBP: 00007febb2d431d0 R08: 0000000000000000 R09: 0000000000000000 01:27:14 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:14 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 283.623101][T12721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.631363][T12721] R13: 00007ffc2c364b3f R14: 00007febb2d43300 R15: 0000000000022000 01:27:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r1, &(0x7f00000020c0)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x11}, 0x1c, 0x0}}], 0x1, 0x20000840) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f00000020c0)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x11}, 0x1c, 0x0}}], 0x1, 0x20000840) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1, 0x5, &(0x7f0000000300)=ANY=[@ANYRES64=r1, @ANYRES32=r1, @ANYRES64, @ANYRES64, @ANYRESOCT], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xffffffff, 0x4}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r5, 0x8912, 0x400308) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000100)='syzkaller0\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x80000f0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000633a77fbac141417ee", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f00000020c0)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x11}, 0x1c, 0x0}}], 0x1, 0x20000840) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) sendmsg(r6, &(0x7f0000000780)={&(0x7f0000000380)=@can, 0x80, &(0x7f0000000700)=[{&(0x7f00000001c0)}, {&(0x7f0000000400)="087ac9a449dead0fe035edfeb4b723cc23e48fe4a0de9ce1d8eb43b5c61c22b9f41e03a94d04eaa4296d1c325c32eae623f1b98550b50e57c2b7af64819213f1fa3da6a52d6cd26d1d44e115408615d5e9a95661f399618d8ae0d7f6481921367f712e28ddaa46e2f4f2db9cd63392c3d564572571664ff181d05a2d0317bb826e994da1c82d693b53f65e9060283cdb85c4af9d6656dcea08659534", 0x9c}, {&(0x7f00000004c0)="23881b909205711e7a9ded7a8b05d06ff7257686515386556780143c6150cfea43fa38eda0ebe5f0d631b5750d1ff03c79ac5024637d271510111b2a62b1bae342d157e8b21ae13489d78dc00678e3eb6f8d618e57361044f408a0ed0e", 0x5d}, {&(0x7f0000002100)="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", 0x1000}, {&(0x7f0000000540)="84160a9361c0f1cb8e829a8b6840aa7982f4f6c4067bcd7e1fe32172b6ed138586e9182858bd800b30b791c9543c654c0e30", 0x32}, {&(0x7f0000000580)="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", 0xff}, {&(0x7f0000000680)="15572a5b9f0410cdb0d212096f4670ff0396c6836c9037034a4bfe3fabbf2667a349c1d3745c4d4c623231057905596d3eb5cd63556988f4a628c836e01e8e160456fd96492d6afab979c785970ed932a3b8a27dabd594779cbd02b36b2df2aa58d674d2f05a0b3142a5fc468b5c2bcd71855c85d713c01a3d6ac4c4ee7c9d50", 0x80}], 0x7, &(0x7f0000000800)=[{0xd0, 0x6, 0x830, "70fb6f6f11dfccbc5beeb67969e222d534f3316e8daa94e7ec2e542a3ba1306da30783f73f8c5fff7f5786f2fb3d8170bf566a1bfd15e89dd5b9f525046a217c39caa600bc2468e14256962843228944f0761e3fa9e4a8d70a6cd293547cadc48a9ab41e72d81c325e3dacf784866fd5f38e1e86fb7c260069ed5dbf7d809d7c52683bb7103055b8cd288e9007397f9da9e3207c657eee6987615692a16bb0f1f625e44d3bb507c6ce5628f50cf5d2d78c22d74019437c0d7b8f41f18f9d"}], 0xd0}, 0x8040014) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000900)=@ipx={0x4, 0x1f, 0x0, "2988598245fc", 0x9}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)="eba12c9c896a7a9b2f642501a3abc8f2dae5557eefadc5bcd92fcc4aac0689a3849206bd37be0e95b48e883e6d74a54f325b2578960cd443bdd2b2d4c5c7d979d368d3e479b5a559020262a88e2baeac936a0d508abeb931fd92a9d58639ddb8aabd10518d41b90011780042305ec32db4f68be0d505583e958830c9dba74538e7c2046afb13c2c9722d0d9169baea54e4244751a0b612cd104c8743965c65e6fecf", 0xa2}, {&(0x7f00000001c0)="5dc5ac2863cabb5a2bcca34fde0ddb1265", 0x11}, {&(0x7f0000000a40)="5d621704ec839b70818f9724c61788f87c89259cf3499865b4ea9ff81eb4f1711887cbfb5343891bf334e7f553c351ec7b3e052e7af73d1937e0116e3b8fdcec7267cae5c0a1ed5613a38db3ef84b2a572", 0x51}, {&(0x7f0000000ac0)="554de16a21814a2aa06fd098c5ad526b9d6442ba5f7d635822517e5e56daa2de24a347a637fe34afe117e409877fe3499eb74a4c78e782a4637e5aa042a9c694e004433e97564f82ca9d8ded240549aea698f9a24100f988492fb4a06da388a24395cc6f2426f3736375ac328005aad617", 0x71}, {&(0x7f0000000b40)="df322d1042a85fc28dc7bd28da269dbed9be41eb6bd318338e2b237a068fa4490929b2721cf0dd731109abac789fbc7c26129e37554d3bca670daf6332363876e3338989d6f0419f6fd03b34374bc04768051606f9b9a6a77f78054b9d5c37f625316a3d74701c2d2928b720b4206c17acfa6d6793fca77168e1bdf498015994abd9", 0x82}, {&(0x7f0000000c00)="32b5c13aae1cd1ac8ef7154c1f99608a7ca689e58b604a7fd1dd235bb11fe9c4e72bb85fb133e522a64e075be3d02414474a50d34e514fd03f9b7cf87fd220420cb5d8771ff32203c4c474d4d269c7a13b8e22042c0a6d4d83f0e56b34e0ba", 0x5f}, {&(0x7f0000000c80)="f21225a8f5779972def7c0f0a74e0508e46db84f8f2be7195e75e15eb281f8293bbbbe721f7b677c4da757c939e486663175618d850254f90591be38f790c4d51a9636b94f28b3230f575ab3702b4eee6f1ce690e5893049798d77a0dff0565fb3caa93d0d275fea2f01c3088fe11486cad039abe27a6f32834cd2012ac9c22bd4b411e1c036f1415b3e76d2204f418169b46dbf14859a1f3b935a0ccb2c3f240b3c243ce8c03c5138a187ebb1694b83122351b2095448ff79a5e3445f78137523120b2754941837910dfba9", 0xcc}, {&(0x7f0000000d80)}], 0x8, &(0x7f0000000e40)=[{0xf8, 0x101, 0x6f, "6533c68ed97ccb470d58d25d09ed0db01ff9283f4104b3c4f01ad8186285594c53e10040d19e60ba2fed1266b65e8129ccfe929f65914559b954d15c5b1912f8cc635ebe10967433728d505daa903fc96602b0ba9e0711d6c6b3f5352afb2db83f26a9db3bf66e8a4593915ce14102941eb2f920e0e45fe72155640f51e2fc9fe0ee5b12a588d37a559f6da081eb03549d88dfb97580555819e2c9622ed34b3741d713928e628608172d0c418ebe6cfde1f6b9ffd88be84fda3b4b84f0e8ef112cb59272601938b34217464e31926119670a8c19ec876e1ef9b2346b2b10c2a2abeaf2e25e86e954"}, {0xd0, 0x6, 0x2, "f49b1856c5b1cb0e5cc377381dadbae2836cf74a60a895c36d3ca9aa6c208fd79ca74bcd15cda1a103aca9cb4d3f65e033d65c12b142bb0667f8b1c210d5f3dcc78ca11b1d32975249c3859f236855855d43d34bb3eba8c0afb52d7f2d59421c37ad0f5f67b3ceef86d02fcad34c7f3f79cfadc10bd69b3a88c89ef19c6946622bd5e6a844f17b2bfec63c9b3d686111c51fc8d55bf859004d24fff83101a8c45b136235b4bb94b4154efe336dfc7ed9449d2c94fcbcd4668a21"}], 0x1c8}, 0x40005) 01:27:14 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 283.717778][ T3112] block nbd3: Attempted send on invalid socket [ 283.724346][ T3112] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 283.725788][T12718] CPU: 0 PID: 12718 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 283.740376][T12728] hpfs: hpfs_map_sector(): read error [ 283.743530][T12718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.743544][T12718] Call Trace: [ 283.743551][T12718] dump_stack_lvl+0xcd/0x134 [ 283.743576][T12718] should_fail.cold+0x5/0xa [ 283.743599][T12718] should_failslab+0x5/0x10 [ 283.775773][T12718] kmem_cache_alloc_bulk+0x4a/0x490 [ 283.780972][T12718] io_submit_sqes+0x7d44/0x9730 [ 283.785818][T12718] ? __fget_files+0x23d/0x3e0 [ 283.790495][T12718] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 283.796208][T12718] __do_sys_io_uring_enter+0xf48/0x1f00 [ 283.801744][T12718] ? io_submit_sqes+0x9730/0x9730 [ 283.806755][T12718] ? rcu_read_lock_sched_held+0xd/0x70 [ 283.812200][T12718] ? lock_acquire+0x442/0x510 [ 283.816869][T12718] ? rcu_read_lock_sched_held+0xd/0x70 [ 283.822311][T12718] ? lock_release+0x522/0x720 [ 283.826975][T12718] ? __context_tracking_exit+0xb8/0xe0 [ 283.832420][T12718] ? lock_downgrade+0x6e0/0x6e0 [ 283.837256][T12718] ? lock_downgrade+0x6e0/0x6e0 [ 283.842093][T12718] ? get_vtime_delta+0x26e/0x420 [ 283.847015][T12718] ? syscall_enter_from_user_mode+0x21/0x70 [ 283.852895][T12718] do_syscall_64+0x35/0xb0 [ 283.857302][T12718] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 283.863184][T12718] RIP: 0033:0x4665f9 [ 283.867061][T12718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 283.886653][T12718] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 283.895196][T12718] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 283.903162][T12718] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 283.911121][T12718] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 283.919080][T12718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.927037][T12718] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 [ 283.950062][ T2044] block nbd4: Attempted send on invalid socket [ 283.956345][ T2044] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 01:27:14 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:14 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 283.957920][ T3112] block nbd0: Attempted send on invalid socket [ 283.968719][T12730] hpfs: hpfs_map_sector(): read error [ 283.973404][ T3112] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 283.995577][T12735] hpfs: hpfs_map_sector(): read error 01:27:14 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:14 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 284.047858][ T3112] block nbd0: Attempted send on invalid socket [ 284.054181][ T3112] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 284.067044][T12740] hpfs: hpfs_map_sector(): read error 01:27:14 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:14 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 284.124180][ T3112] block nbd3: Attempted send on invalid socket [ 284.130371][ T3112] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 284.141234][T12743] hpfs: hpfs_map_sector(): read error 01:27:14 executing program 2 (fault-call:8 fault-nth:1): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) [ 284.190965][ T3112] block nbd4: Attempted send on invalid socket [ 284.197624][ T3112] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 284.215354][T12746] hpfs: hpfs_map_sector(): read error [ 284.219258][ T3112] block nbd3: Attempted send on invalid socket [ 284.226914][ T3112] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 01:27:14 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:14 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:14 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 284.243911][T12751] hpfs: hpfs_map_sector(): read error [ 284.244782][T12752] hpfs: hpfs_map_sector(): read error [ 284.327812][T12754] hpfs: hpfs_map_sector(): read error [ 284.354815][T12755] FAULT_INJECTION: forcing a failure. [ 284.354815][T12755] name failslab, interval 1, probability 0, space 0, times 0 [ 284.367588][T12763] hpfs: hpfs_map_sector(): read error [ 284.383461][T12762] hpfs: hpfs_map_sector(): read error 01:27:14 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x6080, 0x0) 01:27:14 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:14 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:14 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 284.457917][T12765] hpfs: hpfs_map_sector(): read error [ 284.470557][T12755] CPU: 1 PID: 12755 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 284.479019][T12755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.489071][T12755] Call Trace: [ 284.492338][T12755] dump_stack_lvl+0xcd/0x134 [ 284.496922][T12755] should_fail.cold+0x5/0xa [ 284.501418][T12755] should_failslab+0x5/0x10 [ 284.505915][T12755] kmem_cache_alloc_bulk+0x4a/0x490 [ 284.511103][T12755] io_submit_sqes+0x7d44/0x9730 [ 284.515949][T12755] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 284.521656][T12755] __do_sys_io_uring_enter+0xf48/0x1f00 [ 284.527191][T12755] ? io_submit_sqes+0x9730/0x9730 [ 284.532286][T12755] ? rcu_read_lock_sched_held+0xd/0x70 [ 284.537732][T12755] ? lock_acquire+0x442/0x510 [ 284.542394][T12755] ? rcu_read_lock_sched_held+0xd/0x70 [ 284.547837][T12755] ? lock_release+0x522/0x720 [ 284.552498][T12755] ? __context_tracking_exit+0xb8/0xe0 [ 284.557941][T12755] ? lock_downgrade+0x6e0/0x6e0 [ 284.562776][T12755] ? lock_downgrade+0x6e0/0x6e0 [ 284.567611][T12755] ? get_vtime_delta+0x26e/0x420 [ 284.572537][T12755] ? syscall_enter_from_user_mode+0x21/0x70 [ 284.578422][T12755] do_syscall_64+0x35/0xb0 [ 284.582831][T12755] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 284.588713][T12755] RIP: 0033:0x4665f9 [ 284.592680][T12755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 284.612274][T12755] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 284.620673][T12755] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 284.628631][T12755] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 284.636590][T12755] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 284.644550][T12755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 284.652504][T12755] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:15 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2, 0x11, r0, 0x0) 01:27:15 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 284.699054][T12770] hpfs: hpfs_map_sector(): read error [ 284.717180][T12773] hpfs: hpfs_map_sector(): read error [ 284.726244][T12774] hpfs: hpfs_map_sector(): read error 01:27:15 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:15 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 284.757781][T12776] hpfs: hpfs_map_sector(): read error 01:27:15 executing program 2 (fault-call:8 fault-nth:2): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:15 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x2}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:15 executing program 5: clock_gettime(0x8, &(0x7f0000000140)) 01:27:15 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:15 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 284.823688][T12781] hpfs: hpfs_map_sector(): read error 01:27:15 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:15 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x3}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:15 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:15 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:15 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 284.935710][T12800] FAULT_INJECTION: forcing a failure. [ 284.935710][T12800] name failslab, interval 1, probability 0, space 0, times 0 01:27:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7e67477611094adf) [ 285.008011][T12800] CPU: 1 PID: 12800 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 285.016460][T12800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.026509][T12800] Call Trace: [ 285.029775][T12800] dump_stack_lvl+0xcd/0x134 [ 285.034357][T12800] should_fail.cold+0x5/0xa [ 285.038849][T12800] should_failslab+0x5/0x10 [ 285.043344][T12800] kmem_cache_alloc_bulk+0x4a/0x490 [ 285.048534][T12800] io_submit_sqes+0x7d44/0x9730 [ 285.053381][T12800] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 285.059087][T12800] __do_sys_io_uring_enter+0xf48/0x1f00 [ 285.064625][T12800] ? io_submit_sqes+0x9730/0x9730 [ 285.069638][T12800] ? rcu_read_lock_sched_held+0xd/0x70 [ 285.075084][T12800] ? lock_acquire+0x442/0x510 [ 285.079745][T12800] ? rcu_read_lock_sched_held+0xd/0x70 [ 285.085187][T12800] ? lock_release+0x522/0x720 [ 285.089851][T12800] ? __context_tracking_exit+0xb8/0xe0 [ 285.095300][T12800] ? lock_downgrade+0x6e0/0x6e0 [ 285.100134][T12800] ? lock_downgrade+0x6e0/0x6e0 [ 285.104968][T12800] ? get_vtime_delta+0x26e/0x420 [ 285.109898][T12800] ? syscall_enter_from_user_mode+0x21/0x70 [ 285.115780][T12800] do_syscall_64+0x35/0xb0 [ 285.120190][T12800] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 285.126071][T12800] RIP: 0033:0x4665f9 [ 285.129948][T12800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 285.149649][T12800] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 285.158049][T12800] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 285.166007][T12800] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 285.173963][T12800] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 285.181915][T12800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 285.189954][T12800] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:15 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 285.217719][T12815] hpfs: hpfs_map_sector(): read error [ 285.233860][T12817] hpfs: hpfs_map_sector(): read error 01:27:15 executing program 2 (fault-call:8 fault-nth:3): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x44009) 01:27:15 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x4}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:15 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:15 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:15 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 285.287479][T12823] hpfs: hpfs_map_sector(): read error 01:27:15 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x5}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="20000000030705000000000002000000000000000900010073797a3139"], 0x20}}, 0x0) 01:27:15 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 285.368683][T12830] hpfs: hpfs_map_sector(): read error [ 285.387647][T12836] FAULT_INJECTION: forcing a failure. [ 285.387647][T12836] name failslab, interval 1, probability 0, space 0, times 0 [ 285.425673][T12836] CPU: 0 PID: 12836 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 285.433497][T12840] hpfs: hpfs_map_sector(): read error [ 285.434126][T12836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.449519][T12836] Call Trace: [ 285.452799][T12836] dump_stack_lvl+0xcd/0x134 [ 285.457400][T12836] should_fail.cold+0x5/0xa [ 285.461909][T12836] should_failslab+0x5/0x10 [ 285.466416][T12836] kmem_cache_alloc_bulk+0x4a/0x490 [ 285.471617][T12836] io_submit_sqes+0x7d44/0x9730 [ 285.476479][T12836] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 285.482284][T12836] __do_sys_io_uring_enter+0xf48/0x1f00 [ 285.487834][T12836] ? io_submit_sqes+0x9730/0x9730 [ 285.492859][T12836] ? rcu_read_lock_sched_held+0xd/0x70 [ 285.498319][T12836] ? lock_acquire+0x442/0x510 [ 285.502994][T12836] ? rcu_read_lock_sched_held+0xd/0x70 [ 285.508451][T12836] ? lock_release+0x522/0x720 [ 285.513124][T12836] ? __context_tracking_exit+0xb8/0xe0 [ 285.518583][T12836] ? lock_downgrade+0x6e0/0x6e0 [ 285.523434][T12836] ? lock_downgrade+0x6e0/0x6e0 [ 285.528286][T12836] ? get_vtime_delta+0x26e/0x420 [ 285.533224][T12836] ? syscall_enter_from_user_mode+0x21/0x70 [ 285.539115][T12836] do_syscall_64+0x35/0xb0 [ 285.543529][T12836] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 285.549447][T12836] RIP: 0033:0x4665f9 [ 285.553335][T12836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:27:16 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:16 executing program 3: mknod$loop(0x0, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 285.572939][T12836] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 285.581360][T12836] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 285.589513][T12836] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 285.597482][T12836] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 285.605447][T12836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 285.613529][T12836] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:16 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x16103, 0x0) [ 285.719431][T12860] hpfs: hpfs_map_sector(): read error 01:27:16 executing program 2 (fault-call:8 fault-nth:4): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:16 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x6}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:16 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:16 executing program 3: mknod$loop(0x0, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:16 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5d}, 0x14}}, 0x0) 01:27:16 executing program 3: mknod$loop(0x0, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:16 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:16 executing program 5: mbind(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0xc) 01:27:16 executing program 0: mknod$loop(0x0, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:16 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:16 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x7}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 285.857615][T12875] hpfs: hpfs_map_sector(): read error [ 285.937209][T12885] FAULT_INJECTION: forcing a failure. [ 285.937209][T12885] name failslab, interval 1, probability 0, space 0, times 0 [ 285.961304][T12894] hpfs: hpfs_map_sector(): read error [ 285.970097][T12889] hpfs: hpfs_map_sector(): read error [ 286.001189][T12885] CPU: 0 PID: 12885 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 286.009652][T12885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.019714][T12885] Call Trace: [ 286.022992][T12885] dump_stack_lvl+0xcd/0x134 [ 286.027582][T12885] should_fail.cold+0x5/0xa [ 286.032092][T12885] should_failslab+0x5/0x10 [ 286.036603][T12885] kmem_cache_alloc_bulk+0x4a/0x490 [ 286.041814][T12885] io_submit_sqes+0x7d44/0x9730 [ 286.046684][T12885] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 286.052548][T12885] __do_sys_io_uring_enter+0xf48/0x1f00 [ 286.058111][T12885] ? io_submit_sqes+0x9730/0x9730 [ 286.063152][T12885] ? rcu_read_lock_sched_held+0xd/0x70 [ 286.068628][T12885] ? lock_acquire+0x442/0x510 [ 286.073305][T12885] ? rcu_read_lock_sched_held+0xd/0x70 [ 286.078765][T12885] ? lock_release+0x522/0x720 [ 286.083440][T12885] ? __context_tracking_exit+0xb8/0xe0 [ 286.088900][T12885] ? lock_downgrade+0x6e0/0x6e0 [ 286.093750][T12885] ? lock_downgrade+0x6e0/0x6e0 [ 286.098599][T12885] ? get_vtime_delta+0x26e/0x420 [ 286.103534][T12885] ? syscall_enter_from_user_mode+0x21/0x70 [ 286.109428][T12885] do_syscall_64+0x35/0xb0 [ 286.113842][T12885] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 286.119741][T12885] RIP: 0033:0x4665f9 [ 286.123627][T12885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 286.143455][T12885] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 01:27:16 executing program 2 (fault-call:8 fault-nth:5): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:16 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x1, 0x0) 01:27:16 executing program 0: mknod$loop(0x0, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:16 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:16 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 286.151864][T12885] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 286.159834][T12885] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 286.167799][T12885] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 286.175798][T12885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.183791][T12885] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:16 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x8}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:16 executing program 0: mknod$loop(0x0, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:16 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 286.268550][T12916] hpfs: hpfs_map_sector(): read error [ 286.303850][T12923] FAULT_INJECTION: forcing a failure. [ 286.303850][T12923] name failslab, interval 1, probability 0, space 0, times 0 01:27:16 executing program 5: waitid(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigqueueinfo(0x0, 0x3a, &(0x7f0000000900)={0x0, 0x0, 0x80000001}) 01:27:16 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x9}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:16 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 286.306973][T12918] hpfs: hpfs_map_sector(): read error [ 286.365448][T12923] CPU: 1 PID: 12923 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 286.373903][T12923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.386081][T12923] Call Trace: [ 286.389359][T12923] dump_stack_lvl+0xcd/0x134 [ 286.394134][T12923] should_fail.cold+0x5/0xa [ 286.398644][T12923] should_failslab+0x5/0x10 [ 286.403153][T12923] kmem_cache_alloc_bulk+0x4a/0x490 [ 286.408361][T12923] io_submit_sqes+0x7d44/0x9730 [ 286.413227][T12923] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 286.418947][T12923] __do_sys_io_uring_enter+0xf48/0x1f00 [ 286.420702][T12938] hpfs: hpfs_map_sector(): read error [ 286.424583][T12923] ? io_submit_sqes+0x9730/0x9730 [ 286.424606][T12923] ? rcu_read_lock_sched_held+0xd/0x70 [ 286.424624][T12923] ? lock_acquire+0x442/0x510 [ 286.445595][T12923] ? rcu_read_lock_sched_held+0xd/0x70 [ 286.451146][T12923] ? lock_release+0x522/0x720 [ 286.455819][T12923] ? __context_tracking_exit+0xb8/0xe0 [ 286.463097][T12923] ? lock_downgrade+0x6e0/0x6e0 [ 286.467939][T12923] ? lock_downgrade+0x6e0/0x6e0 [ 286.472776][T12923] ? get_vtime_delta+0x26e/0x420 [ 286.477808][T12923] ? syscall_enter_from_user_mode+0x21/0x70 [ 286.483687][T12923] do_syscall_64+0x35/0xb0 [ 286.488095][T12923] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 286.493975][T12923] RIP: 0033:0x4665f9 01:27:17 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 286.497945][T12923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 286.517630][T12923] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 286.526030][T12923] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 286.533988][T12923] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 286.542028][T12923] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 286.549984][T12923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.557945][T12923] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 [ 286.625410][T12945] hpfs: hpfs_map_sector(): read error 01:27:17 executing program 2 (fault-call:8 fault-nth:6): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:17 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xa}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:17 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:17 executing program 5: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_current(r0, 0x0, 0x59) 01:27:17 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:17 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:17 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:17 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000039c0)='fdinfo/3\x00') fcntl$setlease(r0, 0x400, 0x0) preadv(r1, &(0x7f0000003c40)=[{&(0x7f0000003bc0)=""/120, 0x78}], 0x1, 0x0, 0x0) 01:27:17 executing program 4: mknod$loop(0x0, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:17 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xc}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 286.757215][T12960] hpfs: hpfs_map_sector(): read error [ 286.784572][T12966] FAULT_INJECTION: forcing a failure. [ 286.784572][T12966] name failslab, interval 1, probability 0, space 0, times 0 [ 286.822316][T12966] CPU: 0 PID: 12966 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 286.831009][T12966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.841072][T12966] Call Trace: [ 286.844347][T12966] dump_stack_lvl+0xcd/0x134 [ 286.848940][T12966] should_fail.cold+0x5/0xa [ 286.853458][T12966] should_failslab+0x5/0x10 [ 286.857966][T12966] kmem_cache_alloc_bulk+0x4a/0x490 [ 286.863175][T12966] io_submit_sqes+0x7d44/0x9730 [ 286.868130][T12966] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 286.874035][T12966] __do_sys_io_uring_enter+0xf48/0x1f00 [ 286.879596][T12966] ? io_submit_sqes+0x9730/0x9730 [ 286.884717][T12966] ? rcu_read_lock_sched_held+0xd/0x70 [ 286.889136][T12978] hpfs: hpfs_map_sector(): read error [ 286.890182][T12966] ? lock_acquire+0x442/0x510 [ 286.890207][T12966] ? rcu_read_lock_sched_held+0xd/0x70 [ 286.905902][T12966] ? lock_release+0x522/0x720 [ 286.910764][T12966] ? __context_tracking_exit+0xb8/0xe0 [ 286.916227][T12966] ? lock_downgrade+0x6e0/0x6e0 [ 286.921081][T12966] ? lock_downgrade+0x6e0/0x6e0 [ 286.925934][T12966] ? get_vtime_delta+0x26e/0x420 [ 286.930864][T12966] ? syscall_enter_from_user_mode+0x21/0x70 [ 286.936747][T12966] do_syscall_64+0x35/0xb0 [ 286.941154][T12966] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 286.947035][T12966] RIP: 0033:0x4665f9 [ 286.950914][T12966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:27:17 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:17 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xd}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 286.970512][T12966] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 286.979090][T12966] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 286.987135][T12966] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 286.995265][T12966] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 287.003220][T12966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 287.011176][T12966] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:17 executing program 2 (fault-call:8 fault-nth:7): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:17 executing program 4: mknod$loop(0x0, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:17 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 01:27:17 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xf}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:17 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:17 executing program 4: mknod$loop(0x0, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:17 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:17 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x10}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000080)) 01:27:17 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:17 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 287.259802][T13011] FAULT_INJECTION: forcing a failure. [ 287.259802][T13011] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 287.298612][T13017] hpfs: hpfs_map_sector(): read error [ 287.346556][T13011] CPU: 1 PID: 13011 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 287.355273][T13011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.365326][T13011] Call Trace: [ 287.368773][T13011] dump_stack_lvl+0xcd/0x134 [ 287.373542][T13011] should_fail.cold+0x5/0xa [ 287.378247][T13011] prepare_alloc_pages+0x17b/0x580 [ 287.383365][T13011] __alloc_pages+0x12f/0x500 [ 287.388043][T13011] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 287.395108][T13011] ? kasan_save_stack+0x1b/0x40 [ 287.399968][T13011] ? __kasan_slab_alloc+0x83/0xb0 [ 287.404994][T13011] ? kmem_cache_alloc_bulk+0x1ec/0x490 [ 287.410551][T13011] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 287.416361][T13011] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 287.422449][T13011] alloc_pages+0x18c/0x2a0 [ 287.426860][T13011] allocate_slab+0x32e/0x4b0 [ 287.431440][T13011] ___slab_alloc+0x4ba/0x820 [ 287.436016][T13011] ? rcu_read_lock_sched_held+0xd/0x70 [ 287.441464][T13011] ? io_submit_sqes+0x7d44/0x9730 [ 287.446475][T13011] ? rwlock_bug.part.0+0x90/0x90 [ 287.451487][T13011] ? rcu_read_lock_sched_held+0xd/0x70 [ 287.456931][T13011] ? lock_release+0x522/0x720 [ 287.461601][T13011] ? io_submit_sqes+0x274/0x9730 [ 287.466527][T13011] ? kmem_cache_alloc_bulk+0x2b3/0x490 [ 287.472152][T13011] kmem_cache_alloc_bulk+0x2b3/0x490 [ 287.477432][T13011] io_submit_sqes+0x7d44/0x9730 [ 287.482287][T13011] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 287.488012][T13011] __do_sys_io_uring_enter+0xf48/0x1f00 [ 287.493574][T13011] ? io_submit_sqes+0x9730/0x9730 [ 287.498608][T13011] ? rcu_read_lock_sched_held+0xd/0x70 [ 287.504065][T13011] ? lock_acquire+0x442/0x510 [ 287.508763][T13011] ? rcu_read_lock_sched_held+0xd/0x70 [ 287.514293][T13011] ? lock_release+0x522/0x720 [ 287.518958][T13011] ? __context_tracking_exit+0xb8/0xe0 [ 287.524410][T13011] ? lock_downgrade+0x6e0/0x6e0 [ 287.529247][T13011] ? lock_downgrade+0x6e0/0x6e0 [ 287.534848][T13011] ? get_vtime_delta+0x26e/0x420 [ 287.539777][T13011] ? syscall_enter_from_user_mode+0x21/0x70 [ 287.545661][T13011] do_syscall_64+0x35/0xb0 [ 287.550072][T13011] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 287.556044][T13011] RIP: 0033:0x4665f9 [ 287.559927][T13011] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 287.579523][T13011] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 287.588188][T13011] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 287.596407][T13011] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 287.604364][T13011] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 287.612499][T13011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 287.620476][T13011] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:18 executing program 2 (fault-call:8 fault-nth:8): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:18 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x11}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:18 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 01:27:18 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:18 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x0, 0x0, @c}, 0x29, 0xffffffffffffffff) 01:27:18 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) [ 287.658483][T13029] hpfs: hpfs_map_sector(): read error 01:27:18 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:18 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:18 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 01:27:18 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x14}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:18 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) [ 287.789252][T13053] FAULT_INJECTION: forcing a failure. [ 287.789252][T13053] name fail_page_alloc, interval 1, probability 0, space 0, times 0 01:27:18 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) [ 287.852791][T13053] CPU: 1 PID: 13053 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 287.861436][T13053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.871586][T13053] Call Trace: [ 287.874882][T13053] dump_stack_lvl+0xcd/0x134 [ 287.879483][T13053] should_fail.cold+0x5/0xa [ 287.884000][T13053] prepare_alloc_pages+0x17b/0x580 [ 287.889130][T13053] __alloc_pages+0x12f/0x500 [ 287.889632][T13063] hpfs: hpfs_map_sector(): read error [ 287.893730][T13053] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 287.893756][T13053] ? kasan_save_stack+0x1b/0x40 [ 287.893774][T13053] ? __kasan_slab_alloc+0x83/0xb0 [ 287.893795][T13053] ? kmem_cache_alloc_bulk+0x1ec/0x490 [ 287.921411][T13053] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 287.927570][T13053] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 287.934431][T13053] alloc_pages+0x18c/0x2a0 [ 287.939105][T13053] allocate_slab+0x32e/0x4b0 [ 287.943686][T13053] ___slab_alloc+0x4ba/0x820 [ 287.948267][T13053] ? rcu_read_lock_sched_held+0xd/0x70 [ 287.953713][T13053] ? io_submit_sqes+0x7d44/0x9730 [ 287.958988][T13053] ? rwlock_bug.part.0+0x90/0x90 [ 287.963917][T13053] ? rcu_read_lock_sched_held+0xd/0x70 [ 287.969371][T13053] ? lock_release+0x522/0x720 [ 287.974642][T13053] ? io_submit_sqes+0x274/0x9730 [ 287.979570][T13053] ? kmem_cache_alloc_bulk+0x2b3/0x490 [ 287.985024][T13053] kmem_cache_alloc_bulk+0x2b3/0x490 [ 287.990306][T13053] io_submit_sqes+0x7d44/0x9730 [ 287.995243][T13053] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 288.000951][T13053] __do_sys_io_uring_enter+0xf48/0x1f00 [ 288.006491][T13053] ? io_submit_sqes+0x9730/0x9730 [ 288.011505][T13053] ? rcu_read_lock_sched_held+0xd/0x70 [ 288.016950][T13053] ? lock_acquire+0x442/0x510 [ 288.021628][T13053] ? rcu_read_lock_sched_held+0xd/0x70 [ 288.027075][T13053] ? lock_release+0x522/0x720 [ 288.031741][T13053] ? __context_tracking_exit+0xb8/0xe0 [ 288.037274][T13053] ? lock_downgrade+0x6e0/0x6e0 [ 288.042553][T13053] ? lock_downgrade+0x6e0/0x6e0 [ 288.047398][T13053] ? get_vtime_delta+0x26e/0x420 [ 288.052329][T13053] ? syscall_enter_from_user_mode+0x21/0x70 [ 288.058216][T13053] do_syscall_64+0x35/0xb0 [ 288.062639][T13053] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 288.068536][T13053] RIP: 0033:0x4665f9 [ 288.072425][T13053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 288.092030][T13053] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 288.100963][T13053] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 288.108924][T13053] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 288.116887][T13053] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 288.124847][T13053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 288.132808][T13053] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:18 executing program 2 (fault-call:8 fault-nth:9): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:18 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:18 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x23}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:18 executing program 3: mprotect(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0) sigaltstack(&(0x7f0000ffb000/0x4000)=nil, 0x0) 01:27:18 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) mount(&(0x7f0000000000)=@sr0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) 01:27:18 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:18 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:18 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x48}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000002240)={&(0x7f0000002000)=@abs, 0x6e, 0x0}, 0x2002) 01:27:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f00000014c0)=0x3, 0x4) 01:27:18 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 288.388239][T13095] FAULT_INJECTION: forcing a failure. [ 288.388239][T13095] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 288.433883][ T2044] nbd_handle_cmd: 28 callbacks suppressed [ 288.433903][ T2044] block nbd4: Attempted send on invalid socket [ 288.446281][ T2044] print_req_error: 28 callbacks suppressed [ 288.446293][ T2044] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 288.465051][T13098] hpfs: hpfs_map_sector(): read error [ 288.470817][T13095] CPU: 0 PID: 13095 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 288.479239][T13095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.489286][T13095] Call Trace: [ 288.492558][T13095] dump_stack_lvl+0xcd/0x134 [ 288.497472][T13095] should_fail.cold+0x5/0xa [ 288.501972][T13095] prepare_alloc_pages+0x17b/0x580 [ 288.507279][T13095] __alloc_pages+0x12f/0x500 [ 288.512119][T13095] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 288.519129][T13095] ? kasan_save_stack+0x1b/0x40 [ 288.523969][T13095] ? __kasan_slab_alloc+0x83/0xb0 [ 288.529066][T13095] ? kmem_cache_alloc_bulk+0x1ec/0x490 [ 288.534512][T13095] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 288.540218][T13095] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 288.546277][T13095] alloc_pages+0x18c/0x2a0 [ 288.550684][T13095] allocate_slab+0x32e/0x4b0 [ 288.555263][T13095] ___slab_alloc+0x4ba/0x820 [ 288.559859][T13095] ? rcu_read_lock_sched_held+0xd/0x70 [ 288.565303][T13095] ? io_submit_sqes+0x7d44/0x9730 [ 288.570315][T13095] ? rwlock_bug.part.0+0x90/0x90 [ 288.575243][T13095] ? rcu_read_lock_sched_held+0xd/0x70 [ 288.581124][T13095] ? lock_release+0x522/0x720 [ 288.585789][T13095] ? io_submit_sqes+0x274/0x9730 [ 288.590721][T13095] ? kmem_cache_alloc_bulk+0x2b3/0x490 [ 288.596176][T13095] kmem_cache_alloc_bulk+0x2b3/0x490 [ 288.601471][T13095] io_submit_sqes+0x7d44/0x9730 [ 288.606321][T13095] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 288.612029][T13095] __do_sys_io_uring_enter+0xf48/0x1f00 [ 288.617568][T13095] ? io_submit_sqes+0x9730/0x9730 [ 288.622578][T13095] ? rcu_read_lock_sched_held+0xd/0x70 [ 288.628023][T13095] ? lock_acquire+0x442/0x510 [ 288.632687][T13095] ? rcu_read_lock_sched_held+0xd/0x70 [ 288.638129][T13095] ? lock_release+0x522/0x720 [ 288.642790][T13095] ? __context_tracking_exit+0xb8/0xe0 [ 288.648238][T13095] ? lock_downgrade+0x6e0/0x6e0 [ 288.653338][T13095] ? lock_downgrade+0x6e0/0x6e0 [ 288.658180][T13095] ? get_vtime_delta+0x26e/0x420 [ 288.663105][T13095] ? syscall_enter_from_user_mode+0x21/0x70 [ 288.668988][T13095] do_syscall_64+0x35/0xb0 [ 288.673397][T13095] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 288.679462][T13095] RIP: 0033:0x4665f9 [ 288.683346][T13095] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 288.703245][T13095] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 288.711650][T13095] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 288.719605][T13095] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 288.727560][T13095] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 01:27:19 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x4c}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 288.735513][T13095] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 288.743468][T13095] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:19 executing program 2 (fault-call:8 fault-nth:10): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:19 executing program 3: move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fef000/0x4000)=nil], &(0x7f00000000c0), &(0x7f0000000080), 0x0) 01:27:19 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:19 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:19 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) [ 288.869599][T13123] FAULT_INJECTION: forcing a failure. [ 288.869599][T13123] name failslab, interval 1, probability 0, space 0, times 0 [ 288.890859][T13123] CPU: 1 PID: 13123 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 288.899327][T13123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.909393][T13123] Call Trace: [ 288.912675][T13123] dump_stack_lvl+0xcd/0x134 [ 288.917274][T13123] should_fail.cold+0x5/0xa [ 288.921793][T13123] should_failslab+0x5/0x10 [ 288.926308][T13123] kmem_cache_alloc_bulk+0x4a/0x490 [ 288.931523][T13123] io_submit_sqes+0x7d44/0x9730 [ 288.936397][T13123] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 288.942133][T13123] __do_sys_io_uring_enter+0xf48/0x1f00 [ 288.947693][T13123] ? io_submit_sqes+0x9730/0x9730 [ 288.952723][T13123] ? rcu_read_lock_sched_held+0xd/0x70 [ 288.958184][T13123] ? lock_acquire+0x442/0x510 [ 288.962865][T13123] ? rcu_read_lock_sched_held+0xd/0x70 [ 288.968323][T13123] ? lock_release+0x522/0x720 [ 288.973000][T13123] ? __context_tracking_exit+0xb8/0xe0 [ 288.978457][T13123] ? lock_downgrade+0x6e0/0x6e0 [ 288.983306][T13123] ? lock_downgrade+0x6e0/0x6e0 [ 288.988157][T13123] ? get_vtime_delta+0x26e/0x420 [ 288.993091][T13123] ? syscall_enter_from_user_mode+0x21/0x70 [ 288.998983][T13123] do_syscall_64+0x35/0xb0 [ 289.003402][T13123] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 289.009291][T13123] RIP: 0033:0x4665f9 [ 289.013175][T13123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 289.032771][T13123] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 289.041175][T13123] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 289.049131][T13123] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 289.057088][T13123] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 01:27:19 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x60}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:19 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:19 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) [ 289.065044][T13123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 289.072998][T13123] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:19 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0xfffffffffffffe85) 01:27:19 executing program 3: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x46070, 0xffffffffffffffff, 0x0) 01:27:19 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x68}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:19 executing program 2 (fault-call:8 fault-nth:11): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:19 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:19 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 01:27:19 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000680)={&(0x7f0000000280)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000600)=[{&(0x7f00000002c0)="90", 0x1}], 0x1, &(0x7f0000000640)=[@dstaddrv4={0x18, 0x84, 0x7, @private=0xa010102}], 0x18}, 0x0) 01:27:19 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x6c}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:19 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000140), 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 289.301712][T13155] FAULT_INJECTION: forcing a failure. [ 289.301712][T13155] name fail_page_alloc, interval 1, probability 0, space 0, times 0 01:27:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000680)={&(0x7f00000001c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x36}}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000180)="90", 0x1}], 0x1, &(0x7f0000000640)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) [ 289.369710][T13155] CPU: 1 PID: 13155 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 289.378176][T13155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.388240][T13155] Call Trace: [ 289.391523][T13155] dump_stack_lvl+0xcd/0x134 [ 289.396123][T13155] should_fail.cold+0x5/0xa [ 289.400636][T13155] prepare_alloc_pages+0x17b/0x580 [ 289.405761][T13155] __alloc_pages+0x12f/0x500 [ 289.410360][T13155] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 01:27:19 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000740), 0x8) sendmmsg$inet_sctp(r0, &(0x7f0000000180)=[{&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000040)="02", 0x1}], 0x1}], 0x1, 0x0) [ 289.417133][T13155] ? kasan_save_stack+0x1b/0x40 [ 289.421998][T13155] ? __kasan_slab_alloc+0x83/0xb0 [ 289.427031][T13155] ? kmem_cache_alloc_bulk+0x1ec/0x490 [ 289.432504][T13155] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 289.438237][T13155] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 289.444319][T13155] alloc_pages+0x18c/0x2a0 [ 289.448744][T13155] allocate_slab+0x32e/0x4b0 [ 289.453349][T13155] ___slab_alloc+0x4ba/0x820 [ 289.457943][T13155] ? rcu_read_lock_sched_held+0xd/0x70 [ 289.463414][T13155] ? io_submit_sqes+0x7d44/0x9730 01:27:19 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 289.468546][T13155] ? rwlock_bug.part.0+0x90/0x90 [ 289.473602][T13155] ? rcu_read_lock_sched_held+0xd/0x70 [ 289.479162][T13155] ? lock_release+0x522/0x720 [ 289.483844][T13155] ? io_submit_sqes+0x274/0x9730 [ 289.488791][T13155] ? kmem_cache_alloc_bulk+0x2b3/0x490 [ 289.494255][T13155] kmem_cache_alloc_bulk+0x2b3/0x490 [ 289.499549][T13155] io_submit_sqes+0x7d44/0x9730 [ 289.504409][T13155] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 289.510125][T13155] __do_sys_io_uring_enter+0xf48/0x1f00 [ 289.515676][T13155] ? io_submit_sqes+0x9730/0x9730 [ 289.520698][T13155] ? rcu_read_lock_sched_held+0xd/0x70 [ 289.526156][T13155] ? lock_acquire+0x442/0x510 [ 289.530831][T13155] ? rcu_read_lock_sched_held+0xd/0x70 [ 289.536292][T13155] ? lock_release+0x522/0x720 [ 289.540971][T13155] ? __context_tracking_exit+0xb8/0xe0 [ 289.546646][T13155] ? lock_downgrade+0x6e0/0x6e0 [ 289.551501][T13155] ? lock_downgrade+0x6e0/0x6e0 [ 289.556352][T13155] ? get_vtime_delta+0x26e/0x420 [ 289.561295][T13155] ? syscall_enter_from_user_mode+0x21/0x70 01:27:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000040)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000000c0)={[{@shortname_lower}]}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) [ 289.567275][T13155] do_syscall_64+0x35/0xb0 [ 289.571692][T13155] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 289.577586][T13155] RIP: 0033:0x4665f9 [ 289.581477][T13155] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 289.601263][T13155] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 289.609687][T13155] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 289.617660][T13155] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 289.625625][T13155] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 289.633681][T13155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 289.641647][T13155] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 [ 289.678934][T13190] loop3: detected capacity change from 0 to 6 01:27:20 executing program 2 (fault-call:8 fault-nth:12): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:20 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x74}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:20 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 01:27:20 executing program 5: clone(0x80100, 0x0, 0x0, 0x0, 0x0) 01:27:20 executing program 0: keyctl$join(0x17, 0x0) [ 289.747979][T13190] FAT-fs (loop3): Directory bread(block 6) failed 01:27:20 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 01:27:20 executing program 2 (fault-call:8 fault-nth:13): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:20 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x7a}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:20 executing program 5: clock_gettime(0x51aba4aa85190118, 0x0) [ 289.806921][T13210] FAULT_INJECTION: forcing a failure. [ 289.806921][T13210] name failslab, interval 1, probability 0, space 0, times 0 01:27:20 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 01:27:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000540)={'sit0\x00', 0x0}) [ 289.806952][T13210] CPU: 1 PID: 13210 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 289.806974][T13210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.806986][T13210] Call Trace: [ 289.806993][T13210] dump_stack_lvl+0xcd/0x134 [ 289.807017][T13210] should_fail.cold+0x5/0xa [ 289.807043][T13210] should_failslab+0x5/0x10 [ 289.807066][T13210] kmem_cache_alloc_bulk+0x4a/0x490 [ 289.807092][T13210] io_submit_sqes+0x7d44/0x9730 [ 289.807123][T13210] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 289.807145][T13210] __do_sys_io_uring_enter+0xf48/0x1f00 [ 289.807171][T13210] ? io_submit_sqes+0x9730/0x9730 [ 289.807191][T13210] ? rcu_read_lock_sched_held+0xd/0x70 [ 289.807211][T13210] ? lock_acquire+0x442/0x510 [ 289.807231][T13210] ? rcu_read_lock_sched_held+0xd/0x70 [ 289.807250][T13210] ? lock_release+0x522/0x720 [ 289.807269][T13210] ? __context_tracking_exit+0xb8/0xe0 [ 289.807290][T13210] ? lock_downgrade+0x6e0/0x6e0 [ 289.807310][T13210] ? lock_downgrade+0x6e0/0x6e0 [ 289.807332][T13210] ? get_vtime_delta+0x26e/0x420 [ 289.807354][T13210] ? syscall_enter_from_user_mode+0x21/0x70 [ 289.807376][T13210] do_syscall_64+0x35/0xb0 [ 289.807398][T13210] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 289.807419][T13210] RIP: 0033:0x4665f9 [ 289.807433][T13210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 289.807453][T13210] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 289.807474][T13210] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 289.807488][T13210] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 289.807500][T13210] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 289.807513][T13210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 289.807526][T13210] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 [ 289.895846][T13220] FAULT_INJECTION: forcing a failure. [ 289.895846][T13220] name failslab, interval 1, probability 0, space 0, times 0 [ 289.895877][T13220] CPU: 1 PID: 13220 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 289.895907][T13220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.895919][T13220] Call Trace: [ 289.895926][T13220] dump_stack_lvl+0xcd/0x134 [ 289.895951][T13220] should_fail.cold+0x5/0xa [ 289.895977][T13220] should_failslab+0x5/0x10 [ 289.896001][T13220] kmem_cache_alloc_bulk+0x4a/0x490 [ 289.896026][T13220] io_submit_sqes+0x7d44/0x9730 [ 289.896057][T13220] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 289.896079][T13220] __do_sys_io_uring_enter+0xf48/0x1f00 [ 289.896103][T13220] ? io_submit_sqes+0x9730/0x9730 [ 289.896122][T13220] ? rcu_read_lock_sched_held+0xd/0x70 [ 289.896142][T13220] ? lock_acquire+0x442/0x510 [ 289.896163][T13220] ? rcu_read_lock_sched_held+0xd/0x70 [ 289.896182][T13220] ? lock_release+0x522/0x720 [ 289.896201][T13220] ? __context_tracking_exit+0xb8/0xe0 [ 289.896223][T13220] ? lock_downgrade+0x6e0/0x6e0 [ 289.896243][T13220] ? lock_downgrade+0x6e0/0x6e0 [ 289.896264][T13220] ? get_vtime_delta+0x26e/0x420 [ 289.896286][T13220] ? syscall_enter_from_user_mode+0x21/0x70 [ 289.896308][T13220] do_syscall_64+0x35/0xb0 [ 289.896331][T13220] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 289.896354][T13220] RIP: 0033:0x4665f9 [ 289.896369][T13220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 289.896389][T13220] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 289.896409][T13220] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 289.896423][T13220] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 289.896436][T13220] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 289.896449][T13220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 289.896461][T13220] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x161081) ioctl$USBDEVFS_CONTROL(r0, 0x8008551c, &(0x7f0000000000)={0xa1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:27:21 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfe}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:21 executing program 2 (fault-call:8 fault-nth:14): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='statm\x00') sendfile(r0, r2, 0x0, 0x800000080004103) 01:27:21 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f00000015c0)) 01:27:21 executing program 4: keyctl$join(0x15, 0x0) 01:27:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0x3, 0x3ff, 0x100, 0x5}, 0x40) 01:27:21 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xff}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 291.412461][T13250] FAULT_INJECTION: forcing a failure. [ 291.412461][T13250] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 291.456573][T13250] CPU: 1 PID: 13250 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 291.465024][T13250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.475074][T13250] Call Trace: [ 291.478348][T13250] dump_stack_lvl+0xcd/0x134 [ 291.482948][T13250] should_fail.cold+0x5/0xa [ 291.487456][T13250] prepare_alloc_pages+0x17b/0x580 [ 291.493310][T13250] __alloc_pages+0x12f/0x500 [ 291.497904][T13250] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 01:27:22 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000680)={&(0x7f0000000280)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000600)=[{&(0x7f00000002c0)="90", 0x1}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000500)={0x0, 0x10, "8757ca38a4d10c2210d86b162aa762eb"}, &(0x7f0000000340)=0x18) 01:27:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0x40, 0x3ff, 0x100}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r0, 0x0, 0x0}, 0x10) 01:27:22 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f00000030c0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000040)='\b', 0x1}], 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90}], 0x2, 0x0) [ 291.504667][T13250] ? kasan_save_stack+0x1b/0x40 [ 291.509521][T13250] ? __kasan_slab_alloc+0x83/0xb0 [ 291.514548][T13250] ? kmem_cache_alloc_bulk+0x1ec/0x490 [ 291.520110][T13250] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 291.525828][T13250] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 291.531900][T13250] ? _raw_spin_unlock+0x24/0x40 [ 291.536750][T13250] ? get_partial_node.part.0+0x25f/0x330 [ 291.542387][T13250] alloc_pages+0x18c/0x2a0 [ 291.547224][T13250] allocate_slab+0x32e/0x4b0 [ 291.551989][T13250] ___slab_alloc+0x4ba/0x820 [ 291.556578][T13250] ? rcu_read_lock_sched_held+0xd/0x70 [ 291.562038][T13250] ? io_submit_sqes+0x7d44/0x9730 [ 291.567065][T13250] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 291.573330][T13250] ? trace_hardirqs_on+0x5b/0x1c0 [ 291.578360][T13250] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 291.584527][T13250] ? kmem_cache_alloc_bulk+0x2b3/0x490 [ 291.589992][T13250] kmem_cache_alloc_bulk+0x2b3/0x490 [ 291.595275][T13250] io_submit_sqes+0x7d44/0x9730 [ 291.600121][T13250] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 291.605824][T13250] __do_sys_io_uring_enter+0xf48/0x1f00 [ 291.611360][T13250] ? io_submit_sqes+0x9730/0x9730 [ 291.616372][T13250] ? rcu_read_lock_sched_held+0xd/0x70 [ 291.621820][T13250] ? lock_acquire+0x442/0x510 [ 291.626481][T13250] ? rcu_read_lock_sched_held+0xd/0x70 [ 291.632192][T13250] ? lock_release+0x522/0x720 [ 291.636871][T13250] ? __context_tracking_exit+0xb8/0xe0 [ 291.642322][T13250] ? lock_downgrade+0x6e0/0x6e0 [ 291.647160][T13250] ? lock_downgrade+0x6e0/0x6e0 [ 291.652000][T13250] ? get_vtime_delta+0x26e/0x420 [ 291.657363][T13250] ? syscall_enter_from_user_mode+0x21/0x70 [ 291.663254][T13250] do_syscall_64+0x35/0xb0 [ 291.667659][T13250] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 291.673543][T13250] RIP: 0033:0x4665f9 [ 291.677758][T13250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 291.697743][T13250] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 01:27:22 executing program 0: pselect6(0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x989680}, 0x0) [ 291.706149][T13250] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 291.714194][T13250] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 291.722151][T13250] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 291.730109][T13250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 291.738326][T13250] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:22 executing program 2 (fault-call:8 fault-nth:15): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, 0x0, 0x1906}, 0x40) 01:27:22 executing program 0: syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) pselect6(0x40, &(0x7f0000000200), 0x0, &(0x7f0000000280)={0x9}, &(0x7f00000002c0)={0x0, 0x3938700}, 0x0) 01:27:22 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000680)={&(0x7f0000000280)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f00000002c0)="90", 0x1}], 0x1, &(0x7f0000000640)=[@dstaddrv4={0x18, 0x84, 0x7, @remote}], 0x18}, 0x0) 01:27:22 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2, 0x0) 01:27:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) sendmmsg$inet6(r0, &(0x7f0000001580)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c, 0x0, 0x0, &(0x7f0000001600)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @remote}, r2}}}], 0x28}}], 0x1, 0x0) [ 291.885090][T13286] FAULT_INJECTION: forcing a failure. [ 291.885090][T13286] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 291.908630][T13286] CPU: 1 PID: 13286 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 291.917095][T13286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.927283][T13286] Call Trace: [ 291.930556][T13286] dump_stack_lvl+0xcd/0x134 [ 291.935150][T13286] should_fail.cold+0x5/0xa [ 291.939660][T13286] prepare_alloc_pages+0x17b/0x580 [ 291.944788][T13286] __alloc_pages+0x12f/0x500 [ 291.949381][T13286] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 291.956147][T13286] ? kasan_save_stack+0x1b/0x40 [ 291.961088][T13286] ? __kasan_slab_alloc+0x83/0xb0 [ 291.966317][T13286] ? kmem_cache_alloc_bulk+0x1ec/0x490 [ 291.971781][T13286] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 291.977504][T13286] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 291.983755][T13286] ? _raw_spin_unlock+0x24/0x40 [ 291.988598][T13286] ? get_partial_node.part.0+0x25f/0x330 [ 291.994223][T13286] alloc_pages+0x18c/0x2a0 [ 291.998672][T13286] allocate_slab+0x32e/0x4b0 [ 292.003251][T13286] ___slab_alloc+0x4ba/0x820 [ 292.007830][T13286] ? rcu_read_lock_sched_held+0xd/0x70 [ 292.013278][T13286] ? io_submit_sqes+0x7d44/0x9730 [ 292.018295][T13286] ? rwlock_bug.part.0+0x90/0x90 [ 292.023219][T13286] ? rcu_read_lock_sched_held+0xd/0x70 [ 292.028753][T13286] ? lock_release+0x522/0x720 [ 292.033501][T13286] ? io_submit_sqes+0x274/0x9730 [ 292.038432][T13286] ? kmem_cache_alloc_bulk+0x2b3/0x490 [ 292.043885][T13286] kmem_cache_alloc_bulk+0x2b3/0x490 [ 292.049166][T13286] io_submit_sqes+0x7d44/0x9730 [ 292.054013][T13286] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 292.059725][T13286] __do_sys_io_uring_enter+0xf48/0x1f00 [ 292.065266][T13286] ? io_submit_sqes+0x9730/0x9730 [ 292.070283][T13286] ? rcu_read_lock_sched_held+0xd/0x70 [ 292.075735][T13286] ? lock_acquire+0x442/0x510 [ 292.080406][T13286] ? rcu_read_lock_sched_held+0xd/0x70 [ 292.085859][T13286] ? lock_release+0x522/0x720 [ 292.090531][T13286] ? __context_tracking_exit+0xb8/0xe0 [ 292.096158][T13286] ? lock_downgrade+0x6e0/0x6e0 [ 292.101000][T13286] ? lock_downgrade+0x6e0/0x6e0 [ 292.105844][T13286] ? get_vtime_delta+0x26e/0x420 [ 292.110769][T13286] ? syscall_enter_from_user_mode+0x21/0x70 [ 292.116654][T13286] do_syscall_64+0x35/0xb0 [ 292.121061][T13286] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 292.126945][T13286] RIP: 0033:0x4665f9 [ 292.130826][T13286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 292.150428][T13286] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 292.158836][T13286] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 292.166796][T13286] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 292.174753][T13286] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 01:27:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x100}, 0x40) [ 292.182709][T13286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 292.190670][T13286] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0x3, 0x3ff, 0x100, 0x4}, 0x40) 01:27:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000380)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @local}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000040)='o', 0x1}], 0x1}}], 0x1, 0x0) 01:27:22 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockname(r0, 0x0, &(0x7f00000000c0)) [ 292.238747][ T2044] block nbd1: Attempted send on invalid socket [ 292.244998][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 292.257891][T13301] hpfs: hpfs_map_sector(): read error 01:27:22 executing program 2 (fault-call:8 fault-nth:16): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:22 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @remote}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) 01:27:22 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3, 0x0) [ 292.326020][T13307] FAULT_INJECTION: forcing a failure. [ 292.326020][T13307] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 292.350992][T13307] CPU: 0 PID: 13307 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 292.359445][T13307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.369501][T13307] Call Trace: [ 292.372770][T13307] dump_stack_lvl+0xcd/0x134 [ 292.377355][T13307] should_fail.cold+0x5/0xa [ 292.381855][T13307] prepare_alloc_pages+0x17b/0x580 [ 292.386958][T13307] __alloc_pages+0x12f/0x500 [ 292.391538][T13307] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 292.398291][T13307] ? kasan_save_stack+0x1b/0x40 [ 292.403141][T13307] ? __kasan_slab_alloc+0x83/0xb0 [ 292.408153][T13307] ? kmem_cache_alloc_bulk+0x1ec/0x490 [ 292.413601][T13307] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 292.419309][T13307] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 292.425371][T13307] alloc_pages+0x18c/0x2a0 [ 292.429820][T13307] allocate_slab+0x32e/0x4b0 [ 292.434399][T13307] ___slab_alloc+0x4ba/0x820 [ 292.438975][T13307] ? rcu_read_lock_sched_held+0xd/0x70 [ 292.444418][T13307] ? io_submit_sqes+0x7d44/0x9730 [ 292.449430][T13307] ? rwlock_bug.part.0+0x90/0x90 [ 292.454353][T13307] ? rcu_read_lock_sched_held+0xd/0x70 [ 292.459801][T13307] ? lock_release+0x522/0x720 [ 292.464579][T13307] ? io_submit_sqes+0x274/0x9730 [ 292.469507][T13307] ? kmem_cache_alloc_bulk+0x2b3/0x490 [ 292.475067][T13307] kmem_cache_alloc_bulk+0x2b3/0x490 [ 292.480346][T13307] io_submit_sqes+0x7d44/0x9730 [ 292.485197][T13307] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 292.490902][T13307] __do_sys_io_uring_enter+0xf48/0x1f00 [ 292.496441][T13307] ? io_submit_sqes+0x9730/0x9730 [ 292.501451][T13307] ? rcu_read_lock_sched_held+0xd/0x70 [ 292.506898][T13307] ? lock_acquire+0x442/0x510 [ 292.511561][T13307] ? rcu_read_lock_sched_held+0xd/0x70 [ 292.517003][T13307] ? lock_release+0x522/0x720 [ 292.521668][T13307] ? __context_tracking_exit+0xb8/0xe0 [ 292.527114][T13307] ? lock_downgrade+0x6e0/0x6e0 [ 292.531952][T13307] ? lock_downgrade+0x6e0/0x6e0 [ 292.536790][T13307] ? get_vtime_delta+0x26e/0x420 [ 292.541717][T13307] ? syscall_enter_from_user_mode+0x21/0x70 [ 292.547601][T13307] do_syscall_64+0x35/0xb0 [ 292.552099][T13307] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 292.557983][T13307] RIP: 0033:0x4665f9 [ 292.561864][T13307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 292.581460][T13307] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 292.589905][T13307] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 292.597948][T13307] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 292.605989][T13307] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 292.614815][T13307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:27:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x21, 0x0, 0x0) [ 292.622772][T13307] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:23 executing program 5: socketpair(0xa, 0x3, 0x2, &(0x7f00000001c0)) 01:27:23 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f00000000c0), 0x0, &(0x7f0000000180)=ANY=[], 0x29, 0xfffffffffffffffe) 01:27:23 executing program 3: symlinkat(&(0x7f0000006a80)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000006ac0)='./file0\x00') 01:27:23 executing program 2 (fault-call:8 fault-nth:17): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:23 executing program 4: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x80ff0649af6d8daf}, 0x18) [ 292.696993][ T2044] block nbd1: Attempted send on invalid socket [ 292.703554][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 292.718423][T13320] hpfs: hpfs_map_sector(): read error 01:27:23 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000006a40), 0x0, 0x0) ioctl$FBIOGET_CON2FBMAP(r0, 0x460f, &(0x7f0000006b40)) 01:27:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000018c0)={@mcast1, @private1, @local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003}) 01:27:23 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002180), 0x240402, 0x0) mmap$fb(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) [ 292.785036][T13328] FAULT_INJECTION: forcing a failure. [ 292.785036][T13328] name failslab, interval 1, probability 0, space 0, times 0 [ 292.802187][ T3112] block nbd1: Attempted send on invalid socket [ 292.808543][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 292.825051][T13325] hpfs: hpfs_map_sector(): read error [ 292.860149][T13328] CPU: 1 PID: 13328 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 292.868790][T13328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.879200][T13328] Call Trace: [ 292.882476][T13328] dump_stack_lvl+0xcd/0x134 [ 292.887069][T13328] should_fail.cold+0x5/0xa [ 292.891578][T13328] should_failslab+0x5/0x10 [ 292.896085][T13328] kmem_cache_alloc_bulk+0x4a/0x490 [ 292.901292][T13328] io_submit_sqes+0x7d44/0x9730 01:27:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x4, 0x0, 0x0) 01:27:23 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) [ 292.906334][T13328] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 292.912060][T13328] __do_sys_io_uring_enter+0xf48/0x1f00 [ 292.917614][T13328] ? io_submit_sqes+0x9730/0x9730 [ 292.922643][T13328] ? rcu_read_lock_sched_held+0xd/0x70 [ 292.928100][T13328] ? lock_acquire+0x442/0x510 [ 292.932775][T13328] ? rcu_read_lock_sched_held+0xd/0x70 [ 292.938230][T13328] ? lock_release+0x522/0x720 [ 292.942908][T13328] ? __context_tracking_exit+0xb8/0xe0 [ 292.948377][T13328] ? lock_downgrade+0x6e0/0x6e0 [ 292.953241][T13328] ? lock_downgrade+0x6e0/0x6e0 [ 292.958099][T13328] ? get_vtime_delta+0x26e/0x420 [ 292.963041][T13328] ? syscall_enter_from_user_mode+0x21/0x70 [ 292.968938][T13328] do_syscall_64+0x35/0xb0 [ 292.973363][T13328] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 292.979253][T13328] RIP: 0033:0x4665f9 [ 292.983145][T13328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:27:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) 01:27:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @remote}, @mcast1, @mcast2, 0x8f4}) 01:27:23 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4, 0x0) 01:27:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x13, 0x0, 0x0) [ 293.003130][T13328] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 293.011545][T13328] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 293.019888][T13328] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 293.028027][T13328] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 293.035995][T13328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 293.043966][T13328] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000001500)=ANY=[@ANYBLOB="7d01"], 0x17c}}, 0x0) 01:27:23 executing program 2 (fault-call:8 fault-nth:18): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:23 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_buf(r0, 0x21, 0x0, 0x0, 0x0) 01:27:23 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000040)='\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff) 01:27:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd=r4}, 0x0) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:23 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) recvmsg(r0, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000ec0)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) 01:27:23 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x5, 0x0) [ 293.164186][ T2044] block nbd1: Attempted send on invalid socket [ 293.170571][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 293.188451][T13360] hpfs: hpfs_map_sector(): read error 01:27:23 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) connect$can_j1939(r0, 0x0, 0x0) 01:27:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x7, {{0xa, 0x0, 0x0, @mcast1}}, 0x1}, 0x90) [ 293.298801][ T2044] block nbd1: Attempted send on invalid socket [ 293.305102][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 293.316697][T13377] hpfs: hpfs_map_sector(): read error 01:27:23 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6, 0x0) [ 293.355692][T13381] FAULT_INJECTION: forcing a failure. [ 293.355692][T13381] name failslab, interval 1, probability 0, space 0, times 0 [ 293.417895][T13381] CPU: 1 PID: 13381 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 293.426353][T13381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.436419][T13381] Call Trace: [ 293.439703][T13381] dump_stack_lvl+0xcd/0x134 [ 293.444303][T13381] should_fail.cold+0x5/0xa [ 293.448817][T13381] should_failslab+0x5/0x10 [ 293.453327][T13381] kmem_cache_alloc_bulk+0x4a/0x490 [ 293.457233][ T2044] block nbd1: Attempted send on invalid socket [ 293.458563][T13381] io_submit_sqes+0x7d44/0x9730 [ 293.464827][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 293.469557][T13381] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 293.486155][T13381] __do_sys_io_uring_enter+0xf48/0x1f00 [ 293.488498][T13393] hpfs: hpfs_map_sector(): read error [ 293.491715][T13381] ? io_submit_sqes+0x9730/0x9730 [ 293.502094][T13381] ? rcu_read_lock_sched_held+0xd/0x70 [ 293.507561][T13381] ? lock_acquire+0x442/0x510 [ 293.512248][T13381] ? rcu_read_lock_sched_held+0xd/0x70 [ 293.517707][T13381] ? lock_release+0x522/0x720 [ 293.522380][T13381] ? __context_tracking_exit+0xb8/0xe0 [ 293.527834][T13381] ? lock_downgrade+0x6e0/0x6e0 [ 293.532673][T13381] ? lock_downgrade+0x6e0/0x6e0 [ 293.537510][T13381] ? get_vtime_delta+0x26e/0x420 [ 293.542433][T13381] ? syscall_enter_from_user_mode+0x21/0x70 [ 293.548401][T13381] do_syscall_64+0x35/0xb0 [ 293.552810][T13381] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 293.558700][T13381] RIP: 0033:0x4665f9 [ 293.562587][T13381] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 293.583310][T13381] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 293.591712][T13381] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 293.599679][T13381] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 293.607642][T13381] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 01:27:24 executing program 0: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000100)) 01:27:24 executing program 5: clock_gettime(0x3, &(0x7f00000013c0)) 01:27:24 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x800}], 0x1) [ 293.615689][T13381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 293.623650][T13381] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 [ 293.651674][ T3112] block nbd1: Attempted send on invalid socket [ 293.658638][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 01:27:24 executing program 2 (fault-call:8 fault-nth:19): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:24 executing program 4: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100), 0xffffff8a) 01:27:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x33, 0x0, 0x0) 01:27:24 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7, 0x0) 01:27:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010400000000000000002e"], 0x3c}}, 0x0) [ 293.707492][T13397] hpfs: hpfs_map_sector(): read error 01:27:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e840)={0x0, 0x1, &(0x7f000000de40)=@raw=[@call], &(0x7f000000de80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 01:27:24 executing program 3: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) [ 293.804789][T13409] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 293.821629][T13413] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 293.829321][ T2044] block nbd1: Attempted send on invalid socket [ 293.837403][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 293.846894][T13417] FAULT_INJECTION: forcing a failure. [ 293.846894][T13417] name failslab, interval 1, probability 0, space 0, times 0 [ 293.849642][T13412] hpfs: hpfs_map_sector(): read error [ 293.887173][T13417] CPU: 0 PID: 13417 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 293.895695][T13417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.903516][ T3112] block nbd1: Attempted send on invalid socket [ 293.905771][T13417] Call Trace: [ 293.905779][T13417] dump_stack_lvl+0xcd/0x134 [ 293.905805][T13417] should_fail.cold+0x5/0xa [ 293.911949][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 293.915202][T13417] should_failslab+0x5/0x10 [ 293.915225][T13417] kmem_cache_alloc_bulk+0x4a/0x490 [ 293.915248][T13417] io_submit_sqes+0x7d44/0x9730 [ 293.935923][T13419] hpfs: hpfs_map_sector(): read error [ 293.939930][T13417] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 293.939960][T13417] __do_sys_io_uring_enter+0xf48/0x1f00 [ 293.966956][T13417] ? io_submit_sqes+0x9730/0x9730 [ 293.971995][T13417] ? rcu_read_lock_sched_held+0xd/0x70 [ 293.977458][T13417] ? lock_acquire+0x442/0x510 [ 293.982221][T13417] ? rcu_read_lock_sched_held+0xd/0x70 [ 293.987677][T13417] ? lock_release+0x522/0x720 [ 293.992349][T13417] ? __context_tracking_exit+0xb8/0xe0 [ 293.997805][T13417] ? lock_downgrade+0x6e0/0x6e0 [ 294.002654][T13417] ? lock_downgrade+0x6e0/0x6e0 [ 294.007591][T13417] ? get_vtime_delta+0x26e/0x420 [ 294.012529][T13417] ? syscall_enter_from_user_mode+0x21/0x70 [ 294.018462][T13417] do_syscall_64+0x35/0xb0 [ 294.022903][T13417] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 294.028829][T13417] RIP: 0033:0x4665f9 [ 294.032749][T13417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:27:24 executing program 0: syz_open_dev$sndmidi(&(0x7f0000000000), 0x0, 0x210080) 01:27:24 executing program 4: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000001c0)={0x0, @pix_mp}) 01:27:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x12, 0x0, 0x0) 01:27:24 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 01:27:24 executing program 3: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0}, 0x20) [ 294.052528][T13417] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 294.060949][T13417] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 294.070019][T13417] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 294.078191][T13417] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 294.086195][T13417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 294.094163][T13417] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:24 executing program 2 (fault-call:8 fault-nth:20): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x4b, 0x0, 0x0) 01:27:24 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8, 0x0) 01:27:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 294.225927][ T2044] block nbd1: Attempted send on invalid socket [ 294.229114][T13440] FAULT_INJECTION: forcing a failure. [ 294.229114][T13440] name failslab, interval 1, probability 0, space 0, times 0 [ 294.232474][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 294.256456][T13438] hpfs: hpfs_map_sector(): read error [ 294.264877][T13440] CPU: 1 PID: 13440 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 294.273486][T13440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.283528][T13440] Call Trace: [ 294.286790][T13440] dump_stack_lvl+0xcd/0x134 [ 294.291372][T13440] should_fail.cold+0x5/0xa [ 294.295951][T13440] ? io_timeout_prep+0x69c/0x8b0 [ 294.301051][T13440] should_failslab+0x5/0x10 [ 294.305543][T13440] __kmalloc+0x72/0x330 [ 294.309690][T13440] io_timeout_prep+0x69c/0x8b0 [ 294.314440][T13440] io_submit_sqes+0x4a36/0x9730 [ 294.319495][T13440] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 294.325227][T13440] __do_sys_io_uring_enter+0xf48/0x1f00 [ 294.330767][T13440] ? io_submit_sqes+0x9730/0x9730 [ 294.335908][T13440] ? rcu_read_lock_sched_held+0xd/0x70 [ 294.341355][T13440] ? lock_acquire+0x442/0x510 [ 294.346022][T13440] ? rcu_read_lock_sched_held+0xd/0x70 [ 294.351677][T13440] ? lock_release+0x522/0x720 [ 294.356341][T13440] ? __context_tracking_exit+0xb8/0xe0 [ 294.361824][T13440] ? lock_downgrade+0x6e0/0x6e0 [ 294.366786][T13440] ? lock_downgrade+0x6e0/0x6e0 [ 294.371802][T13440] ? get_vtime_delta+0x26e/0x420 [ 294.376726][T13440] ? syscall_enter_from_user_mode+0x21/0x70 [ 294.382610][T13440] do_syscall_64+0x35/0xb0 [ 294.387017][T13440] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 294.392903][T13440] RIP: 0033:0x4665f9 [ 294.396782][T13440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 294.416376][T13440] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 01:27:24 executing program 0: pselect6(0xd1, 0x0, 0x0, 0x0, 0x0, 0x0) 01:27:24 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 01:27:24 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) fsmount(r0, 0x0, 0x0) [ 294.424865][T13440] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 294.432820][T13440] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 294.440773][T13440] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 294.448727][T13440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 294.456683][T13440] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:25 executing program 5: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) 01:27:25 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) [ 294.568303][ T3112] block nbd1: Attempted send on invalid socket [ 294.574709][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 294.587989][T13444] hpfs: hpfs_map_sector(): read error 01:27:25 executing program 5: r0 = io_uring_setup(0x4d33, &(0x7f00000000c0)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000180)=r1, 0x1) 01:27:25 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x5}, &(0x7f0000000040)={0x3}, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0x6]}, 0x8}) 01:27:25 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000001580)) 01:27:25 executing program 2 (fault-call:8 fault-nth:21): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:25 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c92", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 01:27:25 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, 0x0) 01:27:25 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) [ 294.847717][T13474] FAULT_INJECTION: forcing a failure. [ 294.847717][T13474] name failslab, interval 1, probability 0, space 0, times 0 [ 294.881028][T13474] CPU: 0 PID: 13474 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 294.889467][T13474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.899856][T13474] Call Trace: [ 294.903130][T13474] dump_stack_lvl+0xcd/0x134 [ 294.907724][T13474] should_fail.cold+0x5/0xa [ 294.912265][T13474] should_failslab+0x5/0x10 [ 294.916861][T13474] kmem_cache_alloc_bulk+0x4a/0x490 [ 294.922171][T13474] io_submit_sqes+0x7d44/0x9730 [ 294.927117][T13474] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 294.932836][T13474] __do_sys_io_uring_enter+0xf48/0x1f00 [ 294.938393][T13474] ? io_submit_sqes+0x9730/0x9730 [ 294.943415][T13474] ? rcu_read_lock_sched_held+0xd/0x70 [ 294.948871][T13474] ? lock_acquire+0x442/0x510 [ 294.953547][T13474] ? rcu_read_lock_sched_held+0xd/0x70 [ 294.959006][T13474] ? lock_release+0x522/0x720 [ 294.963683][T13474] ? __context_tracking_exit+0xb8/0xe0 [ 294.969144][T13474] ? lock_downgrade+0x6e0/0x6e0 [ 294.973995][T13474] ? lock_downgrade+0x6e0/0x6e0 [ 294.979284][T13474] ? get_vtime_delta+0x26e/0x420 [ 294.984309][T13474] ? syscall_enter_from_user_mode+0x21/0x70 [ 294.990207][T13474] do_syscall_64+0x35/0xb0 [ 294.994637][T13474] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 295.000536][T13474] RIP: 0033:0x4665f9 [ 295.004515][T13474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 295.024128][T13474] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 295.032528][T13474] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 295.040571][T13474] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 295.048735][T13474] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 295.056701][T13474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 295.064980][T13474] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004a00)=[{{0x0, 0x0, &(0x7f00000042c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) 01:27:25 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f000000df40)={0x0}, 0x10) 01:27:25 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) 01:27:25 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x9, 0x0) 01:27:25 executing program 2 (fault-call:8 fault-nth:22): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_INTERFACE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0xffffff7f}}, 0x0) 01:27:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2, 0x0, 0x0) [ 295.482630][ T3112] block nbd1: Attempted send on invalid socket [ 295.488944][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 295.504940][T13491] hpfs: hpfs_map_sector(): read error [ 295.525603][T13495] FAULT_INJECTION: forcing a failure. 01:27:26 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$CAPI_INSTALLED(r0, 0x80024322) 01:27:26 executing program 4: syz_genetlink_get_family_id$fou(&(0x7f00000003c0), 0xffffffffffffffff) [ 295.525603][T13495] name failslab, interval 1, probability 0, space 0, times 0 [ 295.534776][ T3112] block nbd1: Attempted send on invalid socket [ 295.544865][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 295.567191][T13497] hpfs: hpfs_map_sector(): read error [ 295.584049][T13495] CPU: 1 PID: 13495 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 295.592595][T13495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.602739][T13495] Call Trace: [ 295.606015][T13495] dump_stack_lvl+0xcd/0x134 [ 295.610611][T13495] should_fail.cold+0x5/0xa [ 295.615123][T13495] should_failslab+0x5/0x10 [ 295.619631][T13495] kmem_cache_alloc_bulk+0x4a/0x490 [ 295.624830][T13495] io_submit_sqes+0x7d44/0x9730 [ 295.629684][T13495] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 295.635481][T13495] __do_sys_io_uring_enter+0xf48/0x1f00 [ 295.641108][T13495] ? io_submit_sqes+0x9730/0x9730 [ 295.646154][T13495] ? rcu_read_lock_sched_held+0xd/0x70 [ 295.651691][T13495] ? lock_acquire+0x442/0x510 [ 295.656391][T13495] ? rcu_read_lock_sched_held+0xd/0x70 [ 295.661928][T13495] ? lock_release+0x522/0x720 [ 295.666597][T13495] ? __context_tracking_exit+0xb8/0xe0 [ 295.672045][T13495] ? lock_downgrade+0x6e0/0x6e0 [ 295.677147][T13495] ? lock_downgrade+0x6e0/0x6e0 [ 295.682092][T13495] ? get_vtime_delta+0x26e/0x420 [ 295.687975][T13495] ? syscall_enter_from_user_mode+0x21/0x70 [ 295.694388][T13495] do_syscall_64+0x35/0xb0 [ 295.698799][T13495] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 295.704732][T13495] RIP: 0033:0x4665f9 [ 295.708612][T13495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 295.728939][T13495] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 295.737546][T13495] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 295.745506][T13495] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 295.753546][T13495] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 295.761505][T13495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 295.769459][T13495] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x23, 0x0, 0x0) 01:27:28 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa, 0x0) 01:27:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e840)={0x0, 0x0, 0x0, &(0x7f000000de80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 01:27:28 executing program 2 (fault-call:8 fault-nth:23): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:28 executing program 5: openat$fb0(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) 01:27:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644", 0x54}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 01:27:28 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) recvmmsg(r0, &(0x7f00000011c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 297.841180][T13522] FAULT_INJECTION: forcing a failure. [ 297.841180][T13522] name failslab, interval 1, probability 0, space 0, times 0 [ 297.846645][ T2044] block nbd1: Attempted send on invalid socket [ 297.860412][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 297.878179][T13522] CPU: 0 PID: 13522 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 297.879499][T13526] hpfs: hpfs_map_sector(): read error [ 297.886649][T13522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.886665][T13522] Call Trace: [ 297.886674][T13522] dump_stack_lvl+0xcd/0x134 [ 297.886702][T13522] should_fail.cold+0x5/0xa [ 297.886724][T13522] should_failslab+0x5/0x10 [ 297.886743][T13522] kmem_cache_alloc_bulk+0x4a/0x490 [ 297.886766][T13522] io_submit_sqes+0x7d44/0x9730 [ 297.886795][T13522] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 297.886814][T13522] __do_sys_io_uring_enter+0xf48/0x1f00 [ 297.921018][ T3112] block nbd1: Attempted send on invalid socket [ 297.925424][T13522] ? io_submit_sqes+0x9730/0x9730 [ 297.925453][T13522] ? rcu_read_lock_sched_held+0xd/0x70 [ 297.925473][T13522] ? lock_acquire+0x442/0x510 [ 297.930334][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 297.936001][T13522] ? rcu_read_lock_sched_held+0xd/0x70 [ 297.936023][T13522] ? lock_release+0x522/0x720 [ 297.941971][T13533] hpfs: hpfs_map_sector(): read error [ 297.947664][T13522] ? __context_tracking_exit+0xb8/0xe0 [ 297.947690][T13522] ? lock_downgrade+0x6e0/0x6e0 [ 297.947710][T13522] ? lock_downgrade+0x6e0/0x6e0 [ 297.947732][T13522] ? get_vtime_delta+0x26e/0x420 [ 298.009203][T13522] ? syscall_enter_from_user_mode+0x21/0x70 [ 298.015094][T13522] do_syscall_64+0x35/0xb0 [ 298.019502][T13522] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 298.025476][T13522] RIP: 0033:0x4665f9 [ 298.029355][T13522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 298.048952][T13522] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 298.057353][T13522] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 298.065309][T13522] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 298.073351][T13522] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 298.081393][T13522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:27:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 01:27:28 executing program 5: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x3}, 0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={[0x6]}, 0x8}) [ 298.089371][T13522] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:28 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x8}, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) 01:27:28 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x12003, &(0x7f0000003d80)={0x0, 0x3938700}) 01:27:28 executing program 2 (fault-call:8 fault-nth:24): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:28 executing program 5: socketpair(0x2, 0x2, 0x0, &(0x7f00000001c0)) 01:27:28 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc, 0x0) 01:27:28 executing program 0: fsopen(&(0x7f0000000000)='fuseblk\x00', 0x0) 01:27:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, 0x0, 0x108) 01:27:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 298.255392][T13552] FAULT_INJECTION: forcing a failure. [ 298.255392][T13552] name failslab, interval 1, probability 0, space 0, times 0 [ 298.294970][T13560] hpfs: hpfs_map_sector(): read error [ 298.300839][T13552] CPU: 0 PID: 13552 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 298.309266][T13552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.319327][T13552] Call Trace: [ 298.322600][T13552] dump_stack_lvl+0xcd/0x134 [ 298.328075][T13552] should_fail.cold+0x5/0xa [ 298.332677][T13552] should_failslab+0x5/0x10 [ 298.337187][T13552] kmem_cache_alloc_bulk+0x4a/0x490 [ 298.342399][T13552] io_submit_sqes+0x7d44/0x9730 [ 298.347264][T13552] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 298.352983][T13552] __do_sys_io_uring_enter+0xf48/0x1f00 [ 298.358542][T13552] ? io_submit_sqes+0x9730/0x9730 [ 298.363577][T13552] ? rcu_read_lock_sched_held+0xd/0x70 [ 298.369042][T13552] ? lock_acquire+0x442/0x510 [ 298.373722][T13552] ? rcu_read_lock_sched_held+0xd/0x70 [ 298.379187][T13552] ? lock_release+0x522/0x720 [ 298.383987][T13552] ? __context_tracking_exit+0xb8/0xe0 [ 298.389452][T13552] ? lock_downgrade+0x6e0/0x6e0 [ 298.394597][T13552] ? lock_downgrade+0x6e0/0x6e0 [ 298.399623][T13552] ? get_vtime_delta+0x26e/0x420 [ 298.404563][T13552] ? syscall_enter_from_user_mode+0x21/0x70 [ 298.410554][T13552] do_syscall_64+0x35/0xb0 [ 298.415000][T13552] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 298.421060][T13552] RIP: 0033:0x4665f9 [ 298.424952][T13552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 298.444568][T13552] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 298.452983][T13552] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 298.461344][T13552] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 298.469407][T13552] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 298.477404][T13552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 298.485370][T13552] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:31 executing program 5: syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) bind$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) 01:27:31 executing program 3: socketpair(0x2a, 0x0, 0x0, &(0x7f0000000000)) 01:27:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x4a, 0x0, 0x0) 01:27:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x16, 0x0, 0x0) 01:27:31 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xd, 0x0) 01:27:31 executing program 2 (fault-call:8 fault-nth:25): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) [ 300.880563][T13585] FAULT_INJECTION: forcing a failure. [ 300.880563][T13585] name failslab, interval 1, probability 0, space 0, times 0 [ 300.905471][ T3112] nbd_handle_cmd: 1 callbacks suppressed [ 300.905491][ T3112] block nbd1: Attempted send on invalid socket [ 300.917829][ T3112] print_req_error: 1 callbacks suppressed 01:27:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc048b65d8b4ac2cab5c660000", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x90}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}], 0x1, 0x0) 01:27:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x18, 0x0, 0x0) [ 300.917842][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 300.929461][T13585] CPU: 0 PID: 13585 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 300.943159][T13585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.949849][T13587] hpfs: hpfs_map_sector(): read error [ 300.953221][T13585] Call Trace: [ 300.953232][T13585] dump_stack_lvl+0xcd/0x134 [ 300.953258][T13585] should_fail.cold+0x5/0xa [ 300.953279][T13585] should_failslab+0x5/0x10 01:27:31 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000), 0x6, 0x0) [ 300.975738][T13585] kmem_cache_alloc_bulk+0x4a/0x490 [ 300.981563][T13585] io_submit_sqes+0x7d44/0x9730 [ 300.986436][T13585] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 300.992202][T13585] __do_sys_io_uring_enter+0xf48/0x1f00 [ 300.997865][T13585] ? io_submit_sqes+0x9730/0x9730 [ 301.002912][T13585] ? rcu_read_lock_sched_held+0xd/0x70 [ 301.008380][T13585] ? lock_acquire+0x442/0x510 [ 301.013066][T13585] ? rcu_read_lock_sched_held+0xd/0x70 [ 301.018532][T13585] ? lock_release+0x522/0x720 [ 301.023217][T13585] ? __context_tracking_exit+0xb8/0xe0 [ 301.028682][T13585] ? lock_downgrade+0x6e0/0x6e0 [ 301.033538][T13585] ? lock_downgrade+0x6e0/0x6e0 [ 301.038391][T13585] ? get_vtime_delta+0x26e/0x420 [ 301.043333][T13585] ? syscall_enter_from_user_mode+0x21/0x70 [ 301.049231][T13585] do_syscall_64+0x35/0xb0 [ 301.053656][T13585] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 301.059555][T13585] RIP: 0033:0x4665f9 01:27:31 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockname(r0, 0x0, &(0x7f0000000000)) [ 301.063450][T13585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 301.083239][T13585] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 301.091669][T13585] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 301.099647][T13585] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 301.107623][T13585] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 301.115608][T13585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 301.123587][T13585] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:31 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) [ 301.154388][ T2044] block nbd1: Attempted send on invalid socket [ 301.160753][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 301.172486][T13604] hpfs: hpfs_map_sector(): read error 01:27:31 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe, 0x0) 01:27:31 executing program 3: semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000000)=""/4) 01:27:31 executing program 5: open$dir(&(0x7f00000000c0)='./file0\x00', 0x101001, 0x0) 01:27:31 executing program 2 (fault-call:8 fault-nth:26): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) [ 301.302135][ T2044] block nbd1: Attempted send on invalid socket [ 301.308549][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 301.321283][T13615] hpfs: hpfs_map_sector(): read error 01:27:31 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) accept$alg(r0, 0x0, 0x0) 01:27:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={0x0}}, 0x0) 01:27:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x36, 0x0, 0x0) 01:27:31 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf, 0x0) 01:27:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000140)={'syztnl2\x00', 0x0}) 01:27:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000240)) [ 301.397232][ T3112] block nbd1: Attempted send on invalid socket [ 301.403563][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 301.419417][T13618] hpfs: hpfs_map_sector(): read error 01:27:31 executing program 0: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000002040), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 301.482462][T13631] FAULT_INJECTION: forcing a failure. [ 301.482462][T13631] name failslab, interval 1, probability 0, space 0, times 0 01:27:32 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000006a40), 0x200001, 0x0) ioctl$FBIOGET_CON2FBMAP(r0, 0x460f, 0x0) 01:27:32 executing program 0: fsopen(&(0x7f0000001c80)='xfs\x00', 0x0) [ 301.528331][ T2044] block nbd1: Attempted send on invalid socket [ 301.534586][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 301.552470][T13640] hpfs: hpfs_map_sector(): read error [ 301.563077][T13631] CPU: 0 PID: 13631 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 01:27:32 executing program 3: r0 = fsopen(&(0x7f0000000000)='pstore\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f00000000c0)='\x00', &(0x7f0000000100)="9a", 0x1) [ 301.571507][T13631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.581675][T13631] Call Trace: [ 301.584948][T13631] dump_stack_lvl+0xcd/0x134 [ 301.589543][T13631] should_fail.cold+0x5/0xa [ 301.594051][T13631] should_failslab+0x5/0x10 [ 301.598555][T13631] kmem_cache_alloc_bulk+0x4a/0x490 [ 301.603751][T13631] io_submit_sqes+0x7d44/0x9730 [ 301.608612][T13631] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 301.614327][T13631] __do_sys_io_uring_enter+0xf48/0x1f00 [ 301.619864][T13631] ? io_submit_sqes+0x9730/0x9730 [ 301.624878][T13631] ? rcu_read_lock_sched_held+0xd/0x70 [ 301.630413][T13631] ? lock_acquire+0x442/0x510 [ 301.635075][T13631] ? rcu_read_lock_sched_held+0xd/0x70 [ 301.640606][T13631] ? lock_release+0x522/0x720 [ 301.645267][T13631] ? __context_tracking_exit+0xb8/0xe0 [ 301.650920][T13631] ? lock_downgrade+0x6e0/0x6e0 [ 301.655754][T13631] ? lock_downgrade+0x6e0/0x6e0 [ 301.660593][T13631] ? get_vtime_delta+0x26e/0x420 [ 301.665516][T13631] ? syscall_enter_from_user_mode+0x21/0x70 [ 301.671397][T13631] do_syscall_64+0x35/0xb0 [ 301.675804][T13631] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 301.681884][T13631] RIP: 0033:0x4665f9 [ 301.685945][T13631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 301.705566][T13631] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 301.713993][T13631] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 301.721953][T13631] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 301.729911][T13631] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 301.737973][T13631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 301.746191][T13631] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:32 executing program 2 (fault-call:8 fault-nth:27): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, 0x0) 01:27:32 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) 01:27:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000380)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @local}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000040)='o', 0x1}, {&(0x7f0000000140)="93", 0x1}, {&(0x7f0000000200)="86", 0x1}], 0x3}}], 0x1, 0x0) 01:27:32 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x10, 0x0) 01:27:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x1d, 0x0, 0x0) [ 301.891676][ T2044] block nbd1: Attempted send on invalid socket [ 301.898706][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 301.912421][T13661] hpfs: hpfs_map_sector(): read error 01:27:32 executing program 0: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$FBIOGET_CON2FBMAP(r0, 0x460f, &(0x7f0000000440)={0x2a}) [ 301.939119][T13669] FAULT_INJECTION: forcing a failure. [ 301.939119][T13669] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 301.961053][ T3112] block nbd1: Attempted send on invalid socket [ 301.967539][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 01:27:32 executing program 4: sched_rr_get_interval(0x0, &(0x7f00000003c0)) 01:27:32 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 01:27:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x401, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 301.988671][T13667] hpfs: hpfs_map_sector(): read error [ 302.054590][T13669] CPU: 1 PID: 13669 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 302.064198][T13669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.074799][T13669] Call Trace: [ 302.078070][T13669] dump_stack_lvl+0xcd/0x134 [ 302.082666][T13669] should_fail.cold+0x5/0xa [ 302.087176][T13669] prepare_alloc_pages+0x17b/0x580 [ 302.092289][T13669] ? stack_trace_consume_entry+0x160/0x160 [ 302.098741][T13669] __alloc_pages+0x12f/0x500 01:27:32 executing program 3: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x8}, 0x0, 0x0, 0x0) 01:27:32 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x11, 0x0) [ 302.103330][T13669] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 302.110092][T13669] ? kasan_save_stack+0x1b/0x40 [ 302.114944][T13669] ? __kasan_slab_alloc+0x83/0xb0 [ 302.119972][T13669] ? kmem_cache_alloc_bulk+0x1ec/0x490 [ 302.125431][T13669] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 302.131151][T13669] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 302.137306][T13669] ? rwlock_bug.part.0+0x90/0x90 [ 302.142497][T13669] ? rcu_read_lock_sched_held+0xd/0x70 [ 302.147316][ T2044] block nbd1: Attempted send on invalid socket [ 302.147954][T13669] ? lock_acquire+0x442/0x510 [ 302.147978][T13669] alloc_pages+0x18c/0x2a0 [ 302.154167][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 302.158804][T13669] allocate_slab+0x32e/0x4b0 [ 302.174361][T13683] hpfs: hpfs_map_sector(): read error [ 302.178816][T13669] ___slab_alloc+0x4ba/0x820 [ 302.178841][T13669] ? rcu_read_lock_sched_held+0xd/0x70 [ 302.194209][T13669] ? io_submit_sqes+0x7d44/0x9730 [ 302.199249][T13669] ? lock_downgrade+0x6e0/0x6e0 [ 302.204115][T13669] ? kmem_cache_alloc_bulk+0x2b3/0x490 [ 302.209581][T13669] kmem_cache_alloc_bulk+0x2b3/0x490 [ 302.214883][T13669] io_submit_sqes+0x7d44/0x9730 [ 302.219750][T13669] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 302.225473][T13669] __do_sys_io_uring_enter+0xf48/0x1f00 [ 302.231035][T13669] ? io_submit_sqes+0x9730/0x9730 [ 302.236064][T13669] ? rcu_read_lock_sched_held+0xd/0x70 [ 302.241529][T13669] ? lock_acquire+0x442/0x510 [ 302.246212][T13669] ? rcu_read_lock_sched_held+0xd/0x70 [ 302.251672][T13669] ? lock_release+0x522/0x720 [ 302.256439][T13669] ? __context_tracking_exit+0xb8/0xe0 [ 302.261900][T13669] ? lock_downgrade+0x6e0/0x6e0 [ 302.266838][T13669] ? lock_downgrade+0x6e0/0x6e0 [ 302.271696][T13669] ? get_vtime_delta+0x26e/0x420 [ 302.276639][T13669] ? syscall_enter_from_user_mode+0x21/0x70 [ 302.282543][T13669] do_syscall_64+0x35/0xb0 [ 302.286974][T13669] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 302.292892][T13669] RIP: 0033:0x4665f9 [ 302.296790][T13669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 302.316581][T13669] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 302.325337][T13669] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 302.333316][T13669] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 302.341294][T13669] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 302.349536][T13669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 302.357529][T13669] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:32 executing program 2 (fault-call:8 fault-nth:28): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:32 executing program 3: open$dir(0x0, 0x438200, 0x0) 01:27:32 executing program 4: socketpair(0x11, 0xa, 0x7f, &(0x7f0000000080)) 01:27:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x48, 0x0, 0x0) 01:27:32 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x14, 0x0) 01:27:32 executing program 0: pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 01:27:33 executing program 3: syz_open_dev$audion(&(0x7f0000000040), 0xffffffffffffffff, 0x200200) 01:27:33 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x280200, 0x0) [ 302.500493][T13701] FAULT_INJECTION: forcing a failure. [ 302.500493][T13701] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 302.515994][ T3112] block nbd1: Attempted send on invalid socket [ 302.522555][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 01:27:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) [ 302.550977][T13704] hpfs: hpfs_map_sector(): read error 01:27:33 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, 0x0, 0x0) [ 302.618239][ T2044] block nbd1: Attempted send on invalid socket [ 302.624962][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 302.637613][T13710] hpfs: hpfs_map_sector(): read error 01:27:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x4e, 0x0, 0x0) [ 302.688705][T13701] CPU: 1 PID: 13701 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 302.697244][T13701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.707390][T13701] Call Trace: [ 302.710674][T13701] dump_stack_lvl+0xcd/0x134 [ 302.715271][T13701] should_fail.cold+0x5/0xa [ 302.719785][T13701] prepare_alloc_pages+0x17b/0x580 [ 302.724901][T13701] ? stack_trace_consume_entry+0x160/0x160 [ 302.730712][T13701] __alloc_pages+0x12f/0x500 01:27:33 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) mmap$fb(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) [ 302.735389][T13701] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 302.742159][T13701] ? rcu_read_lock_sched_held+0xd/0x70 [ 302.747618][T13701] ? lock_release+0x522/0x720 [ 302.752298][T13701] ? __debug_object_init+0x409/0xd10 [ 302.757584][T13701] ? rwlock_bug.part.0+0x90/0x90 [ 302.762525][T13701] ? rcu_read_lock_sched_held+0xd/0x70 [ 302.767987][T13701] ? lock_acquire+0x442/0x510 [ 302.772669][T13701] alloc_pages+0x18c/0x2a0 [ 302.777092][T13701] allocate_slab+0x32e/0x4b0 [ 302.781681][T13701] ___slab_alloc+0x4ba/0x820 [ 302.786269][T13701] ? rcu_read_lock_sched_held+0xd/0x70 [ 302.791729][T13701] ? io_submit_sqes+0x7d44/0x9730 [ 302.796757][T13701] ? lock_downgrade+0x6e0/0x6e0 [ 302.801604][T13701] ? kmem_cache_alloc_bulk+0x2b3/0x490 [ 302.807051][T13701] kmem_cache_alloc_bulk+0x2b3/0x490 [ 302.812328][T13701] io_submit_sqes+0x7d44/0x9730 [ 302.817175][T13701] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 302.822883][T13701] __do_sys_io_uring_enter+0xf48/0x1f00 [ 302.828418][T13701] ? io_submit_sqes+0x9730/0x9730 [ 302.833546][T13701] ? rcu_read_lock_sched_held+0xd/0x70 [ 302.839083][T13701] ? lock_acquire+0x442/0x510 [ 302.843748][T13701] ? rcu_read_lock_sched_held+0xd/0x70 [ 302.849188][T13701] ? lock_release+0x522/0x720 [ 302.853939][T13701] ? __context_tracking_exit+0xb8/0xe0 [ 302.859650][T13701] ? lock_downgrade+0x6e0/0x6e0 [ 302.864486][T13701] ? lock_downgrade+0x6e0/0x6e0 [ 302.869323][T13701] ? get_vtime_delta+0x26e/0x420 [ 302.874247][T13701] ? syscall_enter_from_user_mode+0x21/0x70 [ 302.880127][T13701] do_syscall_64+0x35/0xb0 [ 302.884618][T13701] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 302.890501][T13701] RIP: 0033:0x4665f9 [ 302.894380][T13701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 302.914075][T13701] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 302.922486][T13701] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 302.930444][T13701] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 302.938400][T13701] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 302.946356][T13701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 302.954309][T13701] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:33 executing program 2 (fault-call:8 fault-nth:29): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:33 executing program 5: name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 01:27:33 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x23, 0x0) 01:27:33 executing program 4: socketpair(0x2, 0x0, 0x0, &(0x7f00000001c0)) 01:27:33 executing program 3: fsopen(0x0, 0x3dc0ea9d5624b36e) [ 303.104204][T13740] FAULT_INJECTION: forcing a failure. [ 303.104204][T13740] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 303.123374][T13740] CPU: 0 PID: 13740 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 303.132845][T13740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.142899][T13740] Call Trace: [ 303.146436][T13740] dump_stack_lvl+0xcd/0x134 [ 303.151031][T13740] should_fail.cold+0x5/0xa [ 303.155539][T13740] prepare_alloc_pages+0x17b/0x580 [ 303.160737][T13740] ? stack_trace_consume_entry+0x160/0x160 [ 303.166546][T13740] __alloc_pages+0x12f/0x500 [ 303.171134][T13740] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 303.177892][T13740] ? kasan_save_stack+0x1b/0x40 [ 303.182742][T13740] ? __kasan_slab_alloc+0x83/0xb0 [ 303.187971][T13740] ? kmem_cache_alloc_bulk+0x1ec/0x490 [ 303.193430][T13740] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 303.199273][T13740] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 303.205349][T13740] ? rwlock_bug.part.0+0x90/0x90 [ 303.210293][T13740] ? rcu_read_lock_sched_held+0xd/0x70 [ 303.215749][T13740] ? lock_acquire+0x442/0x510 [ 303.220426][T13740] alloc_pages+0x18c/0x2a0 [ 303.224846][T13740] allocate_slab+0x32e/0x4b0 [ 303.229437][T13740] ___slab_alloc+0x4ba/0x820 [ 303.234029][T13740] ? rcu_read_lock_sched_held+0xd/0x70 [ 303.239502][T13740] ? io_submit_sqes+0x7d44/0x9730 [ 303.244619][T13740] ? lock_downgrade+0x6e0/0x6e0 [ 303.249473][T13740] ? kmem_cache_alloc_bulk+0x2b3/0x490 [ 303.255106][T13740] kmem_cache_alloc_bulk+0x2b3/0x490 [ 303.260567][T13740] io_submit_sqes+0x7d44/0x9730 [ 303.265425][T13740] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 303.271151][T13740] __do_sys_io_uring_enter+0xf48/0x1f00 [ 303.276707][T13740] ? io_submit_sqes+0x9730/0x9730 [ 303.281734][T13740] ? rcu_read_lock_sched_held+0xd/0x70 [ 303.287192][T13740] ? lock_acquire+0x442/0x510 [ 303.291867][T13740] ? rcu_read_lock_sched_held+0xd/0x70 [ 303.297322][T13740] ? lock_release+0x522/0x720 [ 303.302172][T13740] ? __context_tracking_exit+0xb8/0xe0 [ 303.307897][T13740] ? lock_downgrade+0x6e0/0x6e0 [ 303.312746][T13740] ? lock_downgrade+0x6e0/0x6e0 [ 303.317599][T13740] ? get_vtime_delta+0x26e/0x420 [ 303.322538][T13740] ? syscall_enter_from_user_mode+0x21/0x70 [ 303.328785][T13740] do_syscall_64+0x35/0xb0 [ 303.333206][T13740] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 303.339537][T13740] RIP: 0033:0x4665f9 [ 303.343427][T13740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 303.363130][T13740] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 303.371551][T13740] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 303.379523][T13740] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 303.387491][T13740] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 303.395729][T13740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:27:33 executing program 0: r0 = eventfd2(0x4, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) 01:27:33 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) 01:27:33 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x48, 0x0) 01:27:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f000000de40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f000000dec0)=0x80) [ 303.403694][T13740] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:33 executing program 2 (fault-call:8 fault-nth:30): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d4", 0x79}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 01:27:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2d, 0x0, 0x0) 01:27:34 executing program 3: openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x5810c0, 0x0) 01:27:34 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000000)) [ 303.480870][T13757] hpfs: hpfs_map_sector(): read error 01:27:34 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4c, 0x0) [ 303.522348][T13761] hpfs: hpfs_map_sector(): read error 01:27:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x8, 0x0, &(0x7f000000de80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 303.585918][T13767] FAULT_INJECTION: forcing a failure. [ 303.585918][T13767] name failslab, interval 1, probability 0, space 0, times 0 [ 303.605686][T13767] CPU: 1 PID: 13767 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 303.614203][T13767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.624342][T13767] Call Trace: [ 303.627615][T13767] dump_stack_lvl+0xcd/0x134 [ 303.632236][T13767] should_fail.cold+0x5/0xa [ 303.636745][T13767] ? io_timeout_prep+0x69c/0x8b0 [ 303.643642][T13767] should_failslab+0x5/0x10 [ 303.648324][T13767] __kmalloc+0x72/0x330 [ 303.652985][T13767] io_timeout_prep+0x69c/0x8b0 [ 303.657849][T13767] io_submit_sqes+0x4a36/0x9730 [ 303.662991][T13767] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 303.668714][T13767] __do_sys_io_uring_enter+0xf48/0x1f00 [ 303.674252][T13767] ? io_submit_sqes+0x9730/0x9730 [ 303.679288][T13767] ? rcu_read_lock_sched_held+0xd/0x70 [ 303.684757][T13767] ? lock_acquire+0x442/0x510 [ 303.689595][T13767] ? rcu_read_lock_sched_held+0xd/0x70 [ 303.695037][T13767] ? lock_release+0x522/0x720 [ 303.699718][T13767] ? __context_tracking_exit+0xb8/0xe0 [ 303.705182][T13767] ? lock_downgrade+0x6e0/0x6e0 [ 303.710027][T13767] ? lock_downgrade+0x6e0/0x6e0 [ 303.714867][T13767] ? get_vtime_delta+0x26e/0x420 [ 303.719798][T13767] ? syscall_enter_from_user_mode+0x21/0x70 [ 303.725681][T13767] do_syscall_64+0x35/0xb0 [ 303.730091][T13767] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 303.736061][T13767] RIP: 0033:0x4665f9 [ 303.739939][T13767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 303.759974][T13767] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 303.768380][T13767] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 303.776339][T13767] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 01:27:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x9c, r2, 0x401, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IE={0x7d, 0x2a, [@fast_bss_trans={0x37, 0x52, {0x0, 0x0, "7c4f19874661e12857ecf5746814c8fe", "4fdf073327627cfa90d432604357e8f11a8910467f43f33192a1830c651e30f7", "52ae7d19dfe75317f28db3d3cd914e169e270857c1853d718713af92837698cd"}}, @ht={0x2d, 0x1a}, @mesh_config={0x71, 0x7}]}]}, 0x9c}}, 0x0) 01:27:34 executing program 4: symlinkat(&(0x7f0000006a80)='./file0\x00', 0xffffffffffffff9c, 0x0) 01:27:34 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x10, 0x0, 0x0) 01:27:34 executing program 2 (fault-call:8 fault-nth:31): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) [ 303.784295][T13767] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 303.792601][T13767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 303.801099][T13767] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 [ 303.824803][T13781] hpfs: hpfs_map_sector(): read error 01:27:34 executing program 4: io_uring_setup(0x0, &(0x7f0000000000)) 01:27:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_INTERFACE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0xf0ff7f00000000}}, 0x0) [ 303.882436][T13787] hpfs: hpfs_map_sector(): read error [ 303.947368][T13793] FAULT_INJECTION: forcing a failure. [ 303.947368][T13793] name failslab, interval 1, probability 0, space 0, times 0 [ 303.974249][T13793] CPU: 1 PID: 13793 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 303.982793][T13793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.992851][T13793] Call Trace: [ 303.996226][T13793] dump_stack_lvl+0xcd/0x134 [ 304.000819][T13793] should_fail.cold+0x5/0xa [ 304.005329][T13793] should_failslab+0x5/0x10 [ 304.009839][T13793] kmem_cache_alloc_bulk+0x4a/0x490 [ 304.015048][T13793] io_submit_sqes+0x7d44/0x9730 [ 304.019922][T13793] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 304.025650][T13793] __do_sys_io_uring_enter+0xf48/0x1f00 [ 304.031204][T13793] ? io_submit_sqes+0x9730/0x9730 [ 304.036840][T13793] ? rcu_read_lock_sched_held+0xd/0x70 [ 304.042304][T13793] ? lock_acquire+0x442/0x510 [ 304.046975][T13793] ? rcu_read_lock_sched_held+0xd/0x70 [ 304.052422][T13793] ? lock_release+0x522/0x720 [ 304.057086][T13793] ? __context_tracking_exit+0xb8/0xe0 [ 304.063141][T13793] ? lock_downgrade+0x6e0/0x6e0 [ 304.067984][T13793] ? lock_downgrade+0x6e0/0x6e0 [ 304.072822][T13793] ? get_vtime_delta+0x26e/0x420 [ 304.077747][T13793] ? syscall_enter_from_user_mode+0x21/0x70 [ 304.083634][T13793] do_syscall_64+0x35/0xb0 [ 304.088043][T13793] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 304.093925][T13793] RIP: 0033:0x4665f9 [ 304.098324][T13793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 304.117921][T13793] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 304.126412][T13793] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 304.134369][T13793] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 304.142325][T13793] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 304.150279][T13793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 304.158233][T13793] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 01:27:37 executing program 3: connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) 01:27:37 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x60, 0x0) 01:27:37 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000180)='/dev/vcs\x00', 0x0, r1) 01:27:37 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)={0x0, @reserved}) 01:27:37 executing program 2 (fault-call:8 fault-nth:32): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) [ 306.550664][T13811] FAULT_INJECTION: forcing a failure. [ 306.550664][T13811] name failslab, interval 1, probability 0, space 0, times 0 [ 306.565357][T13811] CPU: 0 PID: 13811 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 306.573775][T13811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.584434][T13811] Call Trace: [ 306.587706][T13811] dump_stack_lvl+0xcd/0x134 [ 306.592298][T13811] should_fail.cold+0x5/0xa [ 306.596814][T13811] should_failslab+0x5/0x10 [ 306.601756][T13811] kmem_cache_alloc_bulk+0x4a/0x490 [ 306.606960][T13811] io_submit_sqes+0x7d44/0x9730 [ 306.611822][T13811] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 306.617540][T13811] __do_sys_io_uring_enter+0xf48/0x1f00 [ 306.623096][T13811] ? io_submit_sqes+0x9730/0x9730 [ 306.628203][T13811] ? rcu_read_lock_sched_held+0xd/0x70 [ 306.633660][T13811] ? lock_acquire+0x442/0x510 [ 306.638335][T13811] ? rcu_read_lock_sched_held+0xd/0x70 [ 306.643790][T13811] ? lock_release+0x522/0x720 [ 306.648459][T13811] ? __context_tracking_exit+0xb8/0xe0 [ 306.653915][T13811] ? lock_downgrade+0x6e0/0x6e0 [ 306.658761][T13811] ? lock_downgrade+0x6e0/0x6e0 [ 306.663612][T13811] ? get_vtime_delta+0x26e/0x420 [ 306.668550][T13811] ? syscall_enter_from_user_mode+0x21/0x70 [ 306.674443][T13811] do_syscall_64+0x35/0xb0 [ 306.678861][T13811] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 306.684757][T13811] RIP: 0033:0x4665f9 [ 306.688651][T13811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 306.708255][T13811] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 306.716683][T13811] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 306.724653][T13811] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 306.732707][T13811] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 306.740675][T13811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:27:37 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8040, 0x0) 01:27:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 01:27:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000380)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @local}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000040)="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", 0xfa}, {&(0x7f0000000140)="934b14ab78d8", 0x6}, {&(0x7f0000000200)="86", 0x1}], 0x3}}], 0x1, 0x0) 01:27:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="14000000030705"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/7, 0x7}], 0x1}}], 0x1, 0x0, 0x0) 01:27:37 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x68, 0x0) [ 306.748816][T13811] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:37 executing program 3: syz_open_dev$audion(&(0x7f0000000fc0), 0x0, 0x0) 01:27:37 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) recvmsg(r0, &(0x7f0000000f80)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f0000000ec0)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) 01:27:37 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000040)) 01:27:37 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6c, 0x0) 01:27:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0xfffffffa}, 0x1c) 01:27:37 executing program 2 (fault-call:8 fault-nth:33): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:37 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000140)='-+#:^/\x00', &(0x7f0000000180)="cc", 0x1) 01:27:37 executing program 3: connect$l2tp6(0xffffffffffffffff, 0x0, 0x0) 01:27:37 executing program 5: syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) 01:27:37 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x74, 0x0) 01:27:37 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000002180), 0x4600, 0x0) [ 306.968884][T13854] FAULT_INJECTION: forcing a failure. [ 306.968884][T13854] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 307.025202][T13854] CPU: 1 PID: 13854 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 307.033670][T13854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.043738][T13854] Call Trace: [ 307.043747][T13854] dump_stack_lvl+0xcd/0x134 [ 307.051603][T13854] should_fail.cold+0x5/0xa [ 307.056112][T13854] prepare_alloc_pages+0x17b/0x580 [ 307.061223][T13854] ? stack_trace_consume_entry+0x160/0x160 [ 307.067037][T13854] __alloc_pages+0x12f/0x500 [ 307.071624][T13854] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 307.078383][T13854] ? kasan_save_stack+0x1b/0x40 [ 307.083234][T13854] ? __kasan_slab_alloc+0x83/0xb0 [ 307.088259][T13854] ? kmem_cache_alloc_bulk+0x1ec/0x490 [ 307.093718][T13854] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 307.099440][T13854] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 307.106032][T13854] ? rwlock_bug.part.0+0x90/0x90 [ 307.110972][T13854] ? rcu_read_lock_sched_held+0xd/0x70 [ 307.116427][T13854] ? lock_acquire+0x442/0x510 [ 307.121113][T13854] alloc_pages+0x18c/0x2a0 [ 307.125547][T13854] allocate_slab+0x32e/0x4b0 [ 307.130138][T13854] ___slab_alloc+0x4ba/0x820 [ 307.134730][T13854] ? rcu_read_lock_sched_held+0xd/0x70 [ 307.140194][T13854] ? io_submit_sqes+0x7d44/0x9730 [ 307.145222][T13854] ? lock_downgrade+0x6e0/0x6e0 [ 307.150077][T13854] ? kmem_cache_alloc_bulk+0x2b3/0x490 [ 307.155802][T13854] kmem_cache_alloc_bulk+0x2b3/0x490 [ 307.161177][T13854] io_submit_sqes+0x7d44/0x9730 [ 307.166038][T13854] ? __do_sys_io_uring_enter+0xf48/0x1f00 01:27:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x90) 01:27:37 executing program 3: syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x280) [ 307.171760][T13854] __do_sys_io_uring_enter+0xf48/0x1f00 [ 307.177315][T13854] ? io_submit_sqes+0x9730/0x9730 [ 307.182344][T13854] ? rcu_read_lock_sched_held+0xd/0x70 [ 307.187801][T13854] ? lock_acquire+0x442/0x510 [ 307.192513][T13854] ? rcu_read_lock_sched_held+0xd/0x70 [ 307.197972][T13854] ? lock_release+0x522/0x720 [ 307.202652][T13854] ? __context_tracking_exit+0xb8/0xe0 [ 307.208116][T13854] ? lock_downgrade+0x6e0/0x6e0 [ 307.212968][T13854] ? lock_downgrade+0x6e0/0x6e0 [ 307.217824][T13854] ? get_vtime_delta+0x26e/0x420 [ 307.224339][T13854] ? syscall_enter_from_user_mode+0x21/0x70 [ 307.230240][T13854] do_syscall_64+0x35/0xb0 [ 307.234666][T13854] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 307.240653][T13854] RIP: 0033:0x4665f9 [ 307.244756][T13854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 307.264547][T13854] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 01:27:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 01:27:37 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 01:27:37 executing program 0: bind$phonet(0xffffffffffffffff, 0x0, 0x0) fork() ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, &(0x7f0000003640)=[{&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f00000022c0)=""/21, 0x15}, {&(0x7f0000002300)=""/43, 0x2b}, {&(0x7f0000002340)=""/113, 0x71}, {&(0x7f00000023c0)=""/207, 0xcf}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f00000034c0)=""/123, 0x7b}, {0x0}, {&(0x7f0000003580)=""/133, 0x85}], 0x9, &(0x7f0000003700)=""/67, 0x43}, 0x81}, {{&(0x7f0000003780)=@x25={0x9, @remote}, 0x80, &(0x7f0000004940)=[{&(0x7f0000003800)=""/60, 0x3c}, {&(0x7f0000003840)=""/228, 0xe4}, {&(0x7f0000003940)=""/4096, 0x1000}], 0x3, &(0x7f0000004980)=""/107, 0x6b}, 0x6}, {{0x0, 0x0, &(0x7f0000004cc0)=[{&(0x7f0000004a00)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f0000004d00)=""/87, 0x57}, 0x6}, {{0x0, 0x0, &(0x7f0000006000)=[{&(0x7f0000004d80)=""/246, 0xf6}, {&(0x7f0000004e80)=""/36, 0x24}, {&(0x7f0000004ec0)=""/8, 0x8}, {&(0x7f0000004f00)=""/4096, 0x1000}, {&(0x7f0000005f00)=""/240, 0xf0}], 0x5, &(0x7f0000006080)=""/162, 0xa2}, 0x7}, {{&(0x7f0000006140)=@rc={0x1f, @none}, 0x80, &(0x7f00000063c0)=[{&(0x7f00000062c0)=""/206, 0xce}], 0x1, &(0x7f0000006400)=""/167, 0xa7}, 0x1f}, {{&(0x7f00000064c0)=@nfc, 0x80, &(0x7f0000006740), 0x0, &(0x7f0000006780)=""/54, 0x36}, 0x1}, {{&(0x7f00000067c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000006880)=[{&(0x7f0000006840)=""/50, 0x32}], 0x1, &(0x7f00000068c0)=""/49, 0x31}}, {{&(0x7f0000006900)=@ipx, 0x80, &(0x7f0000006c80)=[{&(0x7f0000006980)=""/238, 0xee}, {0x0}, {&(0x7f0000006b00)=""/139, 0x8b}, {&(0x7f0000006bc0)=""/80, 0x50}, {0x0}], 0x5, &(0x7f0000006d00)=""/125, 0x7d}, 0xfffffff8}, {{0x0, 0x0, 0x0}, 0xffffffe1}], 0x9, 0x40000140, &(0x7f00000085c0)={0x0, 0x989680}) [ 307.273241][T13854] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 307.281219][T13854] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 307.289197][T13854] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 307.297257][T13854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 307.305228][T13854] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:37 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7a, 0x0) 01:27:37 executing program 2 (fault-call:8 fault-nth:34): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:37 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockname(r0, 0x0, 0x0) 01:27:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x38, 0x0, 0x0) 01:27:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000380)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @local}, 0x1c, &(0x7f0000000300)=[{0x0}, {&(0x7f0000000140)="93", 0x1}], 0x2}}], 0x1, 0x0) 01:27:37 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf0, 0x0) 01:27:37 executing program 0: pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x4}, &(0x7f0000000100)={0x77359400}, 0x0) 01:27:38 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 01:27:38 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfe, 0x0) 01:27:38 executing program 4: semctl$SETVAL(0xffffffffffffffff, 0x0, 0x10, 0x0) 01:27:38 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000380), 0xffffffffffffffff) [ 307.527616][T13902] FAULT_INJECTION: forcing a failure. [ 307.527616][T13902] name failslab, interval 1, probability 0, space 0, times 0 [ 307.565935][T13902] CPU: 1 PID: 13902 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 01:27:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x11, 0x0, 0x0, 0x0) 01:27:38 executing program 4: open$dir(0x0, 0x46a080, 0x0) [ 307.574572][T13902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.584634][T13902] Call Trace: [ 307.587911][T13902] dump_stack_lvl+0xcd/0x134 [ 307.594329][T13902] should_fail.cold+0x5/0xa [ 307.598851][T13902] should_failslab+0x5/0x10 [ 307.603443][T13902] kmem_cache_alloc_bulk+0x4a/0x490 [ 307.608646][T13902] io_submit_sqes+0x7d44/0x9730 [ 307.613509][T13902] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 307.619236][T13902] __do_sys_io_uring_enter+0xf48/0x1f00 [ 307.624791][T13902] ? io_submit_sqes+0x9730/0x9730 [ 307.629823][T13902] ? rcu_read_lock_sched_held+0xd/0x70 [ 307.635283][T13902] ? lock_acquire+0x442/0x510 [ 307.639999][T13902] ? rcu_read_lock_sched_held+0xd/0x70 [ 307.645459][T13902] ? lock_release+0x522/0x720 [ 307.650141][T13902] ? __context_tracking_exit+0xb8/0xe0 [ 307.655601][T13902] ? lock_downgrade+0x6e0/0x6e0 [ 307.660627][T13902] ? lock_downgrade+0x6e0/0x6e0 [ 307.665580][T13902] ? get_vtime_delta+0x26e/0x420 [ 307.670521][T13902] ? syscall_enter_from_user_mode+0x21/0x70 [ 307.676425][T13902] do_syscall_64+0x35/0xb0 [ 307.680850][T13902] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 307.686750][T13902] RIP: 0033:0x4665f9 [ 307.690645][T13902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 307.710598][T13902] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 307.719188][T13902] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 307.727160][T13902] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 307.735126][T13902] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 307.743097][T13902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 307.751067][T13902] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:38 executing program 2 (fault-call:8 fault-nth:35): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:38 executing program 4: pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x4}, 0x0, 0x0) 01:27:38 executing program 5: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x18) 01:27:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x128}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000540)={&(0x7f0000000280), 0xc, &(0x7f0000000500)={0x0}}, 0x0) 01:27:38 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x300, 0x0) [ 307.874476][T13939] FAULT_INJECTION: forcing a failure. [ 307.874476][T13939] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 307.891515][T13939] CPU: 0 PID: 13939 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 307.900086][T13939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.910213][T13939] Call Trace: [ 307.913490][T13939] dump_stack_lvl+0xcd/0x134 [ 307.918084][T13939] should_fail.cold+0x5/0xa [ 307.922595][T13939] prepare_alloc_pages+0x17b/0x580 [ 307.927792][T13939] ? stack_trace_consume_entry+0x160/0x160 [ 307.933799][T13939] __alloc_pages+0x12f/0x500 [ 307.938386][T13939] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 307.945147][T13939] ? kasan_save_stack+0x1b/0x40 [ 307.948242][ T3112] nbd_handle_cmd: 4 callbacks suppressed [ 307.948259][ T3112] block nbd1: Attempted send on invalid socket [ 307.949998][T13939] ? __kasan_slab_alloc+0x83/0xb0 [ 307.950023][T13939] ? kmem_cache_alloc_bulk+0x1ec/0x490 [ 307.950043][T13939] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 307.950063][T13939] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 307.950087][T13939] ? rwlock_bug.part.0+0x90/0x90 [ 307.950109][T13939] ? rcu_read_lock_sched_held+0xd/0x70 [ 307.950128][T13939] ? lock_acquire+0x442/0x510 [ 307.950149][T13939] alloc_pages+0x18c/0x2a0 [ 307.950172][T13939] allocate_slab+0x32e/0x4b0 [ 307.950194][T13939] ___slab_alloc+0x4ba/0x820 [ 307.950215][T13939] ? rcu_read_lock_sched_held+0xd/0x70 [ 307.950235][T13939] ? io_submit_sqes+0x7d44/0x9730 [ 307.950256][T13939] ? lock_downgrade+0x6e0/0x6e0 [ 307.950279][T13939] ? kmem_cache_alloc_bulk+0x2b3/0x490 [ 307.950301][T13939] kmem_cache_alloc_bulk+0x2b3/0x490 [ 307.950327][T13939] io_submit_sqes+0x7d44/0x9730 [ 307.950356][T13939] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 307.950378][T13939] __do_sys_io_uring_enter+0xf48/0x1f00 [ 307.950400][T13939] ? io_submit_sqes+0x9730/0x9730 [ 307.950420][T13939] ? rcu_read_lock_sched_held+0xd/0x70 [ 307.950438][T13939] ? lock_acquire+0x442/0x510 [ 307.950456][T13939] ? rcu_read_lock_sched_held+0xd/0x70 [ 307.950471][T13939] ? lock_release+0x522/0x720 [ 307.950489][T13939] ? __context_tracking_exit+0xb8/0xe0 [ 307.950510][T13939] ? lock_downgrade+0x6e0/0x6e0 [ 307.956168][ T3112] print_req_error: 4 callbacks suppressed [ 307.956178][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 307.962251][T13939] ? lock_downgrade+0x6e0/0x6e0 [ 307.975719][T13943] hpfs: hpfs_map_sector(): read error [ 307.978368][T13939] ? get_vtime_delta+0x26e/0x420 [ 307.978393][T13939] ? syscall_enter_from_user_mode+0x21/0x70 [ 308.130383][T13939] do_syscall_64+0x35/0xb0 [ 308.134800][T13939] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 308.140685][T13939] RIP: 0033:0x4665f9 [ 308.144564][T13939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 308.164160][T13939] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 308.172558][T13939] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 308.180512][T13939] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 308.188556][T13939] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 308.196619][T13939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 308.204579][T13939] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 [ 308.263998][ T2044] block nbd1: Attempted send on invalid socket [ 308.270205][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 308.286416][T13943] hpfs: hpfs_map_sector(): read error 01:27:38 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0xc86c1, 0x0) 01:27:38 executing program 3: faccessat(0xffffffffffffffff, 0x0, 0x8b) 01:27:38 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local={0x2}}, 0x14) 01:27:38 executing program 2 (fault-call:8 fault-nth:36): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:38 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x384, 0x0) [ 308.458263][T13959] FAULT_INJECTION: forcing a failure. [ 308.458263][T13959] name failslab, interval 1, probability 0, space 0, times 0 [ 308.476002][ T2044] block nbd1: Attempted send on invalid socket [ 308.479949][T13959] CPU: 1 PID: 13959 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 308.482645][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 308.490922][T13959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.501952][T13961] hpfs: hpfs_map_sector(): read error [ 308.511773][T13959] Call Trace: [ 308.511785][T13959] dump_stack_lvl+0xcd/0x134 [ 308.511811][T13959] should_fail.cold+0x5/0xa [ 308.511834][T13959] should_failslab+0x5/0x10 [ 308.511856][T13959] kmem_cache_alloc_bulk+0x4a/0x490 [ 308.539170][T13959] io_submit_sqes+0x7d44/0x9730 [ 308.544039][T13959] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 308.549757][T13959] __do_sys_io_uring_enter+0xf48/0x1f00 01:27:39 executing program 0: syz_open_dev$rtc(&(0x7f0000000000), 0x1, 0x0) [ 308.555305][T13959] ? io_submit_sqes+0x9730/0x9730 [ 308.560332][T13959] ? rcu_read_lock_sched_held+0xd/0x70 [ 308.565795][T13959] ? lock_acquire+0x442/0x510 [ 308.570471][T13959] ? rcu_read_lock_sched_held+0xd/0x70 [ 308.575930][T13959] ? lock_release+0x522/0x720 [ 308.580605][T13959] ? __context_tracking_exit+0xb8/0xe0 [ 308.586062][T13959] ? lock_downgrade+0x6e0/0x6e0 [ 308.590914][T13959] ? lock_downgrade+0x6e0/0x6e0 [ 308.595762][T13959] ? get_vtime_delta+0x26e/0x420 [ 308.600705][T13959] ? syscall_enter_from_user_mode+0x21/0x70 [ 308.606604][T13959] do_syscall_64+0x35/0xb0 [ 308.611026][T13959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 308.616920][T13959] RIP: 0033:0x4665f9 [ 308.620839][T13959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 308.640455][T13959] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 308.648871][T13959] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 01:27:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 01:27:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_OPER(r0, &(0x7f00000097c0)={&(0x7f00000096c0), 0xfffffd37, &(0x7f0000009780)={&(0x7f0000009700)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 308.657253][T13959] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 308.665230][T13959] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 308.673204][T13959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 308.681176][T13959] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:39 executing program 4: syz_open_dev$audion(&(0x7f00000000c0), 0xfffffffffffffffe, 0x0) 01:27:39 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x500, 0x0) 01:27:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000018c0)={@private1, @private1, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400008}) 01:27:39 executing program 0: ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) 01:27:39 executing program 2 (fault-call:8 fault-nth:37): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x3c}}, 0x0) 01:27:39 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002180), 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002180), 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000000)='#,+\x00', &(0x7f0000000040)='./file0\x00', r1) [ 308.811313][ T2044] block nbd1: Attempted send on invalid socket [ 308.817868][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 308.841582][T13979] hpfs: hpfs_map_sector(): read error 01:27:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) accept4$alg(r0, 0x0, 0x0, 0xc00) 01:27:39 executing program 0: socket(0x18, 0x0, 0x14) [ 308.859236][T13986] FAULT_INJECTION: forcing a failure. [ 308.859236][T13986] name failslab, interval 1, probability 0, space 0, times 0 [ 308.898872][ T3112] block nbd1: Attempted send on invalid socket 01:27:39 executing program 4: pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0x6]}, 0x8}) [ 308.906049][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 308.927838][T13988] hpfs: hpfs_map_sector(): read error [ 308.997982][T13986] CPU: 0 PID: 13986 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 309.006433][T13986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.016481][T13986] Call Trace: [ 309.019754][T13986] dump_stack_lvl+0xcd/0x134 [ 309.024347][T13986] should_fail.cold+0x5/0xa [ 309.028969][T13986] should_failslab+0x5/0x10 [ 309.033478][T13986] kmem_cache_alloc_bulk+0x4a/0x490 [ 309.038685][T13986] io_submit_sqes+0x7d44/0x9730 [ 309.043545][T13986] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 309.049266][T13986] __do_sys_io_uring_enter+0xf48/0x1f00 [ 309.054903][T13986] ? io_submit_sqes+0x9730/0x9730 [ 309.059959][T13986] ? rcu_read_lock_sched_held+0xd/0x70 [ 309.065420][T13986] ? lock_acquire+0x442/0x510 [ 309.070193][T13986] ? rcu_read_lock_sched_held+0xd/0x70 [ 309.075652][T13986] ? lock_release+0x522/0x720 [ 309.080326][T13986] ? __context_tracking_exit+0xb8/0xe0 [ 309.085810][T13986] ? lock_downgrade+0x6e0/0x6e0 [ 309.090659][T13986] ? lock_downgrade+0x6e0/0x6e0 [ 309.095765][T13986] ? get_vtime_delta+0x26e/0x420 [ 309.101833][T13986] ? syscall_enter_from_user_mode+0x21/0x70 [ 309.107815][T13986] do_syscall_64+0x35/0xb0 [ 309.112231][T13986] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 309.118124][T13986] RIP: 0033:0x4665f9 [ 309.122010][T13986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:27:39 executing program 3: syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x44000) [ 309.141613][T13986] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 309.150020][T13986] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 309.157986][T13986] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 309.165954][T13986] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 309.174010][T13986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 309.181977][T13986] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x4c, 0x0, 0x0) 01:27:39 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x600, 0x0) 01:27:39 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002180), 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0x0, 0x0, 0x0) 01:27:39 executing program 4: pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000100), 0x0) 01:27:39 executing program 2 (fault-call:8 fault-nth:38): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x8}, 0x1c) 01:27:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="84000000", @ANYRES16=r1, @ANYBLOB="03"], 0x84}}, 0x0) 01:27:39 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x620600) [ 309.327623][T14017] FAULT_INJECTION: forcing a failure. [ 309.327623][T14017] name failslab, interval 1, probability 0, space 0, times 0 [ 309.337149][ T2044] block nbd1: Attempted send on invalid socket [ 309.346482][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 309.366015][T14021] hpfs: hpfs_map_sector(): read error 01:27:39 executing program 0: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x82000) [ 309.366382][T14017] CPU: 0 PID: 14017 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 309.379790][T14017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.389845][T14017] Call Trace: [ 309.393120][T14017] dump_stack_lvl+0xcd/0x134 [ 309.397718][T14017] should_fail.cold+0x5/0xa [ 309.399264][ T3112] block nbd1: Attempted send on invalid socket [ 309.402309][T14017] should_failslab+0x5/0x10 [ 309.402337][T14017] kmem_cache_alloc_bulk+0x4a/0x490 01:27:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001500)=ANY=[], 0x17c}}, 0x0) [ 309.408524][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 309.412953][T14017] io_submit_sqes+0x7d44/0x9730 [ 309.418636][T14025] hpfs: hpfs_map_sector(): read error [ 309.428855][T14017] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 309.428882][T14017] __do_sys_io_uring_enter+0xf48/0x1f00 [ 309.428906][T14017] ? io_submit_sqes+0x9730/0x9730 [ 309.455558][T14017] ? rcu_read_lock_sched_held+0xd/0x70 [ 309.461022][T14017] ? lock_acquire+0x442/0x510 [ 309.465699][T14017] ? rcu_read_lock_sched_held+0xd/0x70 [ 309.471334][T14017] ? lock_release+0x522/0x720 01:27:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_INTERFACE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x8000000000000000}}, 0x0) [ 309.476021][T14017] ? __context_tracking_exit+0xb8/0xe0 [ 309.481484][T14017] ? lock_downgrade+0x6e0/0x6e0 [ 309.486338][T14017] ? lock_downgrade+0x6e0/0x6e0 [ 309.491197][T14017] ? get_vtime_delta+0x26e/0x420 [ 309.496135][T14017] ? syscall_enter_from_user_mode+0x21/0x70 [ 309.502031][T14017] do_syscall_64+0x35/0xb0 [ 309.506449][T14017] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 309.512333][T14017] RIP: 0033:0x4665f9 [ 309.516209][T14017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 309.535801][T14017] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 309.544197][T14017] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 309.552151][T14017] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 309.560105][T14017] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 309.568059][T14017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:27:40 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x700, 0x0) [ 309.576014][T14017] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:40 executing program 2 (fault-call:8 fault-nth:39): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_OPER(r0, &(0x7f00000097c0)={0x0, 0x0, &(0x7f0000009780)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="df"], 0x28}}, 0x0) 01:27:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x128}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 01:27:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000003c0)={@mcast2}, 0x14) 01:27:40 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000000000)=0x8) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) r6 = dup2(r4, r5) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000000000)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000000)={r7}, 0x8) 01:27:40 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000a40)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000100)='T', 0x1}], 0x1, &(0x7f0000000980)=[@init={0x14, 0x84, 0x1, {0x0, 0x0, 0x3a2}}], 0x14}, 0x0) [ 309.694591][ T2044] block nbd1: Attempted send on invalid socket [ 309.700785][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 309.718945][T14038] hpfs: hpfs_map_sector(): read error [ 309.739086][T14041] FAULT_INJECTION: forcing a failure. [ 309.739086][T14041] name failslab, interval 1, probability 0, space 0, times 0 [ 309.755619][T14041] CPU: 0 PID: 14041 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 309.755733][ T3112] block nbd1: Attempted send on invalid socket [ 309.764041][T14041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.764054][T14041] Call Trace: [ 309.764061][T14041] dump_stack_lvl+0xcd/0x134 [ 309.764085][T14041] should_fail.cold+0x5/0xa 01:27:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) r3 = dup(r2) sendmsg$inet_sctp(r3, &(0x7f0000000500)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000540)='\r', 0x1}], 0x1, &(0x7f0000000740)=[@dstaddrv6={0x1c, 0x84, 0xa, @loopback}, @dstaddrv4={0x10, 0x84, 0x9, @broadcast}], 0x2c}, 0x0) [ 309.764111][T14041] should_failslab+0x5/0x10 [ 309.764133][T14041] kmem_cache_alloc_bulk+0x4a/0x490 [ 309.764158][T14041] io_submit_sqes+0x7d44/0x9730 [ 309.764188][T14041] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 309.764210][T14041] __do_sys_io_uring_enter+0xf48/0x1f00 [ 309.764235][T14041] ? io_submit_sqes+0x9730/0x9730 [ 309.764255][T14041] ? rcu_read_lock_sched_held+0xd/0x70 [ 309.770386][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 309.780411][T14041] ? lock_acquire+0x442/0x510 01:27:40 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/29) shmat(r0, &(0x7f0000ffc000/0x1000)=nil, 0x6000) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmat(r1, &(0x7f0000ffa000/0x3000)=nil, 0x7000) 01:27:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x6, &(0x7f0000000200)={@empty, @empty, 0x0, 0x700}, 0x10) [ 309.780433][T14041] ? rcu_read_lock_sched_held+0xd/0x70 [ 309.791274][T14047] hpfs: hpfs_map_sector(): read error [ 309.792732][T14041] ? lock_release+0x522/0x720 [ 309.792760][T14041] ? __context_tracking_exit+0xb8/0xe0 [ 309.792780][T14041] ? lock_downgrade+0x6e0/0x6e0 [ 309.792798][T14041] ? lock_downgrade+0x6e0/0x6e0 [ 309.792818][T14041] ? get_vtime_delta+0x26e/0x420 [ 309.792839][T14041] ? syscall_enter_from_user_mode+0x21/0x70 [ 309.792862][T14041] do_syscall_64+0x35/0xb0 [ 309.792884][T14041] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 309.792907][T14041] RIP: 0033:0x4665f9 [ 309.792923][T14041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 309.792944][T14041] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 309.792965][T14041] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 309.792980][T14041] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 01:27:40 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x3b, 0x0, 0x0) 01:27:40 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 309.792993][T14041] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 309.793007][T14041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 309.793019][T14041] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:40 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x900, 0x0) 01:27:40 executing program 2 (fault-call:8 fault-nth:40): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:40 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x5, 0xff, 0x1000}, 0x10) 01:27:40 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000000000)=0x8) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) r6 = dup2(r4, r5) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000000000)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000000)={r7}, 0x8) 01:27:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000007c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@prinfo={0x14, 0x84, 0x7, {0x13}}], 0x14}, 0x0) 01:27:40 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) sendto(r2, 0x0, 0x0, 0x81, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x10) 01:27:40 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000a40)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000100)='T', 0x1}], 0x1, &(0x7f0000000980)=[@prinfo={0x14, 0x84, 0x7, {0x3}}], 0x14}, 0x0) 01:27:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) [ 310.135720][ T3112] block nbd1: Attempted send on invalid socket [ 310.141945][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 310.159941][T14091] hpfs: hpfs_map_sector(): read error [ 310.180885][T14094] FAULT_INJECTION: forcing a failure. [ 310.180885][T14094] name failslab, interval 1, probability 0, space 0, times 0 [ 310.208196][T14103] hpfs: hpfs_map_sector(): read error [ 310.218844][T14094] CPU: 1 PID: 14094 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 310.227390][T14094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.237441][T14094] Call Trace: [ 310.240717][T14094] dump_stack_lvl+0xcd/0x134 [ 310.245310][T14094] should_fail.cold+0x5/0xa [ 310.249824][T14094] should_failslab+0x5/0x10 [ 310.254330][T14094] kmem_cache_alloc_bulk+0x4a/0x490 [ 310.259526][T14094] io_submit_sqes+0x7d44/0x9730 [ 310.264371][T14094] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 310.270078][T14094] __do_sys_io_uring_enter+0xf48/0x1f00 [ 310.275707][T14094] ? io_submit_sqes+0x9730/0x9730 [ 310.280718][T14094] ? rcu_read_lock_sched_held+0xd/0x70 [ 310.286161][T14094] ? lock_acquire+0x442/0x510 [ 310.290825][T14094] ? rcu_read_lock_sched_held+0xd/0x70 [ 310.296445][T14094] ? lock_release+0x522/0x720 [ 310.301105][T14094] ? __context_tracking_exit+0xb8/0xe0 [ 310.306548][T14094] ? lock_downgrade+0x6e0/0x6e0 [ 310.311386][T14094] ? lock_downgrade+0x6e0/0x6e0 [ 310.316219][T14094] ? get_vtime_delta+0x26e/0x420 [ 310.322082][T14094] ? syscall_enter_from_user_mode+0x21/0x70 [ 310.327968][T14094] do_syscall_64+0x35/0xb0 [ 310.332376][T14094] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 310.338349][T14094] RIP: 0033:0x4665f9 [ 310.342224][T14094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 310.361989][T14094] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 310.370395][T14094] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 310.378347][T14094] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 01:27:40 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100), &(0x7f0000000200)=0x98) 01:27:40 executing program 3: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) fork() munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) [ 310.386297][T14094] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 310.394249][T14094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 310.402201][T14094] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:40 executing program 5: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) r1 = shmat(r0, &(0x7f0000ffc000/0x1000)=nil, 0x6000) fork() shmat(r0, &(0x7f0000ffc000/0x2000)=nil, 0x5000) shmdt(r1) 01:27:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000007c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, '\x00', 0x0}}], 0x1c}, 0x0) 01:27:41 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa00, 0x0) 01:27:41 executing program 2 (fault-call:8 fault-nth:41): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:41 executing program 0: r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='cubic\x00', 0x6) 01:27:41 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x4, &(0x7f0000000000), 0x4) 01:27:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xb, &(0x7f0000000380), 0x20) 01:27:41 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000540)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@init={0x14, 0x84, 0x1, {0x8}}, @init={0x14, 0x84, 0x1, {0x0, 0x9}}], 0x28}, 0x0) 01:27:41 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000a40)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000100)='T', 0x1}], 0x1, &(0x7f0000000980)=[@init={0x14, 0x84, 0x1, {0x3ff}}], 0x14}, 0x0) 01:27:41 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x1d, &(0x7f0000000300)={0x0, 0x8001}, 0x8) [ 310.659278][T14138] hpfs: hpfs_map_sector(): read error [ 310.687331][T14144] FAULT_INJECTION: forcing a failure. [ 310.687331][T14144] name failslab, interval 1, probability 0, space 0, times 0 01:27:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000480), &(0x7f00000004c0)=0x8) [ 310.716751][T14145] hpfs: hpfs_map_sector(): read error [ 310.754131][T14144] CPU: 1 PID: 14144 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 310.762665][T14144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.772897][T14144] Call Trace: [ 310.776261][T14144] dump_stack_lvl+0xcd/0x134 [ 310.780858][T14144] should_fail.cold+0x5/0xa [ 310.785371][T14144] should_failslab+0x5/0x10 [ 310.789891][T14144] kmem_cache_alloc_bulk+0x4a/0x490 [ 310.795101][T14144] io_submit_sqes+0x7d44/0x9730 [ 310.799967][T14144] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 310.803999][T14160] hpfs: hpfs_map_sector(): read error [ 310.805695][T14144] __do_sys_io_uring_enter+0xf48/0x1f00 01:27:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000480), &(0x7f00000004c0)=0x8) 01:27:41 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc00, 0x0) 01:27:41 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xd00, 0x0) [ 310.805727][T14144] ? io_submit_sqes+0x9730/0x9730 [ 310.821591][T14144] ? rcu_read_lock_sched_held+0xd/0x70 [ 310.824511][T14163] hpfs: hpfs_map_sector(): read error [ 310.827055][T14144] ? lock_acquire+0x442/0x510 [ 310.827085][T14144] ? rcu_read_lock_sched_held+0xd/0x70 [ 310.842537][T14144] ? lock_release+0x522/0x720 [ 310.849211][T14144] ? __context_tracking_exit+0xb8/0xe0 [ 310.855114][T14144] ? lock_downgrade+0x6e0/0x6e0 [ 310.859962][T14144] ? lock_downgrade+0x6e0/0x6e0 [ 310.864801][T14144] ? get_vtime_delta+0x26e/0x420 [ 310.869816][T14144] ? syscall_enter_from_user_mode+0x21/0x70 [ 310.875870][T14144] do_syscall_64+0x35/0xb0 [ 310.880277][T14144] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 310.886158][T14144] RIP: 0033:0x4665f9 [ 310.890036][T14144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:27:41 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000a40)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000100)='T', 0x1}], 0x1, &(0x7f0000000980)=[@prinfo={0x14}], 0x14}, 0x0) [ 310.910436][T14144] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 310.919110][T14144] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 310.927446][T14144] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 310.935402][T14144] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 310.943357][T14144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 310.951404][T14144] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:41 executing program 2 (fault-call:8 fault-nth:42): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:41 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) sendto(r2, &(0x7f0000000080)="d2", 0x1, 0x0, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x10) 01:27:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000a40)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000980)=[@init={0x14, 0x84, 0x1, {0x3ff}}], 0x14}, 0x0) 01:27:41 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0xff}, 0x10) 01:27:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000a40)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000100)='T', 0x1}], 0x1, &(0x7f0000000980)=[@init={0x14, 0x84, 0x1, {0x3ff, 0x5}}], 0x14}, 0x0) [ 311.081551][T14174] hpfs: hpfs_map_sector(): read error [ 311.101411][T14180] hpfs: hpfs_map_sector(): read error 01:27:41 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe00, 0x0) 01:27:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f0000000080)={0x2}, 0x1) 01:27:41 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x29, &(0x7f0000000380), &(0x7f00000003c0)=0x8) 01:27:41 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000140)={0x0, @in, 0x0, 0x0, 0x281}, 0x98) [ 311.129848][T14183] FAULT_INJECTION: forcing a failure. [ 311.129848][T14183] name failslab, interval 1, probability 0, space 0, times 0 [ 311.194180][T14193] hpfs: hpfs_map_sector(): read error [ 311.216043][T14183] CPU: 1 PID: 14183 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 311.224485][T14183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.235053][T14183] Call Trace: [ 311.238317][T14183] dump_stack_lvl+0xcd/0x134 [ 311.242899][T14183] should_fail.cold+0x5/0xa [ 311.247393][T14183] should_failslab+0x5/0x10 [ 311.251887][T14183] kmem_cache_alloc_bulk+0x4a/0x490 [ 311.257074][T14183] io_submit_sqes+0x7d44/0x9730 [ 311.261926][T14183] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 311.267633][T14183] __do_sys_io_uring_enter+0xf48/0x1f00 [ 311.273257][T14183] ? io_submit_sqes+0x9730/0x9730 [ 311.278266][T14183] ? rcu_read_lock_sched_held+0xd/0x70 [ 311.284234][T14183] ? lock_acquire+0x442/0x510 [ 311.289073][T14183] ? rcu_read_lock_sched_held+0xd/0x70 [ 311.295125][T14183] ? lock_release+0x522/0x720 [ 311.299787][T14183] ? __context_tracking_exit+0xb8/0xe0 [ 311.305228][T14183] ? lock_downgrade+0x6e0/0x6e0 [ 311.310326][T14183] ? lock_downgrade+0x6e0/0x6e0 [ 311.315251][T14183] ? get_vtime_delta+0x26e/0x420 [ 311.320371][T14183] ? syscall_enter_from_user_mode+0x21/0x70 [ 311.326271][T14183] do_syscall_64+0x35/0xb0 [ 311.330681][T14183] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 311.336568][T14183] RIP: 0033:0x4665f9 [ 311.340448][T14183] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 311.360392][T14183] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 311.368791][T14183] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 311.376750][T14183] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 311.384709][T14183] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 01:27:41 executing program 5: open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) 01:27:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, 0x0, 0x0) 01:27:41 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf00, 0x0) [ 311.392926][T14183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 311.401315][T14183] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 [ 311.497471][T14210] hpfs: hpfs_map_sector(): read error [ 311.535981][T14216] hpfs: hpfs_map_sector(): read error 01:27:42 executing program 2 (fault-call:8 fault-nth:43): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:42 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@prinfo={0x14, 0x84, 0x7, {0x1}}], 0x14}, 0x0) 01:27:42 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x5}, 0x10) 01:27:42 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100), 0x84) 01:27:42 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000a40)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000100)='T', 0x1}], 0x1, &(0x7f0000000980)=[@prinfo={0x14, 0x84, 0x7, {0x3}}, @init={0x14, 0x84, 0x1, {0x3ff, 0x5, 0x9, 0x4}}, @prinfo={0x14}, @dstaddrv4={0x10, 0x84, 0x9, @local={0xac, 0x14, 0x0}}, @init={0x14, 0x84, 0x1, {0x0, 0x0, 0x0, 0x7}}], 0x60}, 0x0) 01:27:42 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1020, 0x0) 01:27:42 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@sndinfo={0x1c, 0x84, 0x4, {0x0, 0x2800}}], 0x1c}, 0x0) 01:27:42 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x29, &(0x7f0000000500), 0x8) 01:27:42 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000a40)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000100)='T', 0x1}], 0x1, &(0x7f0000000980)=[@prinfo={0x14, 0x84, 0x7, {0x3}}, @init={0x14, 0x84, 0x1, {0x3ff, 0x5, 0x9, 0x4}}, @dstaddrv4={0x10, 0x84, 0x9, @local={0xac, 0x14, 0x0}}, @init={0x14, 0x84, 0x1, {0x0, 0x0, 0x0, 0x7}}], 0x4c}, 0x0) 01:27:42 executing program 5: open$dir(&(0x7f00000000c0)='./file0\x00', 0x30d880, 0x0) 01:27:42 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1100, 0x0) 01:27:42 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000540)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@init={0x14, 0x84, 0x1, {0x8, 0x0, 0x200, 0x5}}, @init={0x14, 0x84, 0x1, {0x9, 0xfff7, 0x0, 0xa4f0}}, @init={0x14, 0x84, 0x1, {0x0, 0x9, 0x9}}, @dstaddrv6={0x1c, 0x84, 0xa, @empty}], 0x58}, 0x0) [ 311.721556][T14236] FAULT_INJECTION: forcing a failure. [ 311.721556][T14236] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 311.782326][T14236] CPU: 0 PID: 14236 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 311.790959][T14236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.801014][T14236] Call Trace: [ 311.805274][T14236] dump_stack_lvl+0xcd/0x134 [ 311.812213][T14236] should_fail.cold+0x5/0xa [ 311.816722][T14236] prepare_alloc_pages+0x17b/0x580 [ 311.821923][T14236] ? stack_trace_consume_entry+0x160/0x160 [ 311.827737][T14236] __alloc_pages+0x12f/0x500 [ 311.832329][T14236] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 311.839094][T14236] ? kasan_save_stack+0x1b/0x40 [ 311.843956][T14236] ? __kasan_slab_alloc+0x83/0xb0 [ 311.848988][T14236] ? kmem_cache_alloc_bulk+0x1ec/0x490 [ 311.854454][T14236] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 311.860178][T14236] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 311.866255][T14236] ? rwlock_bug.part.0+0x90/0x90 [ 311.871199][T14236] ? rcu_read_lock_sched_held+0xd/0x70 [ 311.876659][T14236] ? lock_acquire+0x442/0x510 [ 311.881343][T14236] alloc_pages+0x18c/0x2a0 [ 311.886039][T14236] allocate_slab+0x32e/0x4b0 [ 311.890642][T14236] ___slab_alloc+0x4ba/0x820 [ 311.895342][T14236] ? rcu_read_lock_sched_held+0xd/0x70 [ 311.900810][T14236] ? io_submit_sqes+0x7d44/0x9730 [ 311.905839][T14236] ? lock_downgrade+0x6e0/0x6e0 [ 311.910698][T14236] ? kmem_cache_alloc_bulk+0x2b3/0x490 [ 311.916159][T14236] kmem_cache_alloc_bulk+0x2b3/0x490 [ 311.921453][T14236] io_submit_sqes+0x7d44/0x9730 [ 311.926318][T14236] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 311.932047][T14236] __do_sys_io_uring_enter+0xf48/0x1f00 [ 311.937607][T14236] ? io_submit_sqes+0x9730/0x9730 [ 311.942642][T14236] ? rcu_read_lock_sched_held+0xd/0x70 [ 311.948107][T14236] ? lock_acquire+0x442/0x510 [ 311.952790][T14236] ? rcu_read_lock_sched_held+0xd/0x70 [ 311.958254][T14236] ? lock_release+0x522/0x720 [ 311.962929][T14236] ? __context_tracking_exit+0xb8/0xe0 [ 311.968395][T14236] ? lock_downgrade+0x6e0/0x6e0 [ 311.973247][T14236] ? lock_downgrade+0x6e0/0x6e0 [ 311.978098][T14236] ? get_vtime_delta+0x26e/0x420 [ 311.983038][T14236] ? syscall_enter_from_user_mode+0x21/0x70 [ 311.989110][T14236] do_syscall_64+0x35/0xb0 [ 311.994147][T14236] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 312.000050][T14236] RIP: 0033:0x4665f9 [ 312.003942][T14236] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 312.023555][T14236] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 312.031976][T14236] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 312.039952][T14236] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 312.047928][T14236] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 312.055907][T14236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 312.063878][T14236] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:42 executing program 2 (fault-call:8 fault-nth:44): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:42 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) close(r0) lseek(r0, 0x0, 0x0) 01:27:42 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) r3 = dup(r2) sendmsg$inet_sctp(r3, &(0x7f0000000500)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000540)='\r', 0x1}], 0x1, &(0x7f0000000740)=[@sndrcv={0x2c}, @dstaddrv6={0x1c, 0x84, 0xa, @loopback}], 0x48}, 0x0) 01:27:42 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@random="fd4440c8d67c", @broadcast, @val, {@ipv4}}, 0x0) 01:27:42 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1400, 0x0) 01:27:42 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) r3 = dup(r2) sendmsg$inet_sctp(r3, &(0x7f0000000500)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000540)='\r', 0x1}], 0x1, &(0x7f0000000740)=[@dstaddrv6={0x1c, 0x84, 0xa, @loopback}], 0x1c}, 0x0) 01:27:42 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000080)={r4}, &(0x7f0000000000)=0x8) 01:27:42 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r0, r1) getsockname$inet6(r1, 0x0, &(0x7f0000000080)) 01:27:42 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x20104) 01:27:42 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000a40)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000100)='T', 0x1}], 0x1, &(0x7f0000000980)=[@init={0x14, 0x84, 0x1, {0x0, 0x5}}], 0x14}, 0x0) [ 312.248371][T14279] FAULT_INJECTION: forcing a failure. [ 312.248371][T14279] name failslab, interval 1, probability 0, space 0, times 0 01:27:42 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1ab8, 0x0) [ 312.326770][T14279] CPU: 1 PID: 14279 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 312.336269][T14279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.346330][T14279] Call Trace: [ 312.349611][T14279] dump_stack_lvl+0xcd/0x134 [ 312.354210][T14279] should_fail.cold+0x5/0xa [ 312.358809][T14279] should_failslab+0x5/0x10 [ 312.363321][T14279] kmem_cache_alloc_bulk+0x4a/0x490 [ 312.368526][T14279] io_submit_sqes+0x7d44/0x9730 01:27:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) [ 312.373399][T14279] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 312.379131][T14279] __do_sys_io_uring_enter+0xf48/0x1f00 [ 312.384786][T14279] ? io_submit_sqes+0x9730/0x9730 [ 312.389813][T14279] ? rcu_read_lock_sched_held+0xd/0x70 [ 312.395272][T14279] ? lock_acquire+0x442/0x510 [ 312.399951][T14279] ? rcu_read_lock_sched_held+0xd/0x70 [ 312.405411][T14279] ? lock_release+0x522/0x720 [ 312.410090][T14279] ? __context_tracking_exit+0xb8/0xe0 [ 312.415550][T14279] ? lock_downgrade+0x6e0/0x6e0 [ 312.420408][T14279] ? lock_downgrade+0x6e0/0x6e0 [ 312.425264][T14279] ? get_vtime_delta+0x26e/0x420 [ 312.430200][T14279] ? syscall_enter_from_user_mode+0x21/0x70 [ 312.436084][T14279] do_syscall_64+0x35/0xb0 [ 312.440491][T14279] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 312.446377][T14279] RIP: 0033:0x4665f9 [ 312.450264][T14279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 312.469862][T14279] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 312.478264][T14279] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 312.486221][T14279] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 312.494266][T14279] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 312.502223][T14279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 312.510174][T14279] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 01:27:43 executing program 2 (fault-call:8 fault-nth:45): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000400)=[@prinfo={0x14, 0x84, 0x7, {0x1}}, @sndrcv={0x2c}], 0x40}, 0x0) 01:27:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x10, 0x2}, 0x10) 01:27:43 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000040), &(0x7f0000000080)=0x4) 01:27:43 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) connect$inet(r1, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 01:27:43 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1f00, 0x0) 01:27:43 executing program 0: r0 = socket(0x10, 0x8000000000000003, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="7c00000010001fffe20000000000000000000202", @ANYRES32=0x0, @ANYBLOB="09fb5056d1df39cf540012800b000100627269646765001344000280050019000800000006000600080080000c002300f8ffffffffffffbf5100180000000000080015003f00000005006500000000000c002000070000000000000008000a00d0"], 0x7c}}, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x40000000000024a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 01:27:43 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='numa_maps\x00') read$FUSE(r0, &(0x7f0000002d00)={0x2020}, 0x2020) 01:27:43 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) clock_gettime(0x0, &(0x7f000000be00)) [ 312.690874][T14333] FAULT_INJECTION: forcing a failure. [ 312.690874][T14333] name failslab, interval 1, probability 0, space 0, times 0 [ 312.706323][T14333] CPU: 1 PID: 14333 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 312.714756][T14333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.724815][T14333] Call Trace: [ 312.728089][T14333] dump_stack_lvl+0xcd/0x134 [ 312.732687][T14333] should_fail.cold+0x5/0xa 01:27:43 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x6, 0x4) [ 312.737201][T14333] should_failslab+0x5/0x10 [ 312.741710][T14333] kmem_cache_alloc_bulk+0x4a/0x490 [ 312.749744][T14333] io_submit_sqes+0x7d44/0x9730 [ 312.754956][T14333] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 312.760684][T14333] __do_sys_io_uring_enter+0xf48/0x1f00 [ 312.766241][T14333] ? io_submit_sqes+0x9730/0x9730 [ 312.771365][T14333] ? rcu_read_lock_sched_held+0xd/0x70 [ 312.776841][T14333] ? lock_acquire+0x442/0x510 [ 312.781521][T14333] ? rcu_read_lock_sched_held+0xd/0x70 01:27:43 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe00, 0x0) [ 312.786980][T14333] ? lock_release+0x522/0x720 [ 312.791666][T14333] ? __context_tracking_exit+0xb8/0xe0 [ 312.797125][T14333] ? lock_downgrade+0x6e0/0x6e0 [ 312.801977][T14333] ? lock_downgrade+0x6e0/0x6e0 [ 312.806830][T14333] ? get_vtime_delta+0x26e/0x420 [ 312.816232][T14333] ? syscall_enter_from_user_mode+0x21/0x70 [ 312.822429][T14333] do_syscall_64+0x35/0xb0 [ 312.826864][T14333] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 312.832768][T14333] RIP: 0033:0x4665f9 [ 312.836662][T14333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 312.857060][T14333] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 312.865483][T14333] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 312.873468][T14333] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 312.879262][T14346] hpfs: hpfs_map_sector(): read error 01:27:43 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x5, 0x0) [ 312.881527][T14333] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 312.881544][T14333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 312.881557][T14333] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 [ 312.966921][T14349] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 313.003207][ T3112] nbd_handle_cmd: 11 callbacks suppressed [ 313.003228][ T3112] block nbd5: Attempted send on invalid socket 01:27:43 executing program 2 (fault-call:8 fault-nth:46): r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:43 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2000, 0x0) 01:27:43 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:43 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 313.020699][ T3112] print_req_error: 11 callbacks suppressed [ 313.020712][ T3112] blk_update_request: I/O error, dev nbd5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 313.033512][T14349] device bridge1 entered promiscuous mode [ 313.045042][T14352] hpfs: hpfs_map_sector(): read error 01:27:43 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) memfd_create(&(0x7f0000001200)='.@:,)\\\xc9.{\x00', 0x2) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:43 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2010, 0x0) [ 313.167900][ T3112] block nbd5: Attempted send on invalid socket [ 313.174629][ T3112] blk_update_request: I/O error, dev nbd5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 313.192192][T14370] hpfs: hpfs_map_sector(): read error [ 313.227267][T14373] FAULT_INJECTION: forcing a failure. [ 313.227267][T14373] name failslab, interval 1, probability 0, space 0, times 0 [ 313.256208][ T2044] block nbd3: Attempted send on invalid socket [ 313.262603][ T2044] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 313.276476][T14366] hpfs: hpfs_map_sector(): read error [ 313.290174][ T2044] block nbd4: Attempted send on invalid socket [ 313.296654][ T2044] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 313.307685][T14363] hpfs: hpfs_map_sector(): read error 01:27:43 executing program 0 (fault-call:2 fault-nth:0): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:43 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:43 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2300, 0x0) [ 313.439859][T14373] CPU: 1 PID: 14373 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 313.440484][T14388] FAULT_INJECTION: forcing a failure. [ 313.440484][T14388] name failslab, interval 1, probability 0, space 0, times 0 [ 313.448570][T14373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.448582][T14373] Call Trace: [ 313.448588][T14373] dump_stack_lvl+0xcd/0x134 [ 313.448612][T14373] should_fail.cold+0x5/0xa [ 313.448633][T14373] should_failslab+0x5/0x10 [ 313.488286][T14373] kmem_cache_alloc_bulk+0x4a/0x490 [ 313.493488][T14373] io_submit_sqes+0x7d44/0x9730 [ 313.498338][T14373] ? __do_sys_io_uring_enter+0xf48/0x1f00 [ 313.504045][T14373] __do_sys_io_uring_enter+0xf48/0x1f00 [ 313.509583][T14373] ? io_submit_sqes+0x9730/0x9730 [ 313.514943][T14373] ? rcu_read_lock_sched_held+0xd/0x70 [ 313.520393][T14373] ? lock_acquire+0x442/0x510 [ 313.525058][T14373] ? rcu_read_lock_sched_held+0xd/0x70 [ 313.530502][T14373] ? lock_release+0x522/0x720 [ 313.535251][T14373] ? __context_tracking_exit+0xb8/0xe0 [ 313.540700][T14373] ? lock_downgrade+0x6e0/0x6e0 [ 313.545536][T14373] ? lock_downgrade+0x6e0/0x6e0 [ 313.550376][T14373] ? get_vtime_delta+0x26e/0x420 [ 313.555309][T14373] ? syscall_enter_from_user_mode+0x21/0x70 [ 313.561277][T14373] do_syscall_64+0x35/0xb0 [ 313.565683][T14373] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 313.571565][T14373] RIP: 0033:0x4665f9 [ 313.575533][T14373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 313.595302][T14373] RSP: 002b:00007ff8549db188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 313.603703][T14373] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 313.611746][T14373] RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000004 [ 313.619700][T14373] RBP: 00007ff8549db1d0 R08: 0000000000000000 R09: 0000000000000000 [ 313.627655][T14373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:27:44 executing program 3 (fault-call:2 fault-nth:0): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:44 executing program 4 (fault-call:2 fault-nth:0): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 313.635610][T14373] R13: 00007fff81ac534f R14: 00007ff8549db300 R15: 0000000000022000 [ 313.658641][ T3112] block nbd5: Attempted send on invalid socket [ 313.665374][ T3112] blk_update_request: I/O error, dev nbd5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 313.676613][T14389] hpfs: hpfs_map_sector(): read error 01:27:44 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 313.702532][T14388] CPU: 1 PID: 14388 Comm: syz-executor.0 Not tainted 5.14.0-syzkaller #0 [ 313.706720][T14398] FAULT_INJECTION: forcing a failure. [ 313.706720][T14398] name failslab, interval 1, probability 0, space 0, times 0 [ 313.711079][T14388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.711092][T14388] Call Trace: [ 313.711100][T14388] dump_stack_lvl+0xcd/0x134 [ 313.711125][T14388] should_fail.cold+0x5/0xa [ 313.746205][T14388] should_failslab+0x5/0x10 [ 313.750718][T14388] __kmalloc_track_caller+0x79/0x420 [ 313.756006][T14388] ? strndup_user+0x70/0xe0 [ 313.760599][T14388] ? lock_release+0x522/0x720 [ 313.765284][T14388] memdup_user+0x22/0xd0 [ 313.769531][T14388] strndup_user+0x70/0xe0 [ 313.773865][T14388] __x64_sys_mount+0x134/0x300 [ 313.778805][T14388] ? copy_mnt_ns+0xae0/0xae0 [ 313.783408][T14388] ? syscall_enter_from_user_mode+0x21/0x70 [ 313.789306][T14388] do_syscall_64+0x35/0xb0 [ 313.790247][T14404] FAULT_INJECTION: forcing a failure. [ 313.790247][T14404] name failslab, interval 1, probability 0, space 0, times 0 [ 313.793727][T14388] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 313.793753][T14388] RIP: 0033:0x4665f9 [ 313.793768][T14388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 313.793787][T14388] RSP: 002b:00007f29277e9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 313.793808][T14388] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 313.852369][T14388] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000020000000 [ 313.860347][T14388] RBP: 00007f29277e91d0 R08: 0000000000000000 R09: 0000000000000000 [ 313.868323][T14388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 313.876292][T14388] R13: 00007ffced79e67f R14: 00007f29277e9300 R15: 0000000000022000 [ 313.887672][T14404] CPU: 0 PID: 14404 Comm: syz-executor.3 Not tainted 5.14.0-syzkaller #0 [ 313.896127][T14404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.906188][T14404] Call Trace: [ 313.909464][T14404] dump_stack_lvl+0xcd/0x134 [ 313.914049][T14404] should_fail.cold+0x5/0xa [ 313.918544][T14404] should_failslab+0x5/0x10 [ 313.923047][T14404] __kmalloc_track_caller+0x79/0x420 [ 313.928320][T14404] ? strndup_user+0x70/0xe0 [ 313.932811][T14404] ? lock_release+0x522/0x720 [ 313.937496][T14404] memdup_user+0x22/0xd0 [ 313.941746][T14404] strndup_user+0x70/0xe0 [ 313.946065][T14404] __x64_sys_mount+0x134/0x300 [ 313.950844][T14404] ? copy_mnt_ns+0xae0/0xae0 [ 313.955424][T14404] ? syscall_enter_from_user_mode+0x21/0x70 [ 313.961416][T14404] do_syscall_64+0x35/0xb0 [ 313.965822][T14404] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 313.971703][T14404] RIP: 0033:0x4665f9 [ 313.975582][T14404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 313.995177][T14404] RSP: 002b:00007f32794ef188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 314.003578][T14404] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 314.011533][T14404] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000020000000 [ 314.019488][T14404] RBP: 00007f32794ef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 314.027552][T14404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 314.035509][T14404] R13: 00007ffd02a1206f R14: 00007f32794ef300 R15: 0000000000022000 [ 314.057645][T14398] CPU: 0 PID: 14398 Comm: syz-executor.4 Not tainted 5.14.0-syzkaller #0 [ 314.066088][T14398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.076930][T14398] Call Trace: [ 314.080207][T14398] dump_stack_lvl+0xcd/0x134 [ 314.084802][T14398] should_fail.cold+0x5/0xa [ 314.089313][T14398] should_failslab+0x5/0x10 [ 314.093822][T14398] __kmalloc_track_caller+0x79/0x420 [ 314.099111][T14398] ? strndup_user+0x70/0xe0 [ 314.103617][T14398] ? lock_release+0x522/0x720 [ 314.108298][T14398] memdup_user+0x22/0xd0 [ 314.112545][T14398] strndup_user+0x70/0xe0 [ 314.116884][T14398] __x64_sys_mount+0x134/0x300 [ 314.121668][T14398] ? copy_mnt_ns+0xae0/0xae0 [ 314.126257][T14398] ? syscall_enter_from_user_mode+0x21/0x70 [ 314.132152][T14398] do_syscall_64+0x35/0xb0 [ 314.136570][T14398] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 314.142466][T14398] RIP: 0033:0x4665f9 [ 314.146356][T14398] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 314.166142][T14398] RSP: 002b:00007f44b9bd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 314.174556][T14398] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 314.182527][T14398] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000020000000 [ 314.191283][T14398] RBP: 00007f44b9bd91d0 R08: 0000000000000000 R09: 0000000000000000 01:27:44 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:44 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3f00, 0x0) 01:27:44 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 314.199255][T14398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 314.209222][T14398] R13: 00007ffe77a216ff R14: 00007f44b9bd9300 R15: 0000000000022000 01:27:44 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:44 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file1\x00', 0xf40, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd010000000000000100000000000000dc01", 0x200}], 0x0, &(0x7f00000000c0)=ANY=[]) syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) openat(r0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) read$FUSE(0xffffffffffffffff, &(0x7f0000004740)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000002300), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000004340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000004200)={0x50, 0x0, r5}, 0x50) write$FUSE_INIT(r1, &(0x7f0000000080)={0x50, 0xffffffffffffffda, r5, {0x7, 0x21, 0x4, 0x70, 0x4, 0xc8e1, 0x6, 0x2}}, 0x50) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000026c0)={&(0x7f0000002380), 0xc, &(0x7f0000002400)={&(0x7f0000002480)={0xb0, r4, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x54646008}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x60, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4899e923}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x23b7bc0a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x17881346}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x95}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6860dcf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x97}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}, {0x5}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x480}, 0x40004) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 314.261540][ T2044] block nbd5: Attempted send on invalid socket [ 314.268145][ T2044] blk_update_request: I/O error, dev nbd5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 314.279483][T14412] hpfs: hpfs_map_sector(): read error 01:27:44 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 314.327826][ T2044] block nbd0: Attempted send on invalid socket [ 314.334103][ T2044] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 314.346086][T14419] hpfs: hpfs_map_sector(): read error 01:27:44 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:44 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4000, 0x0) [ 314.452091][T14424] loop5: detected capacity change from 0 to 264192 [ 314.459786][ T2044] block nbd4: Attempted send on invalid socket [ 314.466049][ T2044] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 314.477127][T14426] hpfs: hpfs_map_sector(): read error [ 314.491852][ T3112] block nbd3: Attempted send on invalid socket 01:27:45 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:27:45 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 314.498299][ T3112] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 314.525855][T14434] hpfs: hpfs_map_sector(): read error [ 314.566920][ T2044] block nbd1: Attempted send on invalid socket [ 314.573376][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 314.587194][T14440] hpfs: hpfs_map_sector(): read error [ 314.601676][T14444] hpfs: hpfs_map_sector(): read error [ 314.609646][T14446] hpfs: hpfs_map_sector(): read error 01:27:45 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x2}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 314.620843][T14447] hpfs: hpfs_map_sector(): read error [ 314.628317][T14452] hpfs: hpfs_map_sector(): read error [ 314.656518][T14456] hpfs: hpfs_map_sector(): read error 01:27:45 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4800, 0x0) 01:27:45 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x3}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x2}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file1\x00', 0xf40, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd010000000000000100000000000000dc01", 0x200}], 0x0, &(0x7f00000000c0)=ANY=[]) syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) openat(r0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) read$FUSE(0xffffffffffffffff, &(0x7f0000004740)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000002300), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000004340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000004200)={0x50, 0x0, r5}, 0x50) write$FUSE_INIT(r1, &(0x7f0000000080)={0x50, 0xffffffffffffffda, r5, {0x7, 0x21, 0x4, 0x70, 0x4, 0xc8e1, 0x6, 0x2}}, 0x50) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000026c0)={&(0x7f0000002380), 0xc, &(0x7f0000002400)={&(0x7f0000002480)={0xb0, r4, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x54646008}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x60, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4899e923}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x23b7bc0a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x17881346}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x95}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6860dcf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x97}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}, {0x5}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x480}, 0x40004) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 01:27:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x2, 0x0, 0x0, 0x0) [ 314.694091][T14459] hpfs: hpfs_map_sector(): read error [ 314.730125][T14468] hpfs: hpfs_map_sector(): read error 01:27:45 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x3}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x4}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x2}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x4}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4c00, 0x0) [ 314.803006][T14479] hpfs: hpfs_map_sector(): read error [ 314.838074][T14485] hpfs: hpfs_map_sector(): read error 01:27:45 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x5}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x3}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 314.915550][T14494] loop5: detected capacity change from 0 to 264192 01:27:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x4, 0x0, 0x0, 0x0) [ 314.966953][T14512] hpfs: hpfs_map_sector(): read error 01:27:45 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x5}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x6}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 315.021515][T14519] hpfs: hpfs_map_sector(): read error 01:27:45 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file1\x00', 0xf40, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f00000000c0)=ANY=[]) syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) openat(r0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) read$FUSE(0xffffffffffffffff, &(0x7f0000004740)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000002300), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000004340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000004200)={0x50, 0x0, r5}, 0x50) write$FUSE_INIT(r1, &(0x7f0000000080)={0x50, 0xffffffffffffffda, r5, {0x7, 0x21, 0x4, 0x70, 0x4, 0xc8e1, 0x6, 0x2}}, 0x50) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000026c0)={&(0x7f0000002380), 0xc, &(0x7f0000002400)={&(0x7f0000002480)={0xb0, r4, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x54646008}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x60, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4899e923}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x23b7bc0a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x17881346}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x95}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6860dcf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x97}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}, {0x5}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x480}, 0x40004) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 01:27:45 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6000, 0x0) 01:27:45 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x4}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x7}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x8, 0x0, 0x0, 0x0) 01:27:45 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6800, 0x0) 01:27:45 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x6}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x5}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x8}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x7}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6c00, 0x0) 01:27:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x10, 0x0, 0x0, 0x0) [ 315.373844][T14577] loop5: detected capacity change from 0 to 264192 01:27:45 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x8}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x9}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x6}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:45 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7400, 0x0) 01:27:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x1f00, 0x0, 0x0, 0x0) 01:27:46 executing program 5: syz_io_uring_setup(0x3016, &(0x7f0000003980), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, &(0x7f0000003a40)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/gspca_mr97310a', 0x0, 0x2) r2 = syz_io_uring_setup(0x6e4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000656000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r5 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000200)=@IORING_OP_WRITE_FIXED={0x5, 0x2, 0x2000, @fd=r8, 0x7, 0x4, 0x6, 0x0, 0x0, {0x0, r9}}, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f0000000180)=@IORING_OP_WRITE_FIXED={0x5, 0x2, 0x6000, @fd=r2, 0x4, 0x1, 0x5, 0x0, 0x1, {0x0, r9}}, 0x2) syz_io_uring_submit(r3, r4, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x11c, &(0x7f0000000000)=0x80000001, 0x0, 0x4) 01:27:46 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7a00, 0x0) 01:27:46 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x7}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xa}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x9}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x2000, 0x0, 0x0, 0x0) 01:27:46 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xa}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xc}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x8}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8403, 0x0) 01:27:46 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xc}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xd}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xf}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x9}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x4000, 0x0, 0x0, 0x0) 01:27:46 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xd}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xb81a, 0x0) [ 315.828832][T14680] hpfs: hpfs_map_sector(): read error [ 315.863156][T14692] hpfs: hpfs_map_sector(): read error 01:27:46 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xa}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x10}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xf}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x5400, 0x0, 0x0, 0x0) 01:27:46 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x5, 0xffffffffffffffff, 0x3) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 01:27:46 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xedc0, 0x0) 01:27:46 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x11}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf000, 0x0) 01:27:46 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x10}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xc}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfeff, 0x0) 01:27:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x60ff, 0x0, 0x0, 0x0) 01:27:46 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff00, 0x0) 01:27:46 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x11}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xd}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x23}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff0f, 0x0) 01:27:46 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x48}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xf}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x9700, 0x0, 0x0, 0x0) 01:27:46 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x23}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000001, 0x12, 0xffffffffffffffff, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x202}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget(0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)=[0x0, 0x3, 0x7fbd, 0x3599]) r2 = semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{}, {0x3, 0x7, 0x800}], 0x2) semtimedop(r2, &(0x7f0000000080)=[{0x3, 0x5}], 0x1, 0x0) semctl$SETALL(r1, 0x0, 0x11, 0x0) r3 = openat(r0, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x401080, 0x4) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000080)=""/7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r4, 0x0) semtimedop(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0xd8f, 0x0) [ 316.333841][ T3244] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.340254][ T3244] ieee802154 phy1 wpan1: encryption failed: -22 01:27:46 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffe, 0x0) 01:27:46 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x10}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x4c}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x20000, 0x0, 0x0, 0x0) 01:27:47 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x48}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 316.463989][T14816] loop5: detected capacity change from 0 to 16 01:27:47 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x60}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:47 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x11}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:47 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x4c}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 316.531652][ T37] audit: type=1800 audit(1630459667.012:11): pid=14816 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=3 res=0 errno=0 01:27:47 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000001, 0x12, 0xffffffffffffffff, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x202}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget(0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)=[0x0, 0x3, 0x7fbd, 0x3599]) r2 = semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{}, {0x3, 0x7, 0x800}], 0x2) semtimedop(r2, &(0x7f0000000080)=[{0x3, 0x5}], 0x1, 0x0) semctl$SETALL(r1, 0x0, 0x11, 0x0) r3 = openat(r0, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x401080, 0x4) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000080)=""/7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r4, 0x0) semtimedop(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0xd8f, 0x0) 01:27:47 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x68}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x40000, 0x0, 0x0, 0x0) 01:27:47 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x6c}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:47 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x20000, 0x0) 01:27:47 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x60}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:47 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x74}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:47 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x23}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 316.698766][T14866] loop5: detected capacity change from 0 to 16 01:27:47 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x48}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 316.762421][ T37] audit: type=1800 audit(1630459667.242:12): pid=14866 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=4 res=0 errno=0 01:27:47 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x68}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x104000, 0x0, 0x0, 0x0) 01:27:47 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000001, 0x12, 0xffffffffffffffff, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x202}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget(0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)=[0x0, 0x3, 0x7fbd, 0x3599]) r2 = semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{}, {0x3, 0x7, 0x800}], 0x2) semtimedop(r2, &(0x7f0000000080)=[{0x3, 0x5}], 0x1, 0x0) semctl$SETALL(r1, 0x0, 0x11, 0x0) r3 = openat(r0, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x401080, 0x4) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000080)=""/7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r4, 0x0) semtimedop(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0xd8f, 0x0) 01:27:47 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x7a}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:47 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x40000, 0x0) 01:27:47 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x6c}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:47 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xff}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:47 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x4c}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:47 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2, 0x0) [ 316.985275][T14926] loop5: detected capacity change from 0 to 16 01:27:47 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x60000, 0x0) 01:27:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x400000, 0x0, 0x0, 0x0) 01:27:47 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x60}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:47 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x74}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 317.086684][T14951] hpfs: hpfs_map_sector(): read error [ 317.093070][ T37] audit: type=1800 audit(1630459667.572:13): pid=14926 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=5 res=0 errno=0 [ 317.125600][T14956] hpfs: hpfs_map_sector(): read error 01:27:47 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3, 0x0) 01:27:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x401000, 0x0, 0x0, 0x0) 01:27:47 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2, 0x0) 01:27:47 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x80000, 0x0) 01:27:47 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x68}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:47 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x7a}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x4af000, 0x0, 0x0, 0x0) 01:27:47 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4, 0x0) 01:27:47 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x6c}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 317.282458][T14976] hpfs: hpfs_map_sector(): read error 01:27:47 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfe}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:47 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0xe, r3, 0x7, 0x4) tkill(r3, 0x38) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x7f, 0x6, 0x0, 0x1, 0x0, 0x20, 0x30, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffff7, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x407, 0x6, 0x8, 0x5, 0xa6, 0x51, 0x1, 0x0, 0x308, 0x0, 0x7f}, r3, 0xc, r0, 0x9) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x6, 0xf4, 0x9, 0xf7, 0x0, 0x20, 0x20000, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x80408, 0xbb89, 0x0, 0x3, 0x8, 0x9, 0x3, 0x0, 0x0, 0x0, 0x400}, r3, 0xe, r2, 0x1) [ 317.339963][T14987] hpfs: hpfs_map_sector(): read error 01:27:47 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa0000, 0x0) 01:27:47 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x74}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:47 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x5, 0x0) 01:27:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x4fc000, 0x0, 0x0, 0x0) [ 317.427652][T15013] hpfs: hpfs_map_sector(): read error [ 317.462725][T15019] hpfs: hpfs_map_sector(): read error 01:27:48 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x7a}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:48 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xff}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:48 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc0000, 0x0) 01:27:48 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfe}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:48 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6, 0x0) 01:27:48 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0xe, r3, 0x7, 0x4) tkill(r3, 0x38) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x7f, 0x6, 0x0, 0x1, 0x0, 0x20, 0x30, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffff7, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x407, 0x6, 0x8, 0x5, 0xa6, 0x51, 0x1, 0x0, 0x308, 0x0, 0x7f}, r3, 0xc, r0, 0x9) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x6, 0xf4, 0x9, 0xf7, 0x0, 0x20, 0x20000, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x80408, 0xbb89, 0x0, 0x3, 0x8, 0x9, 0x3, 0x0, 0x0, 0x0, 0x400}, r3, 0xe, r2, 0x1) [ 317.591187][T15038] hpfs: hpfs_map_sector(): read error [ 317.611146][T15046] hpfs: hpfs_map_sector(): read error 01:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x503520, 0x0, 0x0, 0x0) 01:27:48 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2, 0x0) 01:27:48 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xff}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:27:48 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe0000, 0x0) 01:27:48 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7, 0x0) [ 317.731168][T15067] hpfs: hpfs_map_sector(): read error [ 317.761333][T15075] hpfs: hpfs_map_sector(): read error [ 317.767184][T15074] hpfs: hpfs_map_sector(): read error 01:27:48 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x400000, 0x0) [ 317.813214][T15084] hpfs: hpfs_map_sector(): read error 01:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x540000, 0x0, 0x0, 0x0) 01:27:48 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3, 0x0) 01:27:48 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2, 0x0) 01:27:48 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0xe, r3, 0x7, 0x4) tkill(r3, 0x38) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x7f, 0x6, 0x0, 0x1, 0x0, 0x20, 0x30, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffff7, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x407, 0x6, 0x8, 0x5, 0xa6, 0x51, 0x1, 0x0, 0x308, 0x0, 0x7f}, r3, 0xc, r0, 0x9) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x6, 0xf4, 0x9, 0xf7, 0x0, 0x20, 0x20000, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x80408, 0xbb89, 0x0, 0x3, 0x8, 0x9, 0x3, 0x0, 0x0, 0x0, 0x400}, r3, 0xe, r2, 0x1) 01:27:48 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8, 0x0) [ 317.910767][T15098] hpfs: hpfs_map_sector(): read error [ 317.925515][T15103] hpfs: hpfs_map_sector(): read error [ 317.934759][T15107] hpfs: hpfs_map_sector(): read error [ 317.944486][T15104] hpfs: hpfs_map_sector(): read error 01:27:48 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4, 0x0) 01:27:48 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3, 0x0) 01:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x970000, 0x0, 0x0, 0x0) [ 317.965933][T15112] hpfs: hpfs_map_sector(): read error [ 317.966069][T15117] hpfs: hpfs_map_sector(): read error [ 317.972347][T15114] hpfs: hpfs_map_sector(): read error [ 318.005108][T15120] hpfs: hpfs_map_sector(): read error 01:27:48 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe0ffff, 0x0) [ 318.057698][ T3112] nbd_handle_cmd: 33 callbacks suppressed [ 318.057718][ T3112] block nbd0: Attempted send on invalid socket [ 318.069766][ T3112] print_req_error: 33 callbacks suppressed [ 318.069781][ T3112] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.098353][ T2044] block nbd3: Attempted send on invalid socket 01:27:48 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf0ffff, 0x0) [ 318.104732][ T2044] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.120671][ T3112] block nbd4: Attempted send on invalid socket [ 318.121595][T15127] hpfs: hpfs_map_sector(): read error [ 318.126910][ T3112] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.134469][T15126] hpfs: hpfs_map_sector(): read error [ 318.149364][T15141] hpfs: hpfs_map_sector(): read error 01:27:48 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0xe, r3, 0x7, 0x4) tkill(r3, 0x38) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x7f, 0x6, 0x0, 0x1, 0x0, 0x20, 0x30, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffff7, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x407, 0x6, 0x8, 0x5, 0xa6, 0x51, 0x1, 0x0, 0x308, 0x0, 0x7f}, r3, 0xc, r0, 0x9) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x6, 0xf4, 0x9, 0xf7, 0x0, 0x20, 0x20000, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x80408, 0xbb89, 0x0, 0x3, 0x8, 0x9, 0x3, 0x0, 0x0, 0x0, 0x400}, r3, 0xe, r2, 0x1) [ 318.180910][ T2044] block nbd4: Attempted send on invalid socket [ 318.187189][ T2044] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.201167][T15148] hpfs: hpfs_map_sector(): read error 01:27:48 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x5, 0x0) [ 318.248260][ T3112] block nbd0: Attempted send on invalid socket [ 318.254831][ T3112] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.271575][T15131] hpfs: hpfs_map_sector(): read error [ 318.279816][ T2044] block nbd3: Attempted send on invalid socket [ 318.286110][ T2044] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 01:27:48 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x9, 0x0) 01:27:48 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1000000, 0x0) 01:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0xc04a01, 0x0, 0x0, 0x0) [ 318.304910][ T3112] block nbd4: Attempted send on invalid socket [ 318.311123][ T3112] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.322566][T15133] hpfs: hpfs_map_sector(): read error 01:27:48 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6, 0x0) 01:27:48 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4, 0x0) [ 318.347718][T15158] hpfs: hpfs_map_sector(): read error [ 318.371393][ T3112] block nbd4: Attempted send on invalid socket [ 318.377837][ T3112] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.388948][T15161] hpfs: hpfs_map_sector(): read error [ 318.429485][ T2044] block nbd1: Attempted send on invalid socket [ 318.435870][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.439785][ T3112] block nbd3: Attempted send on invalid socket [ 318.454461][T15167] hpfs: hpfs_map_sector(): read error [ 318.454677][ T3112] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.474365][T15172] hpfs: hpfs_map_sector(): read error 01:27:49 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0xe, r3, 0x7, 0x4) tkill(r3, 0x38) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x7f, 0x6, 0x0, 0x1, 0x0, 0x20, 0x30, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffff7, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x407, 0x6, 0x8, 0x5, 0xa6, 0x51, 0x1, 0x0, 0x308, 0x0, 0x7f}, r3, 0xc, r0, 0x9) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) 01:27:49 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x5, 0x0) [ 318.508583][T15174] hpfs: hpfs_map_sector(): read error [ 318.517096][T15185] hpfs: hpfs_map_sector(): read error [ 318.541895][T15181] hpfs: hpfs_map_sector(): read error 01:27:49 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7, 0x0) 01:27:49 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2000000, 0x0) [ 318.560278][T15191] hpfs: hpfs_map_sector(): read error 01:27:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0xc04f00, 0x0, 0x0, 0x0) 01:27:49 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6, 0x0) [ 318.587761][T15195] hpfs: hpfs_map_sector(): read error [ 318.621143][T15193] hpfs: hpfs_map_sector(): read error 01:27:49 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa, 0x0) 01:27:49 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8, 0x0) [ 318.632508][T15200] hpfs: hpfs_map_sector(): read error [ 318.656862][T15206] hpfs: hpfs_map_sector(): read error 01:27:49 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0xe, r3, 0x7, 0x4) tkill(r3, 0x38) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x7f, 0x6, 0x0, 0x1, 0x0, 0x20, 0x30, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffff7, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x407, 0x6, 0x8, 0x5, 0xa6, 0x51, 0x1, 0x0, 0x308, 0x0, 0x7f}, r3, 0xc, r0, 0x9) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) [ 318.701273][T15213] hpfs: hpfs_map_sector(): read error [ 318.707965][T15209] hpfs: hpfs_map_sector(): read error [ 318.716583][T15212] hpfs: hpfs_map_sector(): read error [ 318.725100][T15219] hpfs: hpfs_map_sector(): read error 01:27:49 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc, 0x0) 01:27:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0xf04a00, 0x0, 0x0, 0x0) 01:27:49 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x9, 0x0) 01:27:49 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7, 0x0) 01:27:49 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3000000, 0x0) [ 318.750832][T15226] hpfs: hpfs_map_sector(): read error [ 318.764692][T15223] hpfs: hpfs_map_sector(): read error [ 318.767167][T15229] hpfs: hpfs_map_sector(): read error [ 318.779197][T15231] hpfs: hpfs_map_sector(): read error [ 318.828748][T15235] hpfs: hpfs_map_sector(): read error [ 318.851206][T15242] hpfs: hpfs_map_sector(): read error [ 318.857779][T15241] hpfs: hpfs_map_sector(): read error 01:27:49 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa, 0x0) 01:27:49 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xd, 0x0) [ 318.874399][T15247] hpfs: hpfs_map_sector(): read error [ 318.881765][T15250] hpfs: hpfs_map_sector(): read error [ 318.895455][T15253] hpfs: hpfs_map_sector(): read error [ 318.907242][T15254] hpfs: hpfs_map_sector(): read error 01:27:49 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4000000, 0x0) 01:27:49 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8, 0x0) [ 318.925267][T15260] hpfs: hpfs_map_sector(): read error 01:27:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x1000000, 0x0, 0x0, 0x0) 01:27:49 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0xe, r3, 0x7, 0x4) tkill(r3, 0x38) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x7f, 0x6, 0x0, 0x1, 0x0, 0x20, 0x30, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffff7, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x407, 0x6, 0x8, 0x5, 0xa6, 0x51, 0x1, 0x0, 0x308, 0x0, 0x7f}, r3, 0xc, r0, 0x9) [ 318.986084][T15267] hpfs: hpfs_map_sector(): read error [ 318.994721][T15265] hpfs: hpfs_map_sector(): read error [ 318.996255][T15272] hpfs: hpfs_map_sector(): read error [ 319.019484][T15275] hpfs: hpfs_map_sector(): read error 01:27:49 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x5000000, 0x0) 01:27:49 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe, 0x0) 01:27:49 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc, 0x0) [ 319.033442][T15280] hpfs: hpfs_map_sector(): read error [ 319.047486][T15278] hpfs: hpfs_map_sector(): read error [ 319.074510][T15282] hpfs: hpfs_map_sector(): read error 01:27:49 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x9, 0x0) [ 319.100315][T15288] hpfs: hpfs_map_sector(): read error [ 319.111806][T15290] hpfs: hpfs_map_sector(): read error [ 319.124721][T15291] hpfs: hpfs_map_sector(): read error [ 319.138136][T15296] hpfs: hpfs_map_sector(): read error 01:27:49 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf, 0x0) 01:27:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x14ac000, 0x0, 0x0, 0x0) 01:27:49 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6000000, 0x0) 01:27:49 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xd, 0x0) [ 319.181521][T15299] hpfs: hpfs_map_sector(): read error [ 319.186527][T15301] hpfs: hpfs_map_sector(): read error [ 319.218635][T15305] hpfs: hpfs_map_sector(): read error 01:27:49 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0xe, r3, 0x7, 0x4) tkill(r3, 0x38) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x7f, 0x6, 0x0, 0x1, 0x0, 0x20, 0x30, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffff7, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x407, 0x6, 0x8, 0x5, 0xa6, 0x51, 0x1, 0x0, 0x308, 0x0, 0x7f}, r3, 0xc, r0, 0x9) [ 319.285007][T15316] hpfs: hpfs_map_sector(): read error [ 319.295488][T15313] hpfs: hpfs_map_sector(): read error [ 319.301784][T15317] hpfs: hpfs_map_sector(): read error 01:27:49 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa, 0x0) 01:27:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x4000000, 0x0, 0x0, 0x0) [ 319.342914][T15323] hpfs: hpfs_map_sector(): read error [ 319.356034][T15327] hpfs: hpfs_map_sector(): read error [ 319.367499][T15329] hpfs: hpfs_map_sector(): read error 01:27:49 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7000000, 0x0) 01:27:49 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x10, 0x0) 01:27:49 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe, 0x0) [ 319.396639][T15336] hpfs: hpfs_map_sector(): read error [ 319.407317][T15331] hpfs: hpfs_map_sector(): read error [ 319.434618][T15339] hpfs: hpfs_map_sector(): read error 01:27:49 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc, 0x0) 01:27:50 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0xe, r3, 0x7, 0x4) tkill(r3, 0x38) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x7f, 0x6, 0x0, 0x1, 0x0, 0x20, 0x30, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffff7, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x407, 0x6, 0x8, 0x5, 0xa6, 0x51, 0x1, 0x0, 0x308, 0x0, 0x7f}, r3, 0xc, r0, 0x9) 01:27:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x8000000, 0x0, 0x0, 0x0) [ 319.500131][T15347] hpfs: hpfs_map_sector(): read error [ 319.518505][T15351] hpfs: hpfs_map_sector(): read error [ 319.530302][T15354] hpfs: hpfs_map_sector(): read error [ 319.531314][T15353] hpfs: hpfs_map_sector(): read error 01:27:50 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf, 0x0) 01:27:50 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8000000, 0x0) [ 319.588898][T15363] hpfs: hpfs_map_sector(): read error [ 319.596047][T15360] hpfs: hpfs_map_sector(): read error 01:27:50 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x11, 0x0) 01:27:50 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xd, 0x0) [ 319.642257][T15369] hpfs: hpfs_map_sector(): read error [ 319.665928][T15374] hpfs: hpfs_map_sector(): read error [ 319.679079][T15375] hpfs: hpfs_map_sector(): read error [ 319.690067][T15378] hpfs: hpfs_map_sector(): read error 01:27:50 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x9000000, 0x0) 01:27:50 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x10, 0x0) 01:27:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x10000000, 0x0, 0x0, 0x0) [ 319.755829][T15388] hpfs: hpfs_map_sector(): read error [ 319.758943][T15391] hpfs: hpfs_map_sector(): read error 01:27:50 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x23, 0x0) [ 319.799968][T15393] hpfs: hpfs_map_sector(): read error [ 319.815515][T15396] hpfs: hpfs_map_sector(): read error 01:27:50 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe, 0x0) 01:27:50 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0xe, r3, 0x7, 0x4) tkill(r3, 0x38) 01:27:50 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x11, 0x0) [ 319.852464][T15398] hpfs: hpfs_map_sector(): read error [ 319.876710][T15402] hpfs: hpfs_map_sector(): read error [ 319.886730][T15405] hpfs: hpfs_map_sector(): read error 01:27:50 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa000000, 0x0) 01:27:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x1f000000, 0x0, 0x0, 0x0) [ 319.943799][T15414] hpfs: hpfs_map_sector(): read error 01:27:50 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x48, 0x0) [ 319.994975][T15424] hpfs: hpfs_map_sector(): read error [ 320.000247][T15428] hpfs: hpfs_map_sector(): read error [ 320.025319][T15430] hpfs: hpfs_map_sector(): read error 01:27:50 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x23, 0x0) [ 320.057442][T15433] hpfs: hpfs_map_sector(): read error 01:27:50 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf, 0x0) 01:27:50 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0xe, r3, 0x7, 0x4) tkill(r3, 0x38) 01:27:50 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc000000, 0x0) [ 320.090716][T15439] hpfs: hpfs_map_sector(): read error 01:27:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x20000000, 0x0, 0x0, 0x0) 01:27:50 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x48, 0x0) [ 320.146469][T15445] hpfs: hpfs_map_sector(): read error 01:27:50 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4c, 0x0) [ 320.206668][T15455] hpfs: hpfs_map_sector(): read error [ 320.226982][T15461] hpfs: hpfs_map_sector(): read error 01:27:50 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x10, 0x0) [ 320.254245][T15463] hpfs: hpfs_map_sector(): read error [ 320.277058][T15470] hpfs: hpfs_map_sector(): read error [ 320.282740][T15468] hpfs: hpfs_map_sector(): read error [ 320.288939][T15472] hpfs: hpfs_map_sector(): read error [ 320.301203][T15478] hpfs: hpfs_map_sector(): read error [ 320.309855][T15476] hpfs: hpfs_map_sector(): read error 01:27:50 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xd000000, 0x0) 01:27:50 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x60, 0x0) 01:27:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x20355000, 0x0, 0x0, 0x0) 01:27:50 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4c, 0x0) 01:27:50 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x11, 0x0) [ 320.365612][T15482] hpfs: hpfs_map_sector(): read error 01:27:50 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0xe, r3, 0x7, 0x4) tkill(r3, 0x38) [ 320.411870][T15492] hpfs: hpfs_map_sector(): read error 01:27:50 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x60, 0x0) [ 320.448824][T15497] hpfs: hpfs_map_sector(): read error [ 320.463402][T15500] hpfs: hpfs_map_sector(): read error 01:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0xff600000, 0x0, 0x0, 0x0) 01:27:51 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x68, 0x0) [ 320.504181][T15507] hpfs: hpfs_map_sector(): read error [ 320.528006][T15509] hpfs: hpfs_map_sector(): read error 01:27:51 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf000000, 0x0) [ 320.560492][T15515] hpfs: hpfs_map_sector(): read error 01:27:51 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x23, 0x0) 01:27:51 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x68, 0x0) 01:27:51 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0xe, r3, 0x7, 0x4) 01:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0xffffffff, 0x0, 0x0, 0x0) 01:27:51 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6c, 0x0) 01:27:51 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x10000000, 0x0) [ 320.648433][T15532] hpfs: hpfs_map_sector(): read error [ 320.671579][T15536] hpfs: hpfs_map_sector(): read error 01:27:51 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x48, 0x0) 01:27:51 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x74, 0x0) 01:27:51 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6c, 0x0) 01:27:51 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) [ 320.821014][T15562] hpfs: hpfs_map_sector(): read error [ 320.855186][T15567] hpfs: hpfs_map_sector(): read error 01:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x2, 0x0, 0x0) 01:27:51 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7a, 0x0) [ 320.869263][T15569] hpfs: hpfs_map_sector(): read error 01:27:51 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x11000000, 0x0) 01:27:51 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4c, 0x0) [ 320.914885][T15577] hpfs: hpfs_map_sector(): read error 01:27:51 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x74, 0x0) 01:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x4, 0x0, 0x0) 01:27:51 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) 01:27:51 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf0, 0x0) [ 321.032758][T15599] hpfs: hpfs_map_sector(): read error [ 321.053539][T15602] hpfs: hpfs_map_sector(): read error [ 321.060947][T15600] hpfs: hpfs_map_sector(): read error 01:27:51 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7a, 0x0) 01:27:51 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x14000000, 0x0) 01:27:51 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x60, 0x0) [ 321.131370][T15611] hpfs: hpfs_map_sector(): read error 01:27:51 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x300, 0x0) 01:27:51 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf0, 0x0) 01:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x8, 0x0, 0x0) [ 321.226586][T15629] hpfs: hpfs_map_sector(): read error 01:27:51 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) gettid() 01:27:51 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1f000000, 0x0) 01:27:51 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x68, 0x0) [ 321.270679][T15633] hpfs: hpfs_map_sector(): read error 01:27:51 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfe, 0x0) [ 321.356162][T15648] hpfs: hpfs_map_sector(): read error 01:27:51 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6c, 0x0) 01:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x10, 0x0, 0x0) 01:27:51 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x383, 0x0) [ 321.406845][T15660] hpfs: hpfs_map_sector(): read error [ 321.415613][T15657] hpfs: hpfs_map_sector(): read error 01:27:51 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) 01:27:52 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x20000000, 0x0) 01:27:52 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x300, 0x0) [ 321.461370][T15671] hpfs: hpfs_map_sector(): read error 01:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x1f00, 0x0, 0x0) [ 321.560832][T15685] hpfs: hpfs_map_sector(): read error [ 321.589531][T15686] hpfs: hpfs_map_sector(): read error [ 321.603561][T15691] hpfs: hpfs_map_sector(): read error 01:27:52 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x385, 0x0) 01:27:52 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x74, 0x0) [ 321.611814][T15701] hpfs: hpfs_map_sector(): read error [ 321.625364][T15698] hpfs: hpfs_map_sector(): read error 01:27:52 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:52 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x388, 0x0) 01:27:52 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x20100000, 0x0) [ 321.674719][T15706] hpfs: hpfs_map_sector(): read error 01:27:52 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x500, 0x0) 01:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x2000, 0x0, 0x0) [ 321.725031][T15712] hpfs: hpfs_map_sector(): read error 01:27:52 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x600, 0x0) [ 321.790348][T15729] hpfs: hpfs_map_sector(): read error [ 321.818672][T15723] hpfs: hpfs_map_sector(): read error 01:27:52 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x23000000, 0x0) 01:27:52 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7a, 0x0) 01:27:52 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x39e, 0x0) 01:27:52 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:52 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x700, 0x0) [ 321.843435][T15741] hpfs: hpfs_map_sector(): read error [ 321.848176][T15746] hpfs: hpfs_map_sector(): read error 01:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x4000, 0x0, 0x0) [ 321.935082][T15758] hpfs: hpfs_map_sector(): read error [ 321.940664][T15753] hpfs: hpfs_map_sector(): read error 01:27:52 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf0, 0x0) 01:27:52 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3f000000, 0x0) 01:27:52 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x900, 0x0) [ 321.975549][T15762] hpfs: hpfs_map_sector(): read error [ 321.978448][T15770] hpfs: hpfs_map_sector(): read error [ 321.990568][T15766] hpfs: hpfs_map_sector(): read error 01:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x5400, 0x0, 0x0) 01:27:52 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 322.038897][T15777] hpfs: hpfs_map_sector(): read error [ 322.054820][T15782] hpfs: hpfs_map_sector(): read error 01:27:52 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x39f, 0x0) 01:27:52 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x40000000, 0x0) 01:27:52 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfe, 0x0) 01:27:52 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa00, 0x0) [ 322.127700][T15789] hpfs: hpfs_map_sector(): read error [ 322.157245][T15798] hpfs: hpfs_map_sector(): read error [ 322.168133][T15800] hpfs: hpfs_map_sector(): read error 01:27:52 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x48000000, 0x0) 01:27:52 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x60ff, 0x0, 0x0) 01:27:52 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3a0, 0x0) [ 322.189295][T15806] hpfs: hpfs_map_sector(): read error [ 322.206368][T15809] hpfs: hpfs_map_sector(): read error 01:27:52 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x300, 0x0) 01:27:52 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc00, 0x0) 01:27:52 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3a1, 0x0) [ 322.265115][T15819] hpfs: hpfs_map_sector(): read error [ 322.287360][T15824] hpfs: hpfs_map_sector(): read error [ 322.325444][T15834] hpfs: hpfs_map_sector(): read error 01:27:52 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:52 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x500, 0x0) [ 322.351224][T15836] hpfs: hpfs_map_sector(): read error [ 322.359593][T15837] hpfs: hpfs_map_sector(): read error [ 322.361844][T15846] hpfs: hpfs_map_sector(): read error 01:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x9700, 0x0, 0x0) 01:27:52 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4c000000, 0x0) 01:27:52 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3a2, 0x0) [ 322.420877][T15849] hpfs: hpfs_map_sector(): read error 01:27:52 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xd00, 0x0) 01:27:53 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 322.514373][T15869] hpfs: hpfs_map_sector(): read error [ 322.514737][T15870] hpfs: hpfs_map_sector(): read error [ 322.536232][T15875] hpfs: hpfs_map_sector(): read error [ 322.557742][T15879] hpfs: hpfs_map_sector(): read error 01:27:53 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x600, 0x0) [ 322.564882][T15882] hpfs: hpfs_map_sector(): read error 01:27:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x20000, 0x0, 0x0) 01:27:53 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x60000000, 0x0) 01:27:53 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe00, 0x0) [ 322.589970][T15888] hpfs: hpfs_map_sector(): read error 01:27:53 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3a3, 0x0) 01:27:53 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x68000000, 0x0) [ 322.634911][T15893] hpfs: hpfs_map_sector(): read error [ 322.657472][T15896] hpfs: hpfs_map_sector(): read error 01:27:53 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 322.687870][T15898] hpfs: hpfs_map_sector(): read error [ 322.696588][T15901] hpfs: hpfs_map_sector(): read error [ 322.709082][T15904] hpfs: hpfs_map_sector(): read error [ 322.723186][T15910] hpfs: hpfs_map_sector(): read error 01:27:53 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf00, 0x0) 01:27:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x40000, 0x0, 0x0) 01:27:53 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x700, 0x0) 01:27:53 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6c000000, 0x0) [ 322.749909][T15913] hpfs: hpfs_map_sector(): read error 01:27:53 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3a4, 0x0) 01:27:53 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 322.816789][T15923] hpfs: hpfs_map_sector(): read error [ 322.844070][T15929] hpfs: hpfs_map_sector(): read error [ 322.856181][T15931] hpfs: hpfs_map_sector(): read error [ 322.864420][T15932] hpfs: hpfs_map_sector(): read error 01:27:53 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x74000000, 0x0) 01:27:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x104000, 0x0, 0x0) 01:27:53 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1020, 0x0) [ 322.889168][T15938] hpfs: hpfs_map_sector(): read error [ 322.897639][T15940] hpfs: hpfs_map_sector(): read error 01:27:53 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x900, 0x0) [ 322.932673][T15948] hpfs: hpfs_map_sector(): read error 01:27:53 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:53 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7a000000, 0x0) [ 322.964940][T15950] hpfs: hpfs_map_sector(): read error 01:27:53 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3a5, 0x0) 01:27:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x400000, 0x0, 0x0) [ 323.038834][T15961] hpfs: hpfs_map_sector(): read error [ 323.059455][T15968] hpfs: hpfs_map_sector(): read error [ 323.072932][ T2044] nbd_handle_cmd: 155 callbacks suppressed [ 323.072952][ T2044] block nbd1: Attempted send on invalid socket 01:27:53 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1100, 0x0) [ 323.085310][ T2044] print_req_error: 155 callbacks suppressed [ 323.085325][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 323.113828][T15970] hpfs: hpfs_map_sector(): read error 01:27:53 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa00, 0x0) 01:27:53 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:53 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3a6, 0x0) 01:27:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x401000, 0x0, 0x0) [ 323.221295][ T3112] block nbd1: Attempted send on invalid socket [ 323.227708][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 323.242949][T15977] hpfs: hpfs_map_sector(): read error 01:27:53 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x84030000, 0x0) [ 323.285980][ T2044] block nbd3: Attempted send on invalid socket [ 323.292452][ T2044] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 323.303631][T15992] hpfs: hpfs_map_sector(): read error 01:27:53 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1f00, 0x0) 01:27:53 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8cffffff, 0x0) 01:27:53 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3a7, 0x0) [ 323.381054][ T3112] block nbd3: Attempted send on invalid socket [ 323.387509][ T3112] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 323.398708][T15994] hpfs: hpfs_map_sector(): read error 01:27:53 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:53 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xb81a0000, 0x0) 01:27:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x4af000, 0x0, 0x0) 01:27:54 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc00, 0x0) [ 323.532513][ T2941] Bluetooth: hci0: command 0x0406 tx timeout [ 323.538753][ T2941] Bluetooth: hci1: command 0x0406 tx timeout 01:27:54 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2000, 0x0) 01:27:54 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:54 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc0ed0000, 0x0) [ 323.578771][ T2941] Bluetooth: hci2: command 0x0406 tx timeout [ 323.598793][ T3112] block nbd3: Attempted send on invalid socket [ 323.605493][ T3112] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 323.608015][ T2941] Bluetooth: hci3: command 0x0406 tx timeout [ 323.622161][T16039] hpfs: hpfs_map_sector(): read error 01:27:54 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3a8, 0x0) [ 323.660163][ T3112] block nbd3: Attempted send on invalid socket [ 323.666676][ T3112] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 323.678199][T16049] hpfs: hpfs_map_sector(): read error 01:27:54 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xd00, 0x0) 01:27:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x4fc000, 0x0, 0x0) [ 323.712165][ T2941] Bluetooth: hci5: command 0x0406 tx timeout [ 323.749740][ T3112] block nbd3: Attempted send on invalid socket [ 323.753808][ T2044] block nbd1: Attempted send on invalid socket 01:27:54 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3a9, 0x0) [ 323.756384][ T3112] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 323.762574][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 323.782280][T16065] hpfs: hpfs_map_sector(): read error [ 323.786126][T16061] hpfs: hpfs_map_sector(): read error [ 323.800277][ T3112] block nbd3: Attempted send on invalid socket 01:27:54 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe00, 0x0) [ 323.806859][ T3112] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 323.808206][ T2941] Bluetooth: hci4: command 0x0406 tx timeout [ 323.823188][T16069] hpfs: hpfs_map_sector(): read error 01:27:54 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf5ffffff, 0x0) [ 323.864630][ T2044] block nbd1: Attempted send on invalid socket [ 323.870878][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 323.882689][T16072] hpfs: hpfs_map_sector(): read error 01:27:54 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:54 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3aa, 0x0) 01:27:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x503520, 0x0, 0x0) 01:27:54 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2010, 0x0) 01:27:54 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf6ffffff, 0x0) [ 323.977196][T16088] hpfs: hpfs_map_sector(): read error [ 323.995997][T16092] hpfs: hpfs_map_sector(): read error 01:27:54 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf00, 0x0) 01:27:54 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x500, 0x0) 01:27:54 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf9fdffff, 0x0) 01:27:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x540000, 0x0, 0x0) 01:27:54 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:54 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x600, 0x0) [ 324.099741][T16116] hpfs: hpfs_map_sector(): read error 01:27:54 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2300, 0x0) [ 324.148584][T16121] hpfs: hpfs_map_sector(): read error [ 324.183828][T16129] hpfs: hpfs_map_sector(): read error 01:27:54 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfbffffff, 0x0) 01:27:54 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1020, 0x0) 01:27:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x970000, 0x0, 0x0) [ 324.217218][T16137] hpfs: hpfs_map_sector(): read error 01:27:54 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:54 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfeffffff, 0x0) 01:27:54 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3f00, 0x0) [ 324.272995][T16146] hpfs: hpfs_map_sector(): read error 01:27:54 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x700, 0x0) 01:27:54 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1100, 0x0) 01:27:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0xc04a01, 0x0, 0x0) 01:27:54 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1f00, 0x0) 01:27:54 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff000000, 0x0) 01:27:54 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:54 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4000, 0x0) 01:27:55 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff0f0000, 0x0) 01:27:55 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x900, 0x0) [ 324.488584][T16180] hpfs: hpfs_map_sector(): read error [ 324.518467][T16190] hpfs: hpfs_map_sector(): read error 01:27:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0xc04f00, 0x0, 0x0) 01:27:55 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2000, 0x0) 01:27:55 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:55 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4800, 0x0) [ 324.600336][T16201] hpfs: hpfs_map_sector(): read error 01:27:55 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffdffff, 0x0) 01:27:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0xf04a00, 0x0, 0x0) 01:27:55 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa00, 0x0) [ 324.709494][T16216] hpfs: hpfs_map_sector(): read error [ 324.727340][T16222] hpfs: hpfs_map_sector(): read error [ 324.732829][T16218] hpfs: hpfs_map_sector(): read error 01:27:55 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4c00, 0x0) 01:27:55 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2010, 0x0) 01:27:55 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xffffe000, 0x0) [ 324.768500][T16229] hpfs: hpfs_map_sector(): read error 01:27:55 executing program 5: close(0xffffffffffffffff) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x4004743b, 0x20000000) 01:27:55 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc00, 0x0) [ 324.835049][T16241] hpfs: hpfs_map_sector(): read error 01:27:55 executing program 5: close(0xffffffffffffffff) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x4004743b, 0x20000000) 01:27:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x1000000, 0x0, 0x0) 01:27:55 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffff000, 0x0) [ 324.887324][T16247] hpfs: hpfs_map_sector(): read error [ 324.911312][T16259] hpfs: hpfs_map_sector(): read error 01:27:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x14ac000, 0x0, 0x0) 01:27:55 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6000, 0x0) 01:27:55 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2300, 0x0) 01:27:55 executing program 5: close(0xffffffffffffffff) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x4004743b, 0x20000000) 01:27:55 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffdf9, 0x0) 01:27:55 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6800, 0x0) [ 324.981062][T16269] hpfs: hpfs_map_sector(): read error [ 325.015533][T16272] hpfs: hpfs_map_sector(): read error 01:27:55 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xd00, 0x0) 01:27:55 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3f00, 0x0) 01:27:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x4000000, 0x0, 0x0) 01:27:55 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:55 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffdff, 0x0) 01:27:55 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6c00, 0x0) 01:27:55 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7400, 0x0) 01:27:55 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4000, 0x0) [ 325.183433][T16302] hpfs: hpfs_map_sector(): read error [ 325.209538][T16314] hpfs: hpfs_map_sector(): read error 01:27:55 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe00, 0x0) 01:27:55 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x8000000, 0x0, 0x0) 01:27:55 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xffffff7f, 0x0) 01:27:55 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x10000000, 0x0, 0x0) 01:27:55 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7a00, 0x0) 01:27:55 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf00, 0x0) [ 325.349100][T16337] hpfs: hpfs_map_sector(): read error [ 325.364751][T16341] hpfs: hpfs_map_sector(): read error [ 325.385837][T16345] hpfs: hpfs_map_sector(): read error [ 325.390226][T16348] hpfs: hpfs_map_sector(): read error 01:27:55 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4800, 0x0) 01:27:55 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xffffff8c, 0x0) 01:27:55 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:56 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffff5, 0x0) 01:27:56 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1020, 0x0) [ 325.484059][T16362] hpfs: hpfs_map_sector(): read error [ 325.500540][T16361] hpfs: hpfs_map_sector(): read error [ 325.521046][T16369] hpfs: hpfs_map_sector(): read error [ 325.527631][T16372] hpfs: hpfs_map_sector(): read error 01:27:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x1f000000, 0x0, 0x0) 01:27:56 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8503, 0x0) 01:27:56 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4890, 0x0) 01:27:56 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1100, 0x0) 01:27:56 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:56 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffff6, 0x0) 01:27:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x20000000, 0x0, 0x0) [ 325.722506][T16399] hpfs: hpfs_map_sector(): read error [ 325.729979][T16400] hpfs: hpfs_map_sector(): read error 01:27:56 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1f00, 0x0) 01:27:56 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 325.768541][T16410] hpfs: hpfs_map_sector(): read error [ 325.775890][T16412] hpfs: hpfs_map_sector(): read error 01:27:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x20355000, 0x0, 0x0) 01:27:56 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xedc0, 0x0) 01:27:56 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffffb, 0x0) 01:27:56 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4c00, 0x0) 01:27:56 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:56 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2000, 0x0) 01:27:56 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf000, 0x0) 01:27:56 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffffe, 0x0) 01:27:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0xff600000, 0x0, 0x0) 01:27:56 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfeff, 0x0) 01:27:56 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2010, 0x0) 01:27:56 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6000, 0x0) [ 326.081347][T16444] hpfs: hpfs_map_sector(): read error [ 326.115431][T16450] hpfs: hpfs_map_sector(): read error 01:27:56 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:56 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xedc000000000, 0x0) 01:27:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x400000000000, 0x0, 0x0) 01:27:56 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6800, 0x0) 01:27:56 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2300, 0x0) 01:27:56 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:56 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff00, 0x0) 01:27:56 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1000000000000, 0x0) 01:27:56 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x26f9, 0x0) 01:27:56 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6c00, 0x0) 01:27:56 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2000000000000, 0x0) 01:27:56 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff0f, 0x0) 01:27:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x540000000000, 0x0, 0x0) 01:27:56 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:57 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4000000000000, 0x0) 01:27:57 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3f00, 0x0) 01:27:57 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7400, 0x0) 01:27:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x60ffffffffff, 0x0, 0x0) 01:27:57 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6000000000000, 0x0) 01:27:57 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffe, 0x0) 01:27:57 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4000, 0x0) 01:27:57 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:57 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7a00, 0x0) 01:27:57 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:57 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7ffffffffffff, 0x0) [ 326.779073][T16568] hpfs: hpfs_map_sector(): read error [ 326.840598][T16570] hpfs: hpfs_map_sector(): read error 01:27:57 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4800, 0x0) 01:27:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x7fffffffefff, 0x0, 0x0) 01:27:57 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x9048, 0x0) 01:27:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x970000000000, 0x0, 0x0) 01:27:57 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4c00, 0x0) 01:27:57 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x20000, 0x0) [ 326.985718][T16588] hpfs: hpfs_map_sector(): read error [ 327.010771][T16593] hpfs: hpfs_map_sector(): read error 01:27:57 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:57 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8000000000000, 0x0) 01:27:57 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xedc0, 0x0) 01:27:57 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x40000, 0x0) 01:27:57 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa000000000000, 0x0) 01:27:57 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf000, 0x0) 01:27:57 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x60000, 0x0) 01:27:57 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 327.153937][T16608] hpfs: hpfs_map_sector(): read error [ 327.178306][T16617] hpfs: hpfs_map_sector(): read error 01:27:57 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6000, 0x0) 01:27:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x2000000000000, 0x0, 0x0) 01:27:57 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6800, 0x0) 01:27:57 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfeff, 0x0) 01:27:57 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc000000000000, 0x0) 01:27:57 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x80000, 0x0) 01:27:57 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:57 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6c00, 0x0) 01:27:57 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe000000000000, 0x0) 01:27:57 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff00, 0x0) 01:27:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x4000000000000, 0x0, 0x0) 01:27:57 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7400, 0x0) 01:27:58 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa0000, 0x0) 01:27:58 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)=0x8020400) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:58 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff0f, 0x0) 01:27:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x10400000000000, 0x0, 0x0) 01:27:58 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x40000000000000, 0x0) 01:27:58 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7a00, 0x0) 01:27:58 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe0ffff00000000, 0x0) 01:27:58 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffe, 0x0) 01:27:58 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:58 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc0000, 0x0) 01:27:58 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe0000, 0x0) 01:27:58 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8303, 0x0) 01:27:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x50352000000000, 0x0, 0x0) 01:27:58 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x400000, 0x0) 01:27:58 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x20000, 0x0) 01:27:58 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:58 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf0ffffffffffff, 0x0) [ 327.965172][T16763] hpfs: hpfs_map_sector(): read error [ 327.995407][T16769] hpfs: hpfs_map_sector(): read error 01:27:58 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x40000, 0x0) 01:27:58 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8803, 0x0) [ 328.026638][T16774] hpfs: hpfs_map_sector(): read error 01:27:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0xc04a0100000000, 0x0, 0x0) 01:27:58 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x100000000000000, 0x0) 01:27:58 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf0ffff, 0x0) [ 328.070837][T16781] hpfs: hpfs_map_sector(): read error 01:27:58 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x60000, 0x0) 01:27:58 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x80000, 0x0) 01:27:58 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x200000000000000, 0x0) 01:27:58 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 328.179219][ T3112] nbd_handle_cmd: 45 callbacks suppressed [ 328.179240][ T3112] block nbd0: Attempted send on invalid socket [ 328.191451][ T3112] print_req_error: 45 callbacks suppressed [ 328.191463][ T3112] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 328.216382][T16798] hpfs: hpfs_map_sector(): read error 01:27:58 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x300000000000000, 0x0) 01:27:58 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x9e03, 0x0) [ 328.241740][ T2044] block nbd0: Attempted send on invalid socket [ 328.248625][ T2044] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 328.259547][T16804] hpfs: hpfs_map_sector(): read error 01:27:58 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1000000, 0x0) 01:27:58 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x400000000000000, 0x0) 01:27:58 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa0000, 0x0) 01:27:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0xc04f0000000000, 0x0, 0x0) 01:27:58 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x9f03, 0x0) 01:27:58 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc0000, 0x0) [ 328.401018][ T2044] block nbd4: Attempted send on invalid socket [ 328.407474][ T2044] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 328.432357][T16844] hpfs: hpfs_map_sector(): read error 01:27:58 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x500000000000000, 0x0) 01:27:59 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa003, 0x0) [ 328.471222][ T2044] block nbd4: Attempted send on invalid socket [ 328.477672][ T2044] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 01:27:59 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe0000, 0x0) 01:27:59 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 328.512249][T16857] hpfs: hpfs_map_sector(): read error 01:27:59 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2000000, 0x0) 01:27:59 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa103, 0x0) 01:27:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0xf04a0000000000, 0x0, 0x0) 01:27:59 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x600000000000000, 0x0) 01:27:59 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x400000, 0x0) 01:27:59 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x700000000000000, 0x0) 01:27:59 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 328.796862][ T3112] block nbd4: Attempted send on invalid socket [ 328.803218][ T3112] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 328.805920][ T2044] block nbd3: Attempted send on invalid socket [ 328.820512][ T2044] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 328.825687][T16908] hpfs: hpfs_map_sector(): read error [ 328.831867][T16916] hpfs: hpfs_map_sector(): read error 01:27:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x100000000000000, 0x0, 0x0) 01:27:59 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf0ffff, 0x0) [ 328.862522][ T2044] block nbd3: Attempted send on invalid socket [ 328.868750][ T2044] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 328.880686][T16919] hpfs: hpfs_map_sector(): read error 01:27:59 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa203, 0x0) 01:27:59 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x800000000000000, 0x0) 01:27:59 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa303, 0x0) 01:27:59 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3000000, 0x0) 01:27:59 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1000000, 0x0) [ 328.944799][ T3112] block nbd4: Attempted send on invalid socket [ 328.951221][ T3112] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 328.969701][T16924] hpfs: hpfs_map_sector(): read error 01:27:59 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x900000000000000, 0x0) 01:27:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x400000000000000, 0x0, 0x0) 01:27:59 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa403, 0x0) 01:27:59 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 329.138036][ T3112] block nbd4: Attempted send on invalid socket [ 329.144527][ T3112] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 329.161646][ T2044] block nbd3: Attempted send on invalid socket [ 329.165264][T16962] hpfs: hpfs_map_sector(): read error [ 329.168023][ T2044] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 01:27:59 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa00000000000000, 0x0) 01:27:59 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1000002, 0x0) [ 329.186891][T16965] hpfs: hpfs_map_sector(): read error [ 329.203631][T16973] hpfs: hpfs_map_sector(): read error 01:27:59 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa503, 0x0) 01:27:59 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4000000, 0x0) 01:27:59 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:27:59 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x5000000, 0x0) 01:27:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x800000000000000, 0x0, 0x0) 01:27:59 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc00000000000000, 0x0) [ 329.296537][T16986] hpfs: hpfs_map_sector(): read error [ 329.334126][T16994] hpfs: hpfs_map_sector(): read error [ 329.336697][T16990] hpfs: hpfs_map_sector(): read error 01:27:59 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2000000, 0x0) 01:27:59 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa603, 0x0) 01:27:59 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xd00000000000000, 0x0) 01:27:59 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 329.406285][T17008] hpfs: hpfs_map_sector(): read error [ 329.434420][T17012] hpfs: hpfs_map_sector(): read error 01:27:59 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2000001, 0x0) 01:28:00 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa703, 0x0) [ 329.470934][T17020] hpfs: hpfs_map_sector(): read error 01:28:00 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6000000, 0x0) 01:28:00 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf00000000000000, 0x0) [ 329.548880][T17036] hpfs: hpfs_map_sector(): read error 01:28:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x1000000000000000, 0x0, 0x0) 01:28:00 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa803, 0x0) 01:28:00 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3000000, 0x0) 01:28:00 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, 0x0) perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 329.648702][T17049] hpfs: hpfs_map_sector(): read error [ 329.667582][T17052] hpfs: hpfs_map_sector(): read error 01:28:00 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1000000000000000, 0x0) 01:28:00 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7000000, 0x0) 01:28:00 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa903, 0x0) 01:28:00 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4000000, 0x0) 01:28:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x1f00000000000000, 0x0, 0x0) [ 329.744375][T17066] hpfs: hpfs_map_sector(): read error 01:28:00 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, 0x0) perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:28:00 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1100000000000000, 0x0) 01:28:00 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xaa03, 0x0) [ 329.829332][T17085] hpfs: hpfs_map_sector(): read error [ 329.849845][T17088] hpfs: hpfs_map_sector(): read error [ 329.865836][T17089] hpfs: hpfs_map_sector(): read error 01:28:00 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x5000000, 0x0) 01:28:00 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8000000, 0x0) [ 329.893136][T17093] hpfs: hpfs_map_sector(): read error 01:28:00 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, 0x0) perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:28:00 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xedc0, 0x0) 01:28:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x2000000000000000, 0x0, 0x0) 01:28:00 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1400000000000000, 0x0) [ 330.001744][T17112] hpfs: hpfs_map_sector(): read error [ 330.025834][T17114] hpfs: hpfs_map_sector(): read error 01:28:00 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x9000000, 0x0) 01:28:00 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6000000, 0x0) [ 330.047534][T17119] hpfs: hpfs_map_sector(): read error [ 330.056547][T17117] hpfs: hpfs_map_sector(): read error 01:28:00 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf000, 0x0) 01:28:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0xffefffffff7f0000, 0x0, 0x0) 01:28:00 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:28:00 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1f00000000000000, 0x0) 01:28:00 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa000000, 0x0) 01:28:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0xffffffff00000000, 0x0, 0x0) [ 330.181047][T17138] hpfs: hpfs_map_sector(): read error [ 330.196560][T17141] hpfs: hpfs_map_sector(): read error [ 330.200442][T17145] hpfs: hpfs_map_sector(): read error [ 330.222948][T17149] hpfs: hpfs_map_sector(): read error 01:28:00 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf926, 0x0) 01:28:00 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7000000, 0x0) 01:28:00 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2000000000000000, 0x0) 01:28:00 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:28:00 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff00, 0x0) 01:28:00 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2010000000000000, 0x0) [ 330.355102][T17173] hpfs: hpfs_map_sector(): read error [ 330.388839][T17180] hpfs: hpfs_map_sector(): read error [ 330.389362][T17179] hpfs: hpfs_map_sector(): read error 01:28:00 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc000000, 0x0) 01:28:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0xffffffffff600000, 0x0, 0x0) [ 330.425580][T17185] hpfs: hpfs_map_sector(): read error 01:28:00 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2300000000000000, 0x0) 01:28:00 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8000000, 0x0) 01:28:01 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:28:01 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff0f, 0x0) 01:28:01 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3f00000000000000, 0x0) 01:28:01 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x9000000, 0x0) [ 330.548282][T17211] hpfs: hpfs_map_sector(): read error [ 330.555896][T17210] hpfs: hpfs_map_sector(): read error [ 330.575296][T17217] hpfs: hpfs_map_sector(): read error [ 330.587275][T17219] hpfs: hpfs_map_sector(): read error 01:28:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x2) 01:28:01 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x0, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:28:01 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xd000000, 0x0) 01:28:01 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe0000, 0x0) 01:28:01 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa000000, 0x0) 01:28:01 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf000000, 0x0) 01:28:01 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4000000000000000, 0x0) [ 330.717650][T17239] hpfs: hpfs_map_sector(): read error [ 330.748679][T17249] hpfs: hpfs_map_sector(): read error 01:28:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x4) 01:28:01 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4800000000000000, 0x0) 01:28:01 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x0, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:28:01 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x400000, 0x0) [ 330.874833][T17270] hpfs: hpfs_map_sector(): read error [ 330.893876][T17274] hpfs: hpfs_map_sector(): read error [ 330.902277][T17276] hpfs: hpfs_map_sector(): read error 01:28:01 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc000000, 0x0) 01:28:01 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4c00000000000000, 0x0) [ 330.924600][T17283] hpfs: hpfs_map_sector(): read error 01:28:01 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x10000000, 0x0) 01:28:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x8) [ 330.997530][T17293] hpfs: hpfs_map_sector(): read error [ 331.010117][T17292] hpfs: hpfs_map_sector(): read error [ 331.027368][T17302] hpfs: hpfs_map_sector(): read error 01:28:01 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x0, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 331.043750][T17305] hpfs: hpfs_map_sector(): read error 01:28:01 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf0ffff, 0x0) 01:28:01 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xd000000, 0x0) [ 331.080459][T17308] hpfs: hpfs_map_sector(): read error 01:28:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x10) 01:28:01 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6000000000000000, 0x0) 01:28:01 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x11000000, 0x0) 01:28:01 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf000000, 0x0) [ 331.156998][T17316] hpfs: hpfs_map_sector(): read error [ 331.164910][T17323] hpfs: hpfs_map_sector(): read error [ 331.192923][T17330] hpfs: hpfs_map_sector(): read error 01:28:01 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1000000, 0x0) 01:28:01 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6800000000000000, 0x0) 01:28:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x1f00) 01:28:01 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 331.281414][T17347] hpfs: hpfs_map_sector(): read error [ 331.291914][T17349] hpfs: hpfs_map_sector(): read error [ 331.305766][T17350] hpfs: hpfs_map_sector(): read error 01:28:01 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1f000000, 0x0) 01:28:01 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2000000, 0x0) 01:28:01 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x10000000, 0x0) [ 331.340471][T17354] hpfs: hpfs_map_sector(): read error [ 331.351115][T17357] hpfs: hpfs_map_sector(): read error [ 331.360069][T17358] hpfs: hpfs_map_sector(): read error 01:28:01 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6c00000000000000, 0x0) 01:28:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x2000) 01:28:01 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x11000000, 0x0) [ 331.452141][T17372] hpfs: hpfs_map_sector(): read error [ 331.454288][T17378] hpfs: hpfs_map_sector(): read error [ 331.467728][T17383] hpfs: hpfs_map_sector(): read error [ 331.471959][T17380] hpfs: hpfs_map_sector(): read error 01:28:02 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x20000000, 0x0) 01:28:02 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3000000, 0x0) 01:28:02 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 331.500379][T17381] hpfs: hpfs_map_sector(): read error [ 331.509016][T17386] hpfs: hpfs_map_sector(): read error 01:28:02 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7400000000000000, 0x0) 01:28:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x4000) 01:28:02 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x20100000, 0x0) [ 331.588079][T17395] hpfs: hpfs_map_sector(): read error [ 331.611592][T17406] hpfs: hpfs_map_sector(): read error [ 331.620607][T17404] hpfs: hpfs_map_sector(): read error [ 331.621157][T17405] hpfs: hpfs_map_sector(): read error 01:28:02 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7a00000000000000, 0x0) 01:28:02 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1f000000, 0x0) [ 331.657028][T17411] hpfs: hpfs_map_sector(): read error [ 331.674173][T17414] hpfs: hpfs_map_sector(): read error 01:28:02 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4000000, 0x0) 01:28:02 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:28:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x5400) 01:28:02 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7fffffffffffffff, 0x0) 01:28:02 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x23000000, 0x0) [ 331.794545][T17432] hpfs: hpfs_map_sector(): read error [ 331.820716][T17439] hpfs: hpfs_map_sector(): read error 01:28:02 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8403000000000000, 0x0) 01:28:02 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x20000000, 0x0) 01:28:02 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x5000000, 0x0) [ 331.855351][T17440] hpfs: hpfs_map_sector(): read error [ 331.893133][T17448] hpfs: hpfs_map_sector(): read error 01:28:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x60ff) 01:28:02 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 331.942362][T17462] hpfs: hpfs_map_sector(): read error [ 331.977840][T17466] hpfs: hpfs_map_sector(): read error 01:28:02 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3f000000, 0x0) 01:28:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x9700) 01:28:02 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x20100000, 0x0) 01:28:02 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8cffffff00000000, 0x0) [ 332.055861][T17476] hpfs: hpfs_map_sector(): read error [ 332.064127][T17481] hpfs: hpfs_map_sector(): read error [ 332.093004][T17487] hpfs: hpfs_map_sector(): read error [ 332.098369][T17489] hpfs: hpfs_map_sector(): read error 01:28:02 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6000000, 0x0) 01:28:02 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:28:02 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xb81a000000000000, 0x0) 01:28:02 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x40000000, 0x0) 01:28:02 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x23000000, 0x0) [ 332.160013][T17493] hpfs: hpfs_map_sector(): read error [ 332.180947][T17498] hpfs: hpfs_map_sector(): read error 01:28:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x20000) [ 332.257917][T17510] hpfs: hpfs_map_sector(): read error [ 332.289987][T17522] hpfs: hpfs_map_sector(): read error 01:28:02 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7000000, 0x0) 01:28:02 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf5ffffff00000000, 0x0) 01:28:02 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3f000000, 0x0) [ 332.311336][T17526] hpfs: hpfs_map_sector(): read error [ 332.328110][T17528] hpfs: hpfs_map_sector(): read error [ 332.347161][T17535] hpfs: hpfs_map_sector(): read error [ 332.351760][T17537] hpfs: hpfs_map_sector(): read error 01:28:02 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:28:02 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x48000000, 0x0) 01:28:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x40000) [ 332.430206][T17542] hpfs: hpfs_map_sector(): read error 01:28:02 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf6ffffff00000000, 0x0) [ 332.455273][T17547] hpfs: hpfs_map_sector(): read error 01:28:02 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8000000, 0x0) [ 332.477287][T17556] hpfs: hpfs_map_sector(): read error 01:28:03 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x40000000, 0x0) 01:28:03 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4c000000, 0x0) 01:28:03 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf9fdffff00000000, 0x0) [ 332.501453][T17558] hpfs: hpfs_map_sector(): read error [ 332.508107][T17559] hpfs: hpfs_map_sector(): read error [ 332.530833][T17568] hpfs: hpfs_map_sector(): read error 01:28:03 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:28:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x104000) [ 332.574899][T17573] hpfs: hpfs_map_sector(): read error 01:28:03 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x9000000, 0x0) [ 332.634054][T17578] hpfs: hpfs_map_sector(): read error 01:28:03 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfbffffff00000000, 0x0) 01:28:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x400000) [ 332.692252][T17590] hpfs: hpfs_map_sector(): read error [ 332.709689][T17593] hpfs: hpfs_map_sector(): read error 01:28:03 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x60000000, 0x0) [ 332.738049][T17600] hpfs: hpfs_map_sector(): read error [ 332.747594][T17595] hpfs: hpfs_map_sector(): read error [ 332.757977][T17605] hpfs: hpfs_map_sector(): read error 01:28:03 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x48000000, 0x0) 01:28:03 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa000000, 0x0) 01:28:03 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfeffffff00000000, 0x0) 01:28:03 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 332.778856][T17610] hpfs: hpfs_map_sector(): read error [ 332.855958][T17620] hpfs: hpfs_map_sector(): read error [ 332.861836][T17621] hpfs: hpfs_map_sector(): read error [ 332.893610][T17627] hpfs: hpfs_map_sector(): read error 01:28:03 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4c000000, 0x0) 01:28:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x401000) 01:28:03 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x68000000, 0x0) [ 332.908516][T17632] hpfs: hpfs_map_sector(): read error [ 332.914209][T17630] hpfs: hpfs_map_sector(): read error 01:28:03 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfeffffffffffffff, 0x0) 01:28:03 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc000000, 0x0) 01:28:03 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:28:03 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x60000000, 0x0) [ 332.963180][T17644] hpfs: hpfs_map_sector(): read error [ 332.972075][T17636] hpfs: hpfs_map_sector(): read error [ 333.002564][T17651] hpfs: hpfs_map_sector(): read error 01:28:03 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff00000000000000, 0x0) 01:28:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x4af000) [ 333.057806][T17654] hpfs: hpfs_map_sector(): read error [ 333.087853][T17664] hpfs: hpfs_map_sector(): read error [ 333.095076][T17665] hpfs: hpfs_map_sector(): read error [ 333.100038][T17670] hpfs: hpfs_map_sector(): read error 01:28:03 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x68000000, 0x0) [ 333.113159][T17674] hpfs: hpfs_map_sector(): read error 01:28:03 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6c000000, 0x0) 01:28:03 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xd000000, 0x0) 01:28:03 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff0f000000000000, 0x0) [ 333.180464][T17671] hpfs: hpfs_map_sector(): read error [ 333.201888][ T3112] nbd_handle_cmd: 108 callbacks suppressed [ 333.201909][ T3112] block nbd3: Attempted send on invalid socket [ 333.214491][ T3112] print_req_error: 108 callbacks suppressed 01:28:03 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x4004743b, 0x20000000) 01:28:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x4fc000) [ 333.214506][ T3112] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 333.233359][T17689] hpfs: hpfs_map_sector(): read error [ 333.246800][ T3112] block nbd4: Attempted send on invalid socket [ 333.253058][ T3112] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 333.263978][T17692] hpfs: hpfs_map_sector(): read error 01:28:03 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6c000000, 0x0) 01:28:03 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x74000000, 0x0) [ 333.300241][ T3112] block nbd0: Attempted send on invalid socket [ 333.306609][ T3112] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 333.327468][T17702] hpfs: hpfs_map_sector(): read error 01:28:03 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf000000, 0x0) 01:28:03 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7a000000, 0x0) 01:28:03 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffdffff00000000, 0x0) [ 333.351600][ T3112] block nbd4: Attempted send on invalid socket [ 333.357939][ T3112] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 333.372036][T17707] hpfs: hpfs_map_sector(): read error 01:28:03 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xffffff7f00000000, 0x0) [ 333.442081][ T2044] block nbd3: Attempted send on invalid socket [ 333.448716][ T2044] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 333.476610][T17722] hpfs: hpfs_map_sector(): read error 01:28:04 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x4004743b, 0x20000000) [ 333.495249][ T2044] block nbd0: Attempted send on invalid socket [ 333.501461][ T2044] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 333.512786][T17742] hpfs: hpfs_map_sector(): read error [ 333.533116][ T2044] block nbd3: Attempted send on invalid socket 01:28:04 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x10000000, 0x0) 01:28:04 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xffffffff00000000, 0x0) [ 333.540051][ T2044] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 333.562507][T17740] hpfs: hpfs_map_sector(): read error [ 333.574504][ T2044] block nbd4: Attempted send on invalid socket [ 333.580710][ T2044] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 01:28:04 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x74000000, 0x0) [ 333.591809][T17752] hpfs: hpfs_map_sector(): read error 01:28:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x503520) [ 333.617717][ T2044] block nbd0: Attempted send on invalid socket [ 333.623978][ T2044] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 333.636358][ T2044] block nbd4: Attempted send on invalid socket [ 333.640239][T17757] hpfs: hpfs_map_sector(): read error [ 333.642565][ T2044] blk_update_request: I/O error, dev nbd4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 333.652863][T17761] hpfs: hpfs_map_sector(): read error 01:28:04 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7a000000, 0x0) [ 333.662136][T17754] hpfs: hpfs_map_sector(): read error 01:28:04 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xffffffffffff0700, 0x0) [ 333.706882][T17765] hpfs: hpfs_map_sector(): read error 01:28:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x540000) 01:28:04 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x11000000, 0x0) 01:28:04 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x85030000, 0x0) 01:28:04 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x4004743b, 0x20000000) 01:28:04 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8cffffff, 0x0) [ 333.824958][T17778] hpfs: hpfs_map_sector(): read error [ 333.862808][T17784] hpfs: hpfs_map_sector(): read error 01:28:04 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffffffffff000, 0x0) 01:28:04 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1f000000, 0x0) [ 333.900372][T17792] hpfs: hpfs_map_sector(): read error [ 333.919299][T17798] hpfs: hpfs_map_sector(): read error 01:28:04 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8cffffff, 0x0) 01:28:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x970000) 01:28:04 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x0) 01:28:04 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xffffffffffffff7f, 0x0) 01:28:04 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x90480000, 0x0) 01:28:04 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc0ed0000, 0x0) 01:28:04 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x20000000, 0x0) [ 334.070143][T17820] hpfs: hpfs_map_sector(): read error [ 334.106625][T17830] hpfs: hpfs_map_sector(): read error 01:28:04 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffffffffffffe, 0x0) 01:28:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0xc04a01) 01:28:04 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x0) 01:28:04 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xffffffffffffffff, 0x0) 01:28:04 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc0ed0000, 0x0) 01:28:04 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf5ffffff, 0x0) [ 334.237590][T17852] hpfs: hpfs_map_sector(): read error [ 334.250583][T17858] hpfs: hpfs_map_sector(): read error [ 334.275426][T17861] hpfs: hpfs_map_sector(): read error 01:28:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0xc04f00) 01:28:04 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 334.311991][T17868] hpfs: hpfs_map_sector(): read error [ 334.346013][T17871] hpfs: hpfs_map_sector(): read error 01:28:04 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x20100000, 0x0) 01:28:04 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf6ffffff, 0x0) 01:28:04 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x0) 01:28:04 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf5ffffff, 0x0) [ 334.378267][T17881] hpfs: hpfs_map_sector(): read error 01:28:04 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf9fdffff, 0x0) 01:28:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0xf04a00) 01:28:05 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf6ffffff, 0x0) [ 334.464152][T17892] hpfs: hpfs_map_sector(): read error [ 334.495657][T17905] hpfs: hpfs_map_sector(): read error 01:28:05 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000640)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000140)='./file0/file0\x00', 0x3, 0x6, &(0x7f0000000480)=[{&(0x7f0000000180)="8bc32957b30992d58f2b26c546136ae6b11f688e294d2cf945ea55ac37e40951c30b9b8c12618242cd77605f69393760e0f548d433bfae21cc2c9831da048da2d5", 0x41, 0xffffffff}, {&(0x7f0000000200)="15c398", 0x3, 0x5}, {&(0x7f0000000240)="5601c555f121bea55c2c319289d0f4ec1bf679b12fdaf3c9052f57429c501515c10cdc437ea23381a82b625af1c27c8a4b5f919440ff0e94f5f1de5ab75d4b89afc54c6c82e6ea76497c8cf147abafdf9bec5240f718b0222586dd2abfe89cfbb21f0cd1cfab23664f26b74d", 0x6c, 0x6}, {&(0x7f00000002c0)="2ed3cd31be7f3193ed392308bfb11e8494c6d53bfee7e71a3aca3e9d89d8ed6359a73c5ae17e864a463b8a275b2f84ac49662ec07dce5f07e0bdc3a4ba80efc6db387437d318af81a3e9b1630b8d1d782788882c15381c90de78b699288cdfd42520a4ab2fec54012372b7b268", 0x6d, 0x4000000}, {&(0x7f0000000340)="a6497cca4711ec17545d90775fc2428ccb4e298e1c024e387883162706392bb44d4b0b457a3f1e67bd51e711cc35571d0258326a67bf919549204ec1bebfa5f816dcd3b06777d67fee7a95a05516a11377fcc5dbfa1f3f6817e7684c15038f473229c40ba4cd53ce596051a0a2fc97b87f7be8aa393cb08044b16c26e3aaab45333fa495b228171e3cdf4440f2c963aa86d84b800acfa15a3556c38c4998df09c01e41d616438337e2a73dad54ccab373483f945fba28f788f116b9ad5a3a06f3ed65775641ac68266d497cd48a3bf1ea2fd", 0xd2, 0x1}, {&(0x7f0000000440)="4ef02fd9c6fec96b2895c173cfb0c7e96d7213f17a91ea009b1a37a91633edb2d0a35a0704aebf73e9067e5df14b1e3e93094d31d356b853077469d1", 0x3c, 0x9}], 0x800, &(0x7f0000000680)={[{@nodecompose}, {@nodecompose}], [{@obj_role={'obj_role', 0x3d, '@]'}}, {@measure}, {@uid_gt={'uid>', 0xee01}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@euid_lt={'euid<', r0}}]}) 01:28:05 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x23000000, 0x0) 01:28:05 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1f000000, 0x0) 01:28:05 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf9fdffff, 0x0) [ 334.617575][T17928] hpfs: hpfs_map_sector(): read error [ 334.631796][T17931] loop1: detected capacity change from 0 to 264192 01:28:05 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfbffffff, 0x0) 01:28:05 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfbffffff, 0x0) 01:28:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x1000000) 01:28:05 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3f000000, 0x0) [ 334.679855][T17940] hpfs: hpfs_map_sector(): read error [ 334.690720][T17939] hpfs: hpfs_map_sector(): read error [ 334.716022][T17943] hpfs: hpfs_map_sector(): read error 01:28:05 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x48000000, 0x0) 01:28:05 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfeffffff, 0x0) 01:28:05 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfeffffff, 0x0) [ 334.797618][T17954] loop1: detected capacity change from 0 to 264192 [ 334.826396][T17970] hpfs: hpfs_map_sector(): read error 01:28:05 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x40000000, 0x0) [ 334.867072][T17972] hpfs: hpfs_map_sector(): read error 01:28:05 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000001400)=ANY=[@ANYBLOB="2f641700000000000000f8c679f6203b71776e7753521fbd20b8e466712c74dd4134eaad86178a5e46badbe68afc15789732c1b8716eb0b17bceb1eeb8f8a677cfe27ef9c452ef32d19ea6c3dbbcb076cf391af956c4"], &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) mount$overlay(0x0, &(0x7f00000015c0)='./file0\x00', &(0x7f0000001600), 0x400, &(0x7f0000001640)={[{@metacopy_off}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@metacopy_on}, {@nfs_export_off}, {@default_permissions}], [{@euid_eq}, {@uid_gt={'uid>', r1}}, {@obj_role={'obj_role', 0x3d, '&+.*))%&'}}, {@smackfshat={'smackfshat', 0x3d, 'hpfs\x00'}}]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f00000020c0)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x11}, 0x1c, 0x0}}], 0x1, 0x20000840) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f00000020c0)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x11}, 0x1c, 0x0}}], 0x1, 0x20000840) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = gettid() tkill(r5, 0x34) sendmsg$nl_route(r0, &(0x7f0000001580)={&(0x7f0000001480)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001540)={&(0x7f00000014c0)=@RTM_NEWNSID={0x54, 0x58, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NETNSA_PID={0x8, 0x2, r5}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_FD={0x8}, @NETNSA_PID={0x8}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000040}, 0x4) sendmmsg$inet6(r4, &(0x7f00000020c0)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x11}, 0x1c, 0x0}}], 0x1, 0x20000840) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) sendmsg$unix(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000012c0)=[{0xffffffffffffffff}, {&(0x7f00000001c0)="2d10235493af51725f4759c4ea1204b89e2658a6faf5e14619adafda9d76dbf4aac8e924fa7f5ee67473728f0de0c90efc951a00ecca97c39bdd8dd1e71bd69f229ff348844f292398cb1527c325cba4f4db3e7ccacf08834bf8c8264d6895401260cce68f37a343f1aef2e6d5f0623f1371e12cc04bfe097faeae0a5aeb038e", 0x80}, {&(0x7f0000000240)="9154448dbea871fad894ccb43e38a410977a8c94ee2a85d98e4ef5fafe1161aee19e95846d53871b90da377617ab2fe9c04c5c63d6247e787c38bcf68c50c201d3d0f2d69b6e63049ccffdacb3c4d6954840b9d73c7d9566c03d4ac6d3f16daf10bc9ba044810df0ce28ab4104d9e553fff3be87a6847b13bcf4caa9ee3d436f5c177311aba58d8ce85ba9da4dbf4b78e1a67bc01ea8b6645b1c1c7c6c7830bba1c748b79f05bea5c5b77027436b8147d89e8f1fb3fd1687ea8bd3bcc42d3cfd31e85416acc62a25bffaab267a6d756d4ca9d6f0cc1f2f8395a3accf04e1a45c822e36f5ec2df63efc66f1fe4869297e08c5d378950d555979be20706d0eb4cc178383d848a15fb76e299cc219d2b38c563891f2e28a53a82f5c8d11b0e1c81ca0a8e6276a91caf41765a66a5f18d7e414b53562cd1013a5be8d047e93f9968206eb89aa5305fe457646a3e48c4ec392b29ab96049ae5fdd9686d099c7eb6decc835f28a7b97859a1480b033cd524e5efa2ffa2fa992b2e047877bb3b66eaa6bd42955ac320651312cc9ceb76162f39b3aa92ab45f7725cbab1c59d4885628b70d983e4c269714f28baf385b82604923d32eb40ed9bd2e9dd53c7538207f161775e7e552583beebb28045d0eb0fa11d05a1a8dc07884613bc355cd2b538b91ca01fcfa484f1379f46ea7a7656e2b394b56770f7d0f99ddd1db7342e5a911524e788823baed097fe46759882e6d0228b5b8e11a4673262f319f8a003ce4b9c5fc11a662b48bad9f7b6b542732068b1f44e770b06a72625af1417ffbe77cbfe5bd734c5979547c03f97aaef0449204dbc24252ea922a02b409a062493215e1c155e6f7277709baa93772623b0ed16bfc046755cae0b5007014e9097aae442e0030fc8fb3678230ae43ba7ffe935fe5576bb8318c2bd1b07ecd69e9bf5b082363c76b2d80c622c27cc29ba8c90d985eeb71f7c7707acabcfed52fd6760b4cf00f5adf6fcef990e6aefdc6817e791205d2150b346e8cd7d44eabaff2ad4b4bf46a6de8cd2c396605114a966d2f1aeb9e0372707cbc19f00578d5118a2413dd9ee7db129f2faf82cd3fa3884b9a85512a592bec08a8d7b8039069703a164c5ba9ff5a9d0cf8c60d9e4bef2b4ab07ba95a2712a5e8962ed4bb31341e18232c13aae7a2721e669c9868a05758327e4450a63dee8347c5ef86a9d57cb79b1e5d5246d0f245c62a32348aba23333c256304c86d188e77e909025d63d8940073ebef99879cad4d7d347280f487798f74dac71c1315e632f1807895d66cd1bffd918cf5685e5641dce031cff6f5140cce4ba9cbb61561258dc97581a012496b4190f8064bb4a7e951eb114f571255e00a435d9a4e0989d99e788c43c6f584423534e7bd71a73f60e0a19328057b747eaa0eae3f8fa51612828bb18cd1bc67f041b8701456100baec9e3b105f804854ae6a67427c1ba09c7ae086cb16b14e0fe84ba046742ce12d25a0112a6beb96dce48c7466c7a5a752bcd704b6ed90f44f87604063a24290ea031e5424daf9fdcc67d92574df63e1a829b753675397bca9a182755a3f4b676a602b2f8058e3dd63fc98c5f7bfb88d4600d9e5863bb59ad3379091ccac57fbef02b75b6a2d8cf2dbc327a770fde6f0c5eb7ef97cc7236077477f19aadda87613fab46fd7b8e511bc1038f9568b8aab140d407e3e5d996585d3fe32c6b219c0c889d96841eb91275847a13fcf50ab20971ca07ec8263401cd08f4f725eca4b983d4121a93a86817482d5951a3f2829d9cc8cb15212f66f6434d9b2321106fbd297d9a44d2d4e6d6530fdda165c854dd77b2994a0afda27dafb5532968381a12ad7c13eee1aae31955e7897c0d77d4e03815f31d561516eab1b1994bbb1da6228a16533765cb8707c741362a309ad94a5cbb921ebbb22c12a00da5b303e2808de49311e437519c2c7641f6952aecee1be1f7ebab5896eff77ec8b25355fd59995cc271a3ca453e7a45dae236343dc6a67551eff30e8d7f7e751e946245fb1508d73fb4f583724ca6985b8c798d79c5dcf272f31f0d2f746ec391e56d6665afe70dc7309919d080dd37dc143ac9a83af14f6919ff3e7f74e12e8706aad8491b8ff86a63c87e109dcd091aa576b8573b07e8abeb9b77fa657417214628b829e7e6bb5acbd8148070a7c3280837ee827682060604e26ee4097d9a7c1f5e062102c3629673be3f8c13008e43eb3cce58d0a7bc9504d81b5103373cb925f54327fbdafe322f35adbdcc6ed562ac7d44a57f175aa2c16bf48192060bd2c8476f91ab8436faf6a27e4bfa70b10a74e82f2f931d08c519ecfae8af9c04b1f24d1957de1b4192090617442dccdc0b4d292afba4bc4633d738816b397e01a61b55e886ceb0b983b614de087b3be65e340941a9ecbd328e831c592b3ee6481ad0e6b8d8e1304d1d928367e0fce85b6c67dd2d2ef2f5e7e7acb6d4df7b5404d87dd0e711a42a0406c4841ccb6240a4562e8798bf39e16b6763d09f918115148834404460dd4f029d0bb3445d0c1184502a9ca432c4fbf40bd8fa25bdf6068bb16adee9f8534f0bdf6e56ce000b51b53babdebeb14199e013154bd4638de009733b11197312647bceaf987083685b54960ac9f7c5c58893b957405514b41fac6085dd9db4629884e4f7a440db57f505d9743e0fc46f2346c035019020c9aa361423ed20393240991ca3fb97ddf205739e2e0fb4fe48063144bf5f1b2e3eef7e6546f846c11e2ec2a96b3d04186300bf37c04be0b1d12b7c4ba271c70a1b2b498c0137fbc237c1404472ba7de557a5384eb00bc3a6f4c32828b8fb1a57e87ba11dcfbdda86b85fb8698b770c0349b13ef70eb21eadc8297bf409c3119c39e75f38b87472bdc80121106ce752dc481970a0f1b1ca1a3dcfb1f5bc08d2c8cbdfb379bd81025419d2b324a4e2dab68b3dd29ffc247724f9a2b825ceacc642e139e8cbd68427da313a0443db835c723096faaee9f378448afb00576a2782e6078f7c9abeb2e3efbc80e35f917bd0d5bc7737a49874600436689e99c766884a58e26115378a5f0297d1b9ca7e748db32147ee2140f24600d0eed5adf4cf4c9b053ebe99937127b0c93648507a5d0ce78d04422ae29badb5e868d194156fbe961e6ed3878f3fed9c46082662fe20bdb18acc35ce7420579eef40866a216da31d716c673a9bd963a1b23655213ec04f4814b476fe46eaa97f330e838f921cd235714b675a4cf738ed6e71ad2208d7cb9cc810358341fa2e5f7afa9fa42cb60281c290245187ba9aab4a8aed547923f9dfa1173c1b56dabff54a01ba6feb79c2461a90065070d3362b5efda97cb9eb683893958017437f4351cb9ca168147b24dd87451f3eff3e5445938d981c1abe749ef78bdfa73752e5b8dbb08cbc59c729d6ec48389273826cb35332380ce0956693ac0e1e1cf3e63b90ac77e4cf0652d81ba32abb29326a7568655cbd85367542b4e669c4b9638b46fd396cffafa0df61b0f73964d7f87040004e6d5dc938564b169b244857c59ef44cbf8cd86b649e41775bb0d059bb945999ef886d3a65b94ba512e4fa954a50c7aba7e38b047059fe7e379329cde68dbbc7adf5a7fecc96253536308337a63da90a18dabd5f93cfd1e6b811ac36cb4dcc6620cb3f026eaa9b6a36faeee45d5b518f6e62a3965f937bd25b5234fbd921516854f26b45d6e77d1bf7499715029f80fe44caf1a34fcb87a21ff2de488bc63d0b62ecbd0e5f67577cf6f7e610e0c948921555835424ed87406ebb059d3849a70f9b9ee521af247db504cee834b6faa766660b6806a9b6d857cd84d9f4912bb06cdaa0bbc05262c518a2add9952caabf006375b417acc95b4a446304737c476b037e2ccc911b81b52e383ede0d4c58847668ecf7152fc0a093f8fc498fd214a18c2e794756dff24162bf49d2215c01a53a88b5265209b25440d3c18e8e06720190d1e04405618d418b7289be0c59943394307f89cd5e8b3c43a419b8126783c9ff124f4dab7051816ca2ede0106722ecaba6b725607001b80cc69e357abdb0fd13c5c383e2669eeb9096d2407be682a09466d8820d52a92cfe575ea3d40c4b8cef6ff1fd0a8b1b585fc255861032ba15a8060280e9c461f91a0d2b597dcb7b64831cf2ba0c782ecd2867aad65c77e84ee101560ed0ab617a88451b1f6907fd1606640f8811f211ff7bed5d9c1d73d47d8c098c18d03b87404c5dc1dcc8c370f0529e0b81cec6216852d6140a4bd6620046b3fad916584558917670c1519fb91be7b8a0f9e7aa96644ca217094d761db55e0403485da9b80de48d6a73049bd16a0a97364a6cd75c674abaa88ae2094d6f4b0dd18ff4d4d34e38b4e751a68c999482018e38c223a991c777ec718da16bd0897beaaaa239b1c8dd1d83479bb4c0cccc3413f18b29bba6caf1b1337fcb855c950740c8044c550d1323b09036f9a24a4e8a1ed75e9387ee633eea864a11b54595ca2d5190ca6cf210616e8c416e0f1046634514ff846fcc3014ec0fa6c92cfad2e5c099099ff401288a9ca6af8dd94093e37c9bd5c8287d71d1dc3011f898fb6ac155b2c7dd79b41f6ebb9627d3a0efe068b68a684782f4374443d2bd820c0305b8115fb6bc4d61c71deba132857d619be5a92c784ad60a6d505ea5884c471f71f310b793ae82ee31c17c1baa69368a8ffebfc3aac06ec0b082670f9fbf5ad1cd704b4df7262296abadbf1bf7297440dd67ca62ab8699f1866792f4adff11100d7f08a36882c43d9ab3b17c539252f7fef2c3418aa48b248826efa4a39d59fb45715a65fb3d7e0c8a9c703f39e1cd263e854b5639918de08f9cd1ccf9cb3d368abe13dc35d9cfdb828cf70cfdcdeba467d507d8c1e25bc994fe518ef3744abac6fd88a585013c7c82de4a66cd67b630c0a679a2ffa87b84a7fadb088d222e6db77c7579ee8ee526d4c075b04c5d75886b5cce504dd335c97664e4dbd8d1f958e5e2e9905eca30ad01529db1ae38f68f2ff8621dd7e58975c971e438191ac46e72f1e479d7e9b56e4f886fb7bd85624d83817b32a9b5adfecb8f6d998f8ee6b2840c07800f2200bb2e725f2fd300afad6fc9021a14188e857ccfb80af25939cb04d840e0cae0df2b67f738e484671b08c8ae68e04dfef710efa1cd0ee26157a0fbf24b20eb32a27fb1f299f440750754927bcbb74d47a4b8b723175248874118241015403b0cefb6a566fe8859936fbf3808f6d5ffdf6b97437efe74be69ae6520428fba1283bb38e72845ed33b43106eedaef13cf30a7f76e3401ba2242c44b38017e8def54a59ea8589b12022f6c7cf7c643c41d666d5855cf56cfd1f1a31b4288ae5f2aaac5463ae4f13639d7f23fbc2b07e914be8660b1ed62447adb33d974e0817bbddbe6a200661883c5f26b5851ef8dca32006727302bb881b04670cd1ed93443002369bd5d8725856d306ec71b4a966fd78226480f72551cb1df13a5658118c8c6618a55936870fa807fcad5b0ae04c92b90eb4c7bc69cc120cb868cfbe9560c9ec0dd28e25bcd776818ebe7afbbc5e5e15a03530218f229a39b46c4d4ddc9b2ed6fee5066764f1e8bbcc81e8ffe82b0c6c50e662e385bac777aa36d3e30bc6f68c41cf65b04eb420701519d67f3840a5eada8335fc6dce98a8dbf76884940ea414d3d3283de633babff7902d08367a81f6d35352b8a2594dd3f65f73b0ba2799ddd31efd54ccc549dbda60ae05a51704176746a448c63e4aa7492c93d44d08cea412b094f0c542fac210bf47ffe8", 0x1000}, {&(0x7f0000001240)="9508eacdb7ea5a5e45022c4c7696c5927274bf7b5ebf4ef25dedc29dd39821645fce0224252fe67668944ba04daf52a083f27aaad240345b86e33add79ef0ae4fe753c", 0x43}, {&(0x7f0000000040)="a1544ee4dc7a517dca", 0x9}], 0x5, &(0x7f0000001340)=[@rights={{0x1c, 0x1, 0x1, [r0, r2, r3]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50, 0x5}, 0x24048045) 01:28:05 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff000000, 0x0) 01:28:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x14ac000) 01:28:05 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x9, 0x1, &(0x7f0000000280)=[{&(0x7f0000000180)="b6dfa5324840782d12200f6a4ea947b26c3e7889b25ec84a26126388a60aeeab68d5f51fc618be4cc778ee307125096ccc8fb15a82a1e460d470cb8edf0bf5ef7550358aecdca0909b1cb1d7f4c414d7a78030897580bed72bcc2ddec33bb5cb38ae1c40698dbad82f03d7e496ce2d90b6de7e6d87c93135a208741e06656b55faeff34af34d84e68b09f1219ea2738d496eeee4473d92d980f8718b193ae3ca7d134bb5268deef037f56a38e93ca146178a0711a2541d0198c17228d2a4c4d5df1d6d83ac3e54a4d6f1469d52c3d6f2900877e921aa33457d9b16566b9c0fa717c9798eebbc12f95863d9", 0xeb, 0x5a}], 0x280040, &(0x7f00000002c0)={[{'hpfs\x00'}, {'^)@/))$\v['}, {'&'}, {'/dev/nbd'}, {}, {'hpfs\x00'}], [{@pcr={'pcr', 0x3d, 0x32}}]}) 01:28:05 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe000000000000, 0x0) 01:28:05 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff000000, 0x0) [ 334.943812][T17992] hpfs: hpfs_map_sector(): read error 01:28:05 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff0f0000, 0x0) [ 335.018888][T18000] hpfs: hpfs_map_sector(): read error 01:28:05 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x48000000, 0x0) 01:28:05 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xb81a0000, 0x0) 01:28:05 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffdffff, 0x0) [ 335.108036][T18012] hpfs: hpfs_map_sector(): read error 01:28:05 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc00, 0x0) 01:28:05 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff0f0000, 0x0) 01:28:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x4000000) 01:28:05 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f00000020c0)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x11}, 0x1c, 0x0}}], 0x1, 0x20000840) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) write$binfmt_script(r0, &(0x7f0000000140)={'#! ', './file0', [{0x20, 'hpfs\x00'}, {0x20, '/dev/nbd'}, {0x20, '/dev/nbd'}, {0x20, 'hpfs\x00'}], 0xa, "7d97061a1699b7b4694ea9752aec1560c2968362bb514a9e34fa9bbc4a67"}, 0x47) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='/dev/nbd1\x00'], &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:05 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffdffff, 0x0) 01:28:05 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4c000000, 0x0) [ 335.207552][T18037] hpfs: hpfs_map_sector(): read error [ 335.234822][T18042] hpfs: hpfs_map_sector(): read error 01:28:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x8000000) [ 335.278149][T18046] hpfs: hpfs_map_sector(): read error 01:28:05 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffff000, 0x0) 01:28:05 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc00, 0x0) 01:28:05 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffff000, 0x0) 01:28:05 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x60000000, 0x0) [ 335.350131][T18062] hpfs: hpfs_map_sector(): read error [ 335.374945][T18068] hpfs: hpfs_map_sector(): read error [ 335.378633][T18069] hpfs: hpfs_map_sector(): read error 01:28:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x10000000) 01:28:05 executing program 1: ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000040)={0x1}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(0xffffffffffffffff, 0xc00464be, &(0x7f0000000140)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:05 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffdf9, 0x0) 01:28:05 executing program 5 (fault-call:6 fault-nth:0): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) [ 335.462216][T18077] hpfs: hpfs_map_sector(): read error 01:28:06 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffdf9, 0x0) [ 335.516161][T18088] hpfs: hpfs_map_sector(): read error 01:28:06 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffdff, 0x0) 01:28:06 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x68000000, 0x0) 01:28:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f00000020c0)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x11}, 0x1c, 0x0}}], 0x1, 0x20000840) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000040)={0x6, 'vlan1\x00', {0x4}, 0x8}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000180)={'ip6_vti0\x00', 0x0, 0x29, 0x6, 0x9, 0xfefc, 0x11, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7000, 0x1, 0x8}}) sendmsg(r0, &(0x7f00000015c0)={&(0x7f0000000240)=@can={0x1d, r1}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000002c0)="bd4129cea28d1c18311283d2293c7ed6109e9dd06e450b6fdbf6a1547809a778c851284c6032bda98341123e87e101731cdfc74bc7642c0f9b41baca81e5e4420ccbb74cdb4a279dbf64057792008cf8ec82c63db58c8abd5819678654d164b3815b0b100d69e6cce9d2b49aeeac4f63c800b4772687c42d06125d19cfddeff9e1768b95fffafebc019e3ba367059261ef465c03732c731b3e41085c1e38df968769756481988b4b15d82d72016a8e1689452a7f2f89b4d880b0721190744636fe336c8a", 0xc4}], 0x1, &(0x7f0000000400)=[{0xe8, 0x113, 0xde9c, "e1fcab2d478644d07318953a489c5f0e483ffa94c6e3b7d1b95c9c9ef63fe1c9bd9238af23f074904ccf26b6722ca9c551581f6f1da9220b09796f8fb2333c1d8d58b019575ef98292f657e9b0ab66c145d528211a2baea48944d0728847947ccb40c8be89efb2c86be92fde68f2ff6f7275f1596c9ff490e7c89987052ff11f973b916403827f0836902f429c59f73ae46a011dc52b87db23d1f11caa30d3112f181943a896ece15eebcca5b382b7e7ebf3a9e499ed4cac7e415c3519524121b41671eae50d3febfe32fd502015d97f35cbe918"}, {0x20, 0x118, 0x1, "56a598ddc0b133861b"}, {0xa8, 0x29, 0x20, "a2faf6afb320149c61cac80fe74888165df667ecffa8138f608178bd5e943f3e647a9d388863714d8f8573fd5f141f0bab259d93b780c7a6bc7fcdc690b2a09bf5caf4001254f711192dcda8e3d2419fc648a01fb0de151e158c322f501e74f8f1068eb62f20b593fec5653bc74711e050efaee21433f6e86228c56e81da284d9d8f322bf311d169a7055ec7153393c7bcd39a7780f8ac"}, {0x1010, 0x107, 0x6, "e7d6abbc870ca1cee06dc83d455445f8be19a490839b9a4344f79106ced89c5a55e71dcee2d108ac6cff491c14fa8eea9e646f3290c04d28ed662d8b4952d5d5ef5c9f3f77f61e80175ecb6509f223037fc21680bfbd7ff7c61c17c08b64c69366ce75c7c1241e195a22c7b238240caa0014c58ca319f513ec60c70ae6048ab5999acef2920a02d6bc84ebe9d2af7e806dd7bc7067faf9b605e9f495ea6035e3d9989ffe469751ece7fefc4f448a204c68dc8574588af64485b742f6e0f54f1b83d2d991605c2f5305a107104dcaa23f774b5f2a48b6f0db9b2473840642a5a633a6809b71cf95dfa1098e2b1313d7708e04c378c33787dcd3ae23196d5203e465f6a680fa683c380eedf15fd7ebcac301e1583eb2dff5517a462f0e126e755f236cbe2ed5540e228bd9735c479697264907af89b712b0709e6c6ebb910553fa8993f457fb2a485358de85c5c7dab6d9576f65d5d0a739bbd90e99b0d00b10e92e069e3952b0da2a289a2d46d9a4a76f2953afd3b38dc9d19c1209b2a6e109a6984cc044ceff4f0f652e827c2057ee6fc2d885cd24905a23eb960321b4bbc7bb421c31c56e04b505c05b8e8d73ab12696af5096054603dfb8c1372f356dc2d1b42178fa689f5ecc10c959f8a7ff653458370d181a4efbcb0cbc3009b508c2f1cddafd3c29b9546754f988388a411eeca44c75e0063188c14ac689a40ccaf09a2658f16176fd450b5a97b92f65a0c194b8585a68496187dc96b3d3e10d4cfdcd152b81079f346ddbbb6b50d761ff3be640e0681f124bdb636e7f95a4e849434275875fbc05a21b9b6cf6581a24f58c127950113ed048104f9272a5dc175337d9daf032bece271751928a24cdf041604cf03d39722d5ecf41e21b9a0fc1f75fffd57472192a5bc3936d1e62e1dac35cba80a077f51051b283c7593bacbcef62ddecc6218fcc443107182b7fc0d14d8bf467e599cf183edfc7b21d81c1af13a3e7837dfbdca857279981d54c5aa1863872d2f08a432c07e08d822d4a0858e0aacede05263638ba7c67934b6add24acf0c9cf399203bbd954c4c5e442e6ee8d9f5c862e3c6a497b4047413a9b7decbedfb717eeb046fa26619d66ceb7272eca9289d1e5e1606e1c56b836a724d8bda760e541cb1e25930e42278df293a13b8c599f20b8ea2f3c1b99c584076256e625c05c32b1cedbef8e2fd8d65f27eeef5523d271d3b810d5541ba12e6188a34ad3ff77f7e0842decbd8c2ef6057b05f4d7976273cc2016c76e30f7ff89516e792b69c480407d0d9a4562dd8a240a1c0220030553bff5f7a7b4d6e801bfb5881a684cf854d3238e8a4fdffea801c67cc1824c2ed4d1c92efa15d1824154e1ff5bf99aa68cbe7b270584f4316aa27066c8b210a1f7af04d72320f8e6e06a450c1dd7c7a6ec6651f88f3e6cbb20f38d8628e128a4fb8255f8e40729a0da8edd1a119fa425fbd6c441a04d5b09187859c0ebbf8083e880e918d648e28256c0c75f26940efab0defe0bbf69d7536466b0e9e180993ec04ef747eef7759711163b2de25a78fddb96a8f050c4ece48c0dab7f11d6bfe6b5342335d924997a608f7e9d9fb0e9ec2acc3c01726d20a255024295e038a104a378f813625a99379a56ececf520cde842dbdb426292d1af77953e49b7cc7ddf4beffc82afa5e0cfc3d23e2f019e327c5564fed63fc804696ab78bccdb524217f89791e1a591a17288ccdfb6ce21cf3c5c1e43f67dc967c3adeb64a3f6bbe9701afec79582c928615fcd944b3a157ca1527f941528e5a4c0402c1701eb70b5a46d0de62e3cc04584d690b45ec3a4d5808a85516e27c3ceebbe5c408c3dc58727a3e7b37c98c7e6dcee54d2fb572422537472d40510c6d674af90c9103fc152dcffd71536b62bd16aaedf33d596d25a68786242b31133bc3b8b63fd19ab81a6ff2c1800e27ba11c2e1f178b983de19dc7d5757b1d5c4ac1f04927b6ad58224abbc21c2caa2dd915675989eb004d512de2cfc1ae8b21a472272a3df818794ecfee912cfb175dfc5855a6d9ec146f7828b0910abbec00cf7eb72eebc12d843560a4501d85d42a4b6932daf35ac690dada3a087cc57e9f21c0a78803c2c49e559442f87c251b54beb1575cff49dddf507079c087fc61eae5a6a28559d9967b3d1ac05158774bd9ffdda67ff5a4217a38791a87809c606e1cbeed969d1d85e11fd3ba6253b44b8409461040a04b9c85d86c03e62f1ec8f19d09417f6ecb9bad67c62a028949f73619adb6eee49cd6f807684f3351df946522d6f26e2c656cc6bf7745eade5b36ba4ae496ca687e1ea95fb792d5f059a13fc6ba24a668e87747be758658be9e51563ecd18b10076dd31572d0b9ab017dc13f52c89ce0a73cc80d68ffe31c7198d82974b933d655bea72e24cab853a1d5bdc4ad0e45342590deb1f6edde4b44095109a49ef469d8960de6e119b708c2f08315aedce352d893b0f31df7db2f09027d938695afe64e0b7f55c4dd72ed3be87ae265e38fc8b49019a4d3fbc69cd0aac17cbb56a84c378eb24bdb97035502ea703de69385e0bc28f73bc4061a2197231f20f8f37aa6653dbb7b04c2fc8a64a3214fbdcf3fba54442487f4876f2bdb4918229fe590f03b9f5b12a0928a9969e62dcdae9fde2f5f68857adbbd55d19700c54aab7bd83128b2901ac4001db3c4c82fa7926a2f30af4abd420875b7a896cf2692693a88979644f9b7a11f9f92cc3af182ca36cb98a10b69e94342ce2aff6de07e56fdb6901e00aaedb3f0850847a3ac14ed2c6f73a7ef76c19e178b3862c890ce878f00beeda86ff78e744535fc1acdfd29a8306fd4ad1932929e3a79d364cd156b24748103dc69c2d24af4f518bb1dc4b5f9388f68d5a06b53aeef429fb1c84068c0512e89fa879c30dd0c715a90b7b8682d44655e10d209562099dbb2448f27d11342bb8c2536a5df658de67981163c2a7173b6d3af2314bf344abfdc19ee0c65329e345832392b8f9090eff1faf8728cc83a2e8aa2522dbea6a7110d27862aa8169e3971760b0c0b83365e989ee1913884e5a90a87c38e556a2558f87d09c408977434ea77a8430346d7a99426e8f62780307451501b761941473431409c8c5e39251565118be06e3677eb2446bf0eed7de07ce6ea6ba262129d6abbb3475b5d5ad3f7549285713bcb7690d276c4fb71d1f58f4561245750f3ff2e1b127dbacfb5b838dda8c38b024c493bf794a420dd08041bbdcbead2c1b566658df1e5917ee8cf8e4d0f04c4350b0291175d76764eaef476be68ac7e8a0e28517bab9a5b575c971dfb6cf6b4220d295bcb365a3e03b4661a4f3c19539cba9596e9f6149cd1da57c2c25304e7f1312186a857fc54f0f4fa53c471d70d27552c609ab277b4c9341472bd3dee2ec4c2fba9fc7e656cbd2ef65a6169b2d01226a5cd82b8beda85b32b4ae7c502c85052f589fb19ccc6934851c9780ffe9ccb7371b3f2ad4888dcb8716b13ac63bc08a4dbb11a5f0d4a2b3c68857dea8b679ec4080febe9916b89c6ae082e770530a27fc56133ea5adac58c8b824212d58de7f3740c60f9092e35f9698bd33f19c576ef86cc680c9448f19a4d5a43469107cdd07649a8d813fa1d9399221c67b99ec247beae083a05d2beee5b767ec4d1a2dbc0436459a72bfe054f6ce21e2e603af2cf44256b49a8c40487cc6bca149e89525d87fcc0984bc562773569f7b8ffeb9e91b0ae5206bbc9950a69bf9863be5895e173c038719764144122844d4c0e07eb34c686f1516bdfe20e9a72829046444e5e9daeee8ba5368000e98280980e9135a00c1f4f98f4e94bf869fffa0ad9c1fc9b12d1a3ea2631f8327ca9fbb23b8d2c5b6363aeeb20d45016e7fc0e66d92262b0b5e9d8a18ab660ca75d9fc89f697ead422a0adcd7bcaef6e70b98ff2055b9ac8d7bedf3caf63713ac075f9ea56d8d3bf9c093248f030ae666dbbdceeb53207bd23b70c0599f38216afb36bcf27003d45bb9b8f68e60077fd10800d88091cb060b179614f95622c91e5b00903360c6e515116db1ea39dcffbdeb2444385b02ef2fd5f37e9037879bcbfa9138ea0a1d59c987f9164b829ce6693f335e18ac1a104f63e9f37973ab26599b7cf9c27f46497728b1daee7e61309b7e1edf9ca9815138542328cadc23c792b95df7944695277b969e448c9a8eae71b38bf99ecab4ccb37f6166335c6c4a3bb2c52fef2caf31e21ba28a03e1625f385411bd3bf63e259bcfd15259fe9096489a439fc949ee45e59b1673d0e48e45625d743ae5a09bd90a2a5586ca7007d1bb9577e92ba56ad8f51d3d7ab0242abc3033885f886214c44728fb67ad0cce820d181673faabed6e26e3e171a50c52fea9c2d9df736c5c44654a78520d36fc626063ff712b8ac9b76c2e464bc2a5befb71327c2de901dffe35eb10fe44cd9973987b1f15d08fca0b4bf666ccc32f412c71703f0a5956e714ce54157a45fd6bc6789b05bef804d085fb3fe78a40956280edb177ca03f03b5a8fccc3249aced357fecd6104d34bd675939f18bdb50b14a08e5f6aa7d0396c6d9747a022f0d2b20205012f0be858a3cfc7989fcd22dcbd12d63538f115787ab66de592bc00553574777d28d29daab97a9e0ad4f810581f7a3d70b357f41e2fc820c473d0c748e48cdd9a56f523f8fa9cab0f13e4d55f3f9e61ab3625753b7f1bf61f5bdfedcfa74286cffeac085b37dafa8217ad74f21e3cf1cdfe741610d6e8ccb47e0a1d0b18fa5c498b7948e2199e7e7017400eac3de37df9631fd6d53747334a121131f9c95af2d0d1118b764dc9bec90faff14fb3f04f464a0a79010bac46ccb6b05bfb40bc27a82d217a6d3b32de774aa3da4d6d4cde79638650b30adbad8144e0e0636e70dbee51ab2acad5506bed7ebd6e77ce81431301996fe62af64b870da8f53ca6e0ab2f9844a1fd8325e5805debb58dc92b41486f47b80268f323a18c1940ce0306ae532efb705bb1f1ef2fc0813a6185c0f2965cc58c1efbf1dec1239fd4441fb2239b68579e8935ab6ebf19006b55f756306983f5bfd8b5be1c0c65573131996b4136db2542246d5137a8a96fc1402eef96988d2aa23680c39acbd461ac159856c7455dc7bdf466bc83e3384eee9b408b57c0746119e4cb13c8c406e1c0067df978e5e28ec541be3c6460c4c2355cb5f99e8b205983a03a84f2aa20bcbcbfd1c10865ca44a6666f3290383e6bbcaee9ea8f0187908dc6a1a08d56d947dac6bfddb0cdfa9f011a6a76f9f3dd17969f6eefb3481c3abd0ab90b4b8cdbc38af7eb670c5238e22929e166eca253c0c846691850da29f1ab8912518a0b0a93d9115431b64707574c889864231b3bccbea34ee0c8162d32fbbba631bea2446b400dc9749e639b201152949f80e77ee8aae8e4ae019e3348810ae6dce30ee209d32d57fc676f757c4e53a88d46bbd99833fe447fa07a27e09dcceadb36da64a9b4f6c4966ccf7b1ac55bb11ece7fc3f4c9cb8fc5c78a9d51d5edcc878107b40f97d3282e15aec5986a14817622dca8dc30ffa4ef94bf1b57ca346db44bc030a291ecaf4cb99d3738b4bb8b25070a57a5aecafcc38f06d9d0657d4f3be70e325b66d5a936240a7ad08297651010a496d7f418aa2dd713ddd16448619dc11c050f015fea61b09469a7a0fac477c44b2cdd133ee83aad466ca1e324c63823a362afbc190280b07dfb945ed6cbe0d8c4aed4e1466e22bb29cd580a576435e5780c1c301d241adf19c1480dc11c121f3d5fb2d31e9f0c97900cfb163c58d0269"}], 0x11c0}, 0x40880) r2 = syz_mount_image$cramfs(&(0x7f0000001600), &(0x7f0000001640)='./file0\x00', 0x4000000000, 0xa, &(0x7f0000001c00)=[{&(0x7f0000001680)="f75983c4fbec9fb075b9f0b3ac7c73cb9850739c14d9feff21f9838d97db3512fd23beb0b992b469a082f558f2", 0x2d, 0xfffffffeffffffff}, {&(0x7f00000016c0)="28823ea0dda6ae6166fd45d8c3785a55ce52ff1f2b0cc35e546b7d97f358f25e0eb7c03bb3721b418ecce97d4cc39d32f2f5d10e6b750f106a86b94b54dbb2de4178656ee62022313b9a2a3132274c60e95de3a6bc74988ece0fded57db8fc721f507e99ce50ff090778b030852575660620f2f5ea5f38192481e796af0774937a21c89aba1141ee0b5b8de7274de5e39c28f92ab9f0cd762fb547e42b6dc579efaf0daaabe759b6ed072361507a345827a5f68ba7e5a1a69e79b8e5e4865bae767d4c3b8ebde0ee04c2df3a6171b89e75a9f73bd9527c", 0xd7, 0x2}, {&(0x7f00000017c0)="17d7c4f62abacd4bf563ac7e9a669ce60ce875edaba712d878f4194785336c1e87c2a28a3eb5cbd7", 0x28, 0x5}, {&(0x7f0000001800)="9ad09495c2067d8525a0b604e50622a7702cc7fc19ed4f8c75728f550518d3530545d95b4e035cf4b0ce94ea63ea4759153badad32ee4e41ee566afcc30c5a936c3de0a8cf3c7568351a6d22f116cd780d6b0964f4870170b0403161429a2a8d30096d179aab6a489b88ef76a47f080578e4e6492bd75f507ec278c1d18a110c01097edde8a009255defb32ce872d16d41", 0x91, 0x7ff}, {&(0x7f0000002100)="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", 0x1000, 0x9}, {&(0x7f00000018c0)="db0dd389917a544ca4045791ddec97c4f0c6f7b38a0cc5ba36ca97d0c2f370d9b56df4a68a2acf8a3dbb9a7fb81c041bd53a6ec41112f62a5e6212f59e10fac80685a3004967f7a881b6394238ffb25491e6b12fa1c1635fd37d219dcf49d5ab1f96649a5388571cc301065999b37d8ce03dd47d9d7eee3fe3969b1313f0f167ec4f0b2fe0de3858f9d18ba3d0a651e216aac901c607a9efa836c44e1b6b704de367ef619f88a5bdfb67ee469419836eac573031bc8023674dea06175e271381cc8e", 0xc2, 0x5}, {&(0x7f00000019c0)="10fc4e8c8a17e564311f408c5f9238ab523ccb2723a2de5f647b47b22a0ab5cc8a0f4774810cbc9d5734471806d869c3f644d5ae12a4cb7b64a17a3482fde38e909d9b4001b06f304056cace10b835c6dfd1b766291ecbbd18f0b687ef26cbc0da739d9d1cb26ad9694ded144690c2ef897a69685a2984fee81f4397f5dfc90a94ceb3fc593b2155eaf946d829462f9c9c7f2f02876c8dd4ad7b8752da517cac4065cce5f9c06a45cd9dcddfe207c7d898088ced298de3a6b7f48dd19a287949facc2e265340e8fb1c513de64e1fe8acede8bf027702883446d1090162c7e19b4d440347cccc8f59deea16749cc66c49a5c5d00087", 0xf5, 0x101}, {&(0x7f0000001ac0)="0cfe74bba0f27058eaa0bca220d57cfbf1ba542d01a66246e2143b2a000cd407ee1f805de186f169dfdb5da3910e0af84c32b0fa24a1ef23c5dd23aab32f88f28651891511fc46a56432caf79d3ae45cb1e11a19d65f261efa4fe311bdf451b41dcb94f1a23233388e6442dd43117915c87a78368f833ff389111b321ef506c6393673160d0ba32d977cfa2a50a37b24d6b551154d38ca1b162f29738bc12c76eb34f32e5d", 0xa5}, {&(0x7f0000001b80)="069418948747441028bf55d275d7397328f7af6d45827318c1a9f244631d157b059fc7c486dc5bef6a3e201c466d9e1c9aa5def7a19fe52f20bfb4cc936ee57672cb64c29a5ebceb134d1c77eb26bd783d9fccb88a6e50fe5e847d14f8ae1faf3d", 0x61, 0xffffffff}, {&(0x7f0000003100)="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", 0x1000, 0xaad}], 0x0, &(0x7f0000001d00)={[{'syztnl0\x00'}, {'vlan1\x00'}, {}, {'vlan1\x00'}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ftruncate(r2, 0x100) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x50, r2, 0xaa2af000) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000002000)={0x2, 0x4e22, @remote}, 0x10) r3 = syz_mount_image$v7(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x8000, 0x1, &(0x7f0000004140)=[{&(0x7f0000004100)="ee7abff43da3402806860fbc0bb3a020ddc027f124f77605f2", 0x19}], 0x390002, &(0x7f0000004180)={[{}], [{@context={'context', 0x3d, 'staff_u'}}]}) vmsplice(r3, &(0x7f0000005200)=[{&(0x7f00000041c0)="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", 0x1000}, {&(0x7f00000051c0)="c630f7b8ed01182fad6634664e1b71e4d22678d4eca1d7228dafdb7a8539dc0f4c265fd1c05e795bcad5486cb945685e34ab", 0x32}], 0x2, 0x3) syz_mount_image$tmpfs(&(0x7f0000001d40), &(0x7f0000001d80)='./file0\x00', 0xcb, 0x1, &(0x7f0000001ec0)=[{&(0x7f0000001dc0)="f47d9e1fd0ba1eb004dc504fc08afdd70982a3476c3df49418ddd2bff651e62f0a752251d578a34824e951e6e264640f39123be0b228ebe7146b344ae5117256114f4bd527ea7341fffe0cc2817e4ff7eb767125462cbe128e130370bef4582614b27d9abd656f9215d708ccd5b0e80b11ad4b37f8a8a14154f3581b53aebc4eed32c055739da480a54cd1b8212cbd53ce9bab1b44336f36c9cb9b68cb25b3c7b1b1470abb5779797aa3f5befeabbf50cbe9281358106561c9beed3b5c57f9153a2e956e30315c03cc07c65c9ec0a1b3d247b1ed6b1c0bbe", 0xd8, 0x6}], 0x28000, &(0x7f0000001f00)={[{@mode={'mode', 0x3d, 0xfffffffffffffff7}}, {@huge_never}, {@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x36, 0x30, 0x2c, 0x37]}}}}, {@huge_advise}, {@nr_blocks={'nr_blocks', 0x3d, [0x6d, 0x37, 0x2d, 0x74, 0x35, 0x25, 0x65]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x31, 0x31]}}, {@size={'size', 0x3d, [0x65, 0x70]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x33, 0x38, 0x70, 0x74, 0x67, 0x34]}}, {@huge_always}, {@huge_within_size}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@appraise_type}, {@obj_user={'obj_user', 0x3d, '\'*)'}}]}) 01:28:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x1f000000) [ 335.547121][T18099] hpfs: hpfs_map_sector(): read error [ 335.556493][T18098] hpfs: hpfs_map_sector(): read error [ 335.584355][T18104] hpfs: hpfs_map_sector(): read error 01:28:06 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffdff, 0x0) 01:28:06 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6c000000, 0x0) [ 335.633220][T18106] FAULT_INJECTION: forcing a failure. [ 335.633220][T18106] name failslab, interval 1, probability 0, space 0, times 0 [ 335.650118][T18108] hpfs: hpfs_map_sector(): read error [ 335.669095][T18117] hpfs: hpfs_map_sector(): read error 01:28:06 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xffffff7f, 0x0) [ 335.707695][T18106] CPU: 0 PID: 18106 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 335.716331][T18106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.726484][T18106] Call Trace: [ 335.729769][T18106] dump_stack_lvl+0xcd/0x134 [ 335.734376][T18106] should_fail.cold+0x5/0xa [ 335.738904][T18106] ? tomoyo_realpath_from_path+0xc3/0x620 [ 335.744634][T18106] should_failslab+0x5/0x10 [ 335.747853][T18132] loop1: detected capacity change from 0 to 264192 [ 335.749145][T18106] __kmalloc+0x72/0x330 [ 335.749176][T18106] tomoyo_realpath_from_path+0xc3/0x620 [ 335.765330][T18106] ? tomoyo_profile+0x42/0x50 [ 335.770026][T18106] tomoyo_path_number_perm+0x1d5/0x590 [ 335.775496][T18106] ? tomoyo_path_number_perm+0x18d/0x590 [ 335.781149][T18106] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 335.783674][T18132] cramfs: Unknown parameter 'syztnl0' [ 335.786977][T18106] ? __lockdep_reset_lock+0x1a0/0x1a0 [ 335.787004][T18106] ? perf_trace_lock+0x2ef/0x4d0 [ 335.802765][T18106] ? lock_downgrade+0x6e0/0x6e0 [ 335.807631][T18106] ? rcu_read_lock_sched_held+0xd/0x70 [ 335.813096][T18106] ? lock_release+0x522/0x720 [ 335.817780][T18106] ? __context_tracking_exit+0xb8/0xe0 [ 335.823254][T18106] ? __fget_files+0x23d/0x3e0 [ 335.827947][T18106] security_file_ioctl+0x50/0xb0 [ 335.833076][T18106] __x64_sys_ioctl+0xb3/0x200 [ 335.837949][T18106] do_syscall_64+0x35/0xb0 [ 335.839796][T18138] hpfs: hpfs_map_sector(): read error [ 335.842383][T18106] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 335.842418][T18106] RIP: 0033:0x4665f9 [ 335.842437][T18106] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 335.877434][T18106] RSP: 002b:00007f326429d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 335.885864][T18106] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 335.894980][T18106] RDX: 0000000020000000 RSI: 000000004004743b RDI: 0000000000000003 [ 335.902965][T18106] RBP: 00007f326429d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 335.910951][T18106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 335.918938][T18106] R13: 00007fffca73631f R14: 00007f326429d300 R15: 0000000000022000 01:28:06 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xffffff7f, 0x0) 01:28:06 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xffffff8c, 0x0) 01:28:06 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f6465761c7fa2e5de9af25cc088887dcf484a36386264300047d724a90e431500f9cf3aa2a9bdd45fc4c6e95d37e67ec21ac92dd4f99e68c256acc910c5a8ed9011fc1ff5746120076aa15da12cb1bd28b6c5d75b374c28be6465702da3fc7e8e130688835cd4a8c61d0ffd2519def845a12588a33756b3e0550ea3878d592f623960525283f64bcd175a36fa7700535a7f735a67e0f76b4d1ce3dd91325d52a6b66aee1e9475bf23e56c4925e47ef2ff9952f79f199f6bc763dce895e3d5b6b89cd4a4b31a6898837c595b"], &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 335.965177][T18139] loop1: detected capacity change from 0 to 64 [ 335.972125][T18106] ERROR: Out of memory at tomoyo_realpath_from_path. [ 336.011766][T18154] hpfs: hpfs_map_sector(): read error 01:28:06 executing program 5 (fault-call:6 fault-nth:1): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:28:06 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x74000000, 0x0) 01:28:06 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 336.034932][T18158] hpfs: hpfs_map_sector(): read error 01:28:06 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffff5, 0x0) 01:28:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x20000000) 01:28:06 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000040)={'ip6tnl0\x00', &(0x7f0000000140)={'ip6_vti0\x00', 0x0, 0x4, 0x6, 0x9, 0x55b, 0x9, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x10, 0x7800, 0x4, 0x2}}) sendmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000001c0)=@xdp={0x2c, 0x0, r0, 0x35}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)="6d18a230fb4a69fb48fea0db8971b38f9676d144673a74f5368451d5b4a99d6a046bc2075298d1e4f30f1603307cf9cf265c2ad117e367c172a051adb91bab3b6514f4f0863403", 0x47}, {&(0x7f00000002c0)="0c8711cb7d7b10929d85485d3abd9ea5310240acf7432162803d8fc2f0bc5e99c8ea9ac77b18fcf7f7159fb9185c5d1c3545b3dcd199043c8ccc4dbc24f38e0b84b166e1c86425775af44b3e358d5f4bda38b6d0b51efa0164532806fe2b73748c3b6d70c2ef04098695f5751e72e2ed7276ee9e6babca6c58c66bebebf8f73cee38cfbf57f8ad1adad19a3d2fde", 0x8e}, {&(0x7f0000000380)="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", 0x1000}], 0x3, &(0x7f00000013c0)=[{0x80, 0x10b, 0x74, "03e49d2242d0243f9bb1bddaa8b8e2d167e9ed3e72221b70ae03db34096833a5a017808c4f024ce3162fabc31171d0dd4acda9616d4e30c9f1420c660106d4299ada79686f73a2b476a6f126f7fbb91bd3cac2f59ca0314b5be02402e589d6e0f7aec12156c3874d65d9"}], 0x80}}, {{&(0x7f0000001440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0xfff8, @dev={0xac, 0x14, 0x14, 0x24}}, 0x3, 0x2, 0x4, 0x1}}, 0x80, &(0x7f00000025c0)=[{&(0x7f00000014c0)="cb04d070051e8f4d47f194b89833fe903c12fabe5190272c4a695ad6bdd0302d06aa962d9585aa9022e7a6e9f462d6c26477fcb65c4a8ca08c9bd341572ad421", 0x40}, {&(0x7f0000001500)="0462c322cf5b2729f15c2c2ea4ee2b3295c3f690fc769224b52850c1fe4359149ffd8324c00bc1d466667e7708075ee5f9857918326d2a72cdd7", 0x3a}, {&(0x7f0000001540)="76afc104", 0x4}, {&(0x7f0000001580)="227a0fcb643ca35cc241555b1edf8fd3041e02b631462515f9fc66fe1e3c21de3bf664566404e255a0f405f90f5f7fcff0f2a26f2e4cd29892a13666791a80", 0x3f}, {&(0x7f00000015c0)="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", 0x1000}], 0x5, &(0x7f0000002640)=[{0xe8, 0xff, 0x9, "727c2676fe776d1efbed5b98914e7e4aadd30e14122b74e55c7e38912d19d38cdefff2f8e13ab15a241e4a156806b76ec2397f8f0e7955cf8b8c533bb5eefca9c94072c88d44dff197ff55f5c60bb01c2e533debeb4fed8dd1cf8c8664f1dd37819615feaad4fe3c6b00048b8a0b4011bd7aed1bc6747356fbce761941634f62d57c9b2c7f9532270d9e5b7cccd4a0765d2fd7ce1ac129a2d310076185bc4ca60750f4b77520779763b65deba7d16af8cf0ce87dac306d0996b16af24d22cfa6ddff8486930cdb9f206c942f72268c5f5af8"}, {0xb0, 0x88, 0x7fff, "f54f05aa651f3d5117b971ab1bf5e8f0bf89b1a21a79d034f4a55e51a7fb2b2259a6216d0b9108b136eb59826b31fee496cfd3c6712cf94428e77125835bc70976a6724ba8b143a434df51906e185a6ef2a7d628052ca72d4916c0cde9630f3d515d7bb99168b85c25c95078df94ff81d226920792a1831a7405161c6402b472fc364261875d9532f285e685d48d1553636fa0de8aa4c61854"}, {0x48, 0x10f, 0x21d6, "e87e7ab05f4a217ec5c18d338a574dd84ee794c24c873cef48e123ff8d9359d88446e272d31834a83ec561a507d775b53c6f88149571"}, {0x90, 0x1e, 0x7f, "8774ef1a165178a2bd37186476529941e8bc0baff115178cd64a37963700bc40736a7c1af69c3bf92214cdf6b963a38d656c09844452916056b7f19b4d65f1096fb0db109df66583d79c55ddb2cb9b58f0592655af4cdf6ac5d1b9da459696c1f6b0a45aef7db35059b9159e26dc8c5c6a66ddf1a8af715334"}], 0x270}}], 0x2, 0x4800) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 336.156092][T18172] hpfs: hpfs_map_sector(): read error 01:28:06 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffff6, 0x0) 01:28:06 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7a000000, 0x0) [ 336.199936][T18182] hpfs: hpfs_map_sector(): read error [ 336.208091][T18179] FAULT_INJECTION: forcing a failure. [ 336.208091][T18179] name failslab, interval 1, probability 0, space 0, times 0 [ 336.233593][T18187] hpfs: hpfs_map_sector(): read error 01:28:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x20355000) [ 336.274867][T18195] hpfs: hpfs_map_sector(): read error [ 336.293157][T18179] CPU: 1 PID: 18179 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 336.301620][T18179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.311924][T18179] Call Trace: [ 336.315199][T18179] dump_stack_lvl+0xcd/0x134 [ 336.319787][T18179] should_fail.cold+0x5/0xa [ 336.324285][T18179] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 336.329654][T18179] should_failslab+0x5/0x10 [ 336.334148][T18179] __kmalloc+0x72/0x330 [ 336.338295][T18179] tomoyo_encode2.part.0+0xe9/0x3a0 [ 336.343485][T18179] tomoyo_encode+0x28/0x50 [ 336.347890][T18179] tomoyo_realpath_from_path+0x186/0x620 [ 336.353522][T18179] tomoyo_path_number_perm+0x1d5/0x590 [ 336.358970][T18179] ? tomoyo_path_number_perm+0x18d/0x590 [ 336.364593][T18179] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 336.370393][T18179] ? __lockdep_reset_lock+0x1a0/0x1a0 [ 336.375761][T18179] ? lock_downgrade+0x6e0/0x6e0 [ 336.380605][T18179] ? rcu_read_lock_sched_held+0xd/0x70 [ 336.386053][T18179] ? lock_release+0x522/0x720 [ 336.390720][T18179] ? __context_tracking_exit+0xb8/0xe0 [ 336.396172][T18179] ? __fget_files+0x23d/0x3e0 [ 336.401018][T18179] security_file_ioctl+0x50/0xb0 [ 336.405954][T18179] __x64_sys_ioctl+0xb3/0x200 [ 336.410627][T18179] do_syscall_64+0x35/0xb0 [ 336.415037][T18179] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 336.420924][T18179] RIP: 0033:0x4665f9 [ 336.424807][T18179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 336.444870][T18179] RSP: 002b:00007f326429d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 336.453393][T18179] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 336.461441][T18179] RDX: 0000000020000000 RSI: 000000004004743b RDI: 0000000000000003 01:28:07 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xffffff8c, 0x0) 01:28:07 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffffb, 0x0) [ 336.469423][T18179] RBP: 00007f326429d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 336.477381][T18179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 336.485515][T18179] R13: 00007fffca73631f R14: 00007f326429d300 R15: 0000000000022000 01:28:07 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffffe, 0x0) [ 336.555110][T18209] hpfs: hpfs_map_sector(): read error [ 336.578792][T18217] hpfs: hpfs_map_sector(): read error [ 336.589496][T18179] ERROR: Out of memory at tomoyo_realpath_from_path. [ 336.620114][T18201] hpfs: hpfs_map_sector(): read error 01:28:07 executing program 5 (fault-call:6 fault-nth:2): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:28:07 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x83030000, 0x0) 01:28:07 executing program 1: syz_open_dev$sg(&(0x7f0000000040), 0xd6e3, 0x240200) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000003000"], &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0xff600000) 01:28:07 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffff5, 0x0) 01:28:07 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffff6, 0x0) 01:28:07 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xedc000000000, 0x0) 01:28:07 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa0000000, &(0x7f0000000000)="8ddb952489725f76bcc271e13ec2e54fb41f0fa1d1", &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000200)="e38d4e2fb645b54fc00eba0468132bc0ba1cc47d1cf417800b2180a548da05704eaa3efab17f30f65c911b830902526aff25d150f02f270a13e677d640d7aa9677ce7cffc8d92ff5b103b93ebde969df713772709a90b66974bf7e9a278d3346095ab2d3de1a604286756d5093560882e6989a81e2a002916047d6fe06bd569af81bf6c045d5a771fe9a0eb19b4af89e868c6fd089f61724825ecc9b9eb62469b69e2672f322d5f40c3f9751576c05f3a3acf9284e561dd5c3031b20f56aa8913efce2674f055ea7cee198b42098ecf160d241c43deebf7aa585644dcbf9ce0d") mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f6465762f6e626430004b6169d8f25593598b7b628dc9e94a6cb643d10ed5e545b7bff21f6de15f1a3b87bf2fd9b6791e479e9886788d1a72cd0fae115c70b9788453a4"], &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x61020, 0x0) 01:28:07 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x88030000, 0x0) 01:28:07 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffffb, 0x0) 01:28:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x400000000000) [ 336.823187][T18257] FAULT_INJECTION: forcing a failure. [ 336.823187][T18257] name fail_usercopy, interval 1, probability 0, space 0, times 1 01:28:07 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1000000000000, 0x0) [ 336.926113][T18257] CPU: 0 PID: 18257 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 336.934579][T18257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.944651][T18257] Call Trace: [ 336.947940][T18257] dump_stack_lvl+0xcd/0x134 [ 336.952544][T18257] should_fail.cold+0x5/0xa [ 336.957060][T18257] _copy_to_user+0x2c/0x150 [ 336.961577][T18257] simple_read_from_buffer+0xcc/0x160 [ 336.966962][T18257] proc_fail_nth_read+0x187/0x220 [ 336.971998][T18257] ? proc_fault_inject_read+0x220/0x220 [ 336.977546][T18257] ? security_file_permission+0xab/0xd0 [ 336.983093][T18257] ? proc_fault_inject_read+0x220/0x220 [ 336.988721][T18257] vfs_read+0x1b5/0x600 [ 336.992905][T18257] ksys_read+0x12d/0x250 [ 336.997159][T18257] ? vfs_write+0xae0/0xae0 [ 337.001590][T18257] ? syscall_enter_from_user_mode+0x21/0x70 [ 337.007514][T18257] do_syscall_64+0x35/0xb0 [ 337.012474][T18257] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 337.018467][T18257] RIP: 0033:0x41937c [ 337.022366][T18257] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 337.041988][T18257] RSP: 002b:00007f326429d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 337.050944][T18257] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041937c [ 337.060397][T18257] RDX: 000000000000000f RSI: 00007f326429d1e0 RDI: 0000000000000005 [ 337.068559][T18257] RBP: 00007f326429d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 337.076534][T18257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 337.084507][T18257] R13: 00007fffca73631f R14: 00007f326429d300 R15: 0000000000022000 01:28:07 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x20000000) 01:28:07 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffffe, 0x0) 01:28:07 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2000000000000, 0x0) 01:28:07 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@private0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xe8) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x2001004, &(0x7f00000002c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@nfs_export_off}, {@nfs_export_off}, {@metacopy_on}, {@nfs_export_on}, {@workdir={'workdir', 0x3d, './file0/file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}], [{@fsname={'fsname', 0x3d, 'hpfs\x00'}}, {@dont_measure}, {@fowner_lt={'fowner<', r0}}, {@obj_user={'obj_user', 0x3d, '/dev/nbd'}}, {@dont_appraise}]}) 01:28:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x540000000000) 01:28:07 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8cffffff, 0x0) 01:28:07 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xedc000000000, 0x0) 01:28:07 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4000000000000, 0x0) 01:28:07 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x9e030000, 0x0) [ 337.343039][T18312] hpfs: hpfs_map_sector(): read error 01:28:07 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_evm(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000300)=@v1={0x2, "34756adb2151e6"}, 0x8, 0x0) clone(0x0, &(0x7f0000000140)="5313f8d28890bcfe94dcd678815e19e613b3414635e25ae1b28be2686b6055574884497beafb5452f2f9d52743bb0ef15fc63777b0c84fee6d297defdff8e6972319c9ea4d17b6883359b0ca65aafcef3c440e17d61b0b4c2be3567c16e1a901ad24096173", &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000200)="97d924c428a895d36073fec0d38d4581cc5f7c9b1f4d895dc6394aeb4cdcf8c83b83e67a8127cf18c5a682e72ef1a3338a57ca08e221aa3153edb2fe2926bd8224d335e6e7fe1c9c2dee2f9a2433790486982c87646400e422a922e8d566185bdd0d00705bfc57789691ba5d892ed3a189253be6") mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f2465762f6e62640989"], &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:07 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6000000000000, 0x0) [ 337.382379][T18325] hpfs: hpfs_map_sector(): read error 01:28:07 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1000000000000, 0x0) 01:28:08 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2, 0x20000000) 01:28:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x60ffffffffff) 01:28:08 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x9f030000, 0x0) 01:28:08 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7ffffffffffff, 0x0) 01:28:08 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa0030000, 0x0) 01:28:08 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8000000000000, 0x0) 01:28:08 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) chmod(&(0x7f0000000140)='./file0\x00', 0x40) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r0, &(0x7f0000000040)='./file1\x00', 0xa00, 0x184) 01:28:08 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa000000000000, 0x0) 01:28:08 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa1030000, 0x0) 01:28:08 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2000000000000, 0x0) 01:28:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x7fffffffefff) 01:28:08 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa2030000, 0x0) 01:28:08 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x10, 0x20000000) 01:28:08 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4000000000000, 0x0) 01:28:08 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc000000000000, 0x0) 01:28:08 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa3030000, 0x0) 01:28:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x970000000000) 01:28:08 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6000000000000, 0x0) 01:28:08 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f6425762f6e62643000cd1814ac8fcfef0343bc4c0311d5405423dc9754a080100dbb703fd4841d14dc82b33c54b5f01304c3f98e5403af7b70d73b8209f167400a3be30f2a221c77e9ba3e3bbc70ca389d8abe0309a66f355ade8c51a8edc1af48238054124b5d7e1d4e5a7a0f14a27d4721f299371fccf1e1d626c13cbd50c2b9d21f55dcdafdd028ad21bbfc"], &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:08 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe000000000000, 0x0) 01:28:08 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7ffffffffffff, 0x0) 01:28:08 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa4030000, 0x0) 01:28:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x2000000000000) 01:28:08 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4b68, 0x20000000) [ 338.005071][T18396] hpfs: hpfs_map_sector(): read error 01:28:08 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8000000000000, 0x0) 01:28:08 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa5030000, 0x0) 01:28:08 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x40000000000000, 0x0) 01:28:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x4000000000000) 01:28:08 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa6030000, 0x0) 01:28:08 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa000000000000, 0x0) 01:28:08 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf0ffffffffffff, 0x0) 01:28:08 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc000000000000, 0x0) 01:28:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x10400000000000) 01:28:08 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4c01, 0x20000000) 01:28:08 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa7030000, 0x0) 01:28:08 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0x80000000]}, 0x8, 0x800) recvmmsg$unix(r0, &(0x7f0000004a40)=[{{&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000040)=""/23, 0x17}, {&(0x7f00000002c0)=""/26, 0x1a}, {&(0x7f0000000300)=""/44, 0x2c}], 0x3}}, {{0x0, 0x0, &(0x7f0000002640)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/21, 0x15}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/66, 0x42}, {&(0x7f0000002440)}, {&(0x7f0000002480)=""/231, 0xe7}, {&(0x7f0000002580)=""/177, 0xb1}], 0x7, &(0x7f00000026c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78}}, {{&(0x7f0000002740)=@abs, 0x6e, &(0x7f0000002a00)=[{&(0x7f00000027c0)}, {&(0x7f0000002800)=""/25, 0x19}, {&(0x7f0000002840)=""/237, 0xed}, {&(0x7f0000002940)=""/137, 0x89}], 0x4, &(0x7f0000005380)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="8b00dcee4a0b1b5090ef38eb3c3f3cd40a384553a41f6579f2201943308d52e5fa923bb4c78306d6f9bbae8ba85e8dd5edd14305133327c426ad410f6210111566fc252b1640ef2de51fbd331805666f3313cf1ce7743b6d08d732e92c2a736ec3a2804a3bd250140a02a38adde761f7784cac64f87f05b64da50a9106e68083fabbd8f92127f223d33acb105fd0c05077bc5a537fd717ec45db471489732333b91391617dbbbefdce9d597cb0eb3be377fc8bde9d749295b3cec8beae65ed94398627e406fcd66aa2d91a7765bb4d4c7d074c1e26f0ee8fa030aaae3e84462765a46e555c8204e0f4ed533b6cbc01898d8b01c583d3d9e770", @ANYRES32, @ANYRES32, @ANYBLOB="20000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="34000000000000000100000001000000", @ANYRES64=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRESOCT, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000002000000001000000028d000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x128}}, {{&(0x7f0000002b80), 0x6e, &(0x7f0000002c40)=[{&(0x7f0000002c00)=""/27, 0x1b}], 0x1}}, {{&(0x7f0000002c80)=@abs, 0x6e, &(0x7f0000002e00)=[{&(0x7f0000002d00)=""/196, 0xc4}], 0x1, &(0x7f0000002e40)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000002ec0)=@abs, 0x6e, &(0x7f0000004500)=[{&(0x7f0000002f40)=""/103, 0x67}, {&(0x7f0000002fc0)=""/185, 0xb9}, {&(0x7f0000003080)=""/45, 0x2d}, {&(0x7f00000030c0)=""/204, 0xcc}, {&(0x7f00000031c0)=""/132, 0x84}, {&(0x7f0000003280)=""/147, 0x93}, {&(0x7f0000000140)=""/178, 0xb2}, {&(0x7f0000003400)=""/209, 0xd1}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x9, &(0x7f00000045c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000004640)=@abs, 0x6e, &(0x7f0000004980)=[{&(0x7f00000046c0)=""/60, 0x3c}, {&(0x7f0000004700)=""/1, 0x1}, {&(0x7f0000004740)=""/191, 0xbf}, {&(0x7f0000004800)=""/231, 0xe7}, {&(0x7f0000004900)=""/110, 0x6e}], 0x5, &(0x7f0000004a00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x7, 0x140, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getresuid(&(0x7f0000008800), &(0x7f0000008840), &(0x7f0000008880)=0x0) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f00000088c0)=0x0) recvmsg$unix(r4, &(0x7f0000008f40)={&(0x7f0000008900)=@abs, 0x6e, &(0x7f0000008e00)=[{&(0x7f0000008980)=""/50, 0x32}, {&(0x7f00000089c0)=""/124, 0x7c}, {&(0x7f0000008a40)=""/255, 0xff}, {&(0x7f0000008b40)=""/96, 0x60}, {&(0x7f0000008bc0)=""/88, 0x58}, {&(0x7f0000008c40)=""/186, 0xba}, {&(0x7f0000008d00)=""/247, 0xf7}], 0x7, &(0x7f0000008e80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000040100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xb8}, 0x40000020) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r16) dup2(0xffffffffffffffff, r2) r17 = gettid() ptrace$setopts(0x4206, r17, 0x0, 0x0) tkill(r17, 0x38) ptrace$setregs(0xd, r17, 0x0, &(0x7f0000000080)) r18 = geteuid() socket(0x10, 0x2, 0x0) chown(&(0x7f0000000000)='./control\x00', 0xee00, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000009080)={&(0x7f0000004c00)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f00000050c0)=[{&(0x7f0000004c80)="5056701703dee449d6c7c3ceae10070100d6ba658b6f32c12a8ca4161a8debb8f324c0c0245f8bfc194ad0de78cf2c83b00def76532a35b656872d78bec0e611ac3293f2a93f4ef82bbe9fbe0b44", 0x4e}, {&(0x7f0000004d00)="5a9bfdacf9cae9e2a3a93c78d14ee30c2b020ed05b5e89d08448b25e0b30cdb4e1b6287a3e7f7f432435b95ab63a16eeaf339ade773d1fe5ae11066247e3edbd13e98743524654d46f2566ee8654b4872df5fe200278bb19d9c8ef44385c6bcfc85b841e3865cbeeb51f44b7803e8039576d999ec90a8c7e4a6305a24bde56055648331910ba410aea9e32db182f5d10acddb94cbb9052904177be55ed783a0101a87ae759f69f", 0xa7}, {&(0x7f0000004dc0)="171bf81408789f4625a36c216f978c52b4c3af52e2e9dd088a0958469f5f7744c6a8e650c1c591f2629c0c7b6246b814ffa1c133aac34e40cf7553d26e38824637ee042821349de1e37f0029dcaf036059114abcaff1c5894eafc5ea9b60ba992deb07667b3785e093a3feaa39aee58e8b757ff5ae680a0e67acc663d69b7b2a856361058f15f24003179d4ab251f461ef870e3547a7c8141c78df290db1bc9da9dd1374f1ad5f70dc4de5ac8dba920e2db7da1809a4468b638ce8d2", 0xbc}, {&(0x7f0000004e80)="d85d2081a2a59758129c233d19a66a4dc739081f5541e1b7c824113acbc63906043af928f83999ed5e42dbe0535c60e7febb23f3bf06347ea6c56325df9f450955ba1af05b87c8b18449e4392bf05fd0860113681e183d530c7beb146544c17ac6a4a91d1e2b17cb68e10bea8f95f84c90f98c927dff18234054f0d66faa6204df2f2203f08e8006e09c56f63a7e8ad78709677f2662685e6dff0f5980ea18ccb7ae46f7980c0662dd8d2d940ec1622488473ef3086651f1ea6c02d5c0d4c553fca9186038e9d229ca33c637c37d206c5aa3548fe4b69d0468942d4c54a03a7e6d20af6e20e17a3bbabe5b", 0xeb}, {&(0x7f0000004f80)="cc507ba9ed9bec1b4b495c1dd518ce8f3164ce87fe05be2435a7555cbeeb72a333f59d3668514e57864e818cdba3bd5dcba00721f0423544f11452a79b4e5ab0744b0c6681dd16b64c8275a195223527cb864dec", 0x54}, {&(0x7f0000005000)="4734297dc7c8dce1f8790df999f2775c2a502336a28149041aa57f143d8151e9576faaedab44f5a1e38e247f68ef8873248260fe82f1c52c9980967e6c11bbef8dabf6dd8d0f8129ffebdac2351d9b3ef2902980c8f54d96bc5e47eea3017c879f01ae84106b30c918776b817a5d98da82e90fece6e673336e38a7ea312e8eb4cef8435487797e38068dda529d6a4c0bfb3713f9408799a6fcff67a348a87db119537ee8e7945729", 0xa8}], 0x6, &(0x7f0000008f80)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [r6, 0xffffffffffffffff, r5, r11, r1, r0]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r12, r9}}}, @cred={{0x1c, 0x1, 0x2, {r10, r13, r14}}}, @cred={{0x1c, 0x1, 0x2, {r8, r7, r16}}}, @cred={{0x1c, 0x1, 0x2, {r17, r18}}}], 0xe8, 0x48840}, 0x28048010) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000002a40)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:08 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x100000000000000, 0x0) 01:28:08 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe000000000000, 0x0) 01:28:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x50352000000000) 01:28:08 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa8030000, 0x0) 01:28:08 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x84000, 0x0) 01:28:09 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x40000000000000, 0x0) 01:28:09 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa9030000, 0x0) 01:28:09 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYRESHEX], &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0xc04a0100000000) 01:28:09 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x541b, 0x20000000) 01:28:09 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x200000000000000, 0x0) 01:28:09 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x6000, 0x4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000002c0)={0x7, 0xfff, {0xffffffffffffffff}, {0xffffffffffffffff}, 0xfff, 0x800}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x26003, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r0}}, {@version_u}, {@loose}, {@access_user}, {@aname={'aname', 0x3d, '@,'}}, {@cache_loose}, {@cache_mmap}], [{@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', r1}}, {@hash}]}}) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:09 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x300000000000000, 0x0) 01:28:09 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf0ffffffffffff, 0x0) 01:28:09 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xaa030000, 0x0) 01:28:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0xc04f0000000000) 01:28:09 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x100000000000000, 0x0) 01:28:09 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x400000000000000, 0x0) 01:28:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0xf04a0000000000) 01:28:09 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc0ed0000, 0x0) 01:28:09 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x541c, 0x20000000) 01:28:09 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x100000200000000, 0x0) 01:28:09 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x500000000000000, 0x0) [ 339.099816][ T3112] nbd_handle_cmd: 51 callbacks suppressed [ 339.099837][ T3112] block nbd1: Attempted send on invalid socket [ 339.114935][ T3112] print_req_error: 51 callbacks suppressed [ 339.114951][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 339.141893][T18611] hpfs: hpfs_map_sector(): read error 01:28:09 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000001740)={0x7ae5, 0x1f, {}, {0xffffffffffffffff}, 0xfff, 0x5}) execve(&(0x7f0000001840)='./file0/file0\x00', &(0x7f00000019c0)=[&(0x7f0000001880)='dont_appraise', &(0x7f00000018c0)='\x00', &(0x7f0000001900)='fowner<', &(0x7f0000001940)='\x00', &(0x7f0000001980)='fsmagic'], &(0x7f0000001a80)=[&(0x7f0000001a00)='obj_user', &(0x7f0000001a40)='[:-p(']) syz_mount_image$omfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x573, 0x8, &(0x7f0000001680)=[{&(0x7f0000000180)="e64c281298a598698084b286d3acb46bc153a21a24a8185433beb52c08f44f0a9584b1d9c457838441f8383b9562644e02daf73c8fc15dc512603be0104676873ea392d0e5b6afe53295de831ff7c902c2542c3b9e78b6c01c79f3522ce69aa1bc4b6c1d177de5dd2aae067a363c1231b5f6ab8999e27b9b17891b", 0x7b, 0x8000}, {&(0x7f0000000200)="e62b78281fe701eb020085481e6f59c281561c57f9beb81f2b39235fd9d6315c6cc7ab54c7ab17d970b41197988db6247e382c4aa9b5e84127ed8281071cd7e7a0a410f3acd6c0a4b803f2f6395249acdca5449d68b9fbd7e09301c1d001c3bf6dfff4a7e72673c2c32bac57fccb323d8d60cbd285ff91b338e50ed14fabfddac39ee8fea4c371bf25", 0x89, 0x4}, {&(0x7f00000002c0)="b4b56a770527ca47f756a314693dbd06ec310caffe69fa92dc3b3173ef97bc366651c3ce5afbec37f4cbcf488b7faede58897bcced910a50640c55aac30b61f153c5c31063ff56f9d70cfd5ea70fdb7bd842c13993d1855dc399078cbde341fbe2ec59f0812cbd41f97e4316be4fac526ef9398d8b7b9215e133c44639d043738a8dd9c7df3d618b5fa740d59465217f3dd6b594c1be5f9df4492294e3873d16f14ff3a70abf956abb65", 0xaa, 0x328}, {&(0x7f0000000380)="dc65a90c572a61916e13528ee0303e297d837d7fd25856ee068ef02e3c748b62016e7d37e00b0671ceb932921adf3b4080baefc026dfe103c29201e81fdc4619988c125432e73385e175a744116b4722385f30c5d5703c48a777ec535e3efe5a", 0x60, 0x7ae}, {&(0x7f0000000400)="290d481b57a8a016821cf166ed9d8ae599c583e41599b4af9a10a622641eeccfbb9183e307fc658771c03c873bf7ec1ef996ec2e4394158629a58b78bfb24a290024f196f5f848fd8e5112a39c116ebc055266719ae9b96853a45dcd45f1b58c3b13cbbf4bedc75ca25c57ba03e9cca028293a730b5cbec0818328a9032ac0a1c0f8f397d10db5118b848eebdfe050a55593d62d1e55103acca7ce971b5aa15d05d301c02ce9f8ef7c82e761021fd59c38ba58595d107e6f808058a0755d6051728558", 0xc3, 0x80000001}, {&(0x7f0000000500)="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", 0x1000, 0x9}, {&(0x7f0000001500)="26244328d022c15096e4588d98f86506938d860242761c06d3e3fc37c69839769b7cd9a4f791cbca916c4bb9cbfc73eb3b186ca562d41c8070897b5533a44fc9676c623002d8d328014d51eb1f39d0ab7fdb499845e176db36de6723a5a5e3e3feb8437529802007bc401e83df56c7f4f8539120c7fbe8e095c1f3dc3678e45a4dd0adf0537be9f92fc5883be071039f4157b64cc5dc4b06b5f9052ec910d0911f5363b186881e697238db33be76588f321a18effe139ced98615fa13418e8839f55ab42e9ee161bde05496f59f2b95640c8323de807bcad0a8837bc1fc0a6d3c5d09523", 0xe4, 0x6}, {&(0x7f0000001600)="d0bc8120cf313cbb2bc8d239bb28079fe0f5f8013ba0bc593480e97592cd67b39fd088dbe92de77c1eb3618253d4ea1f5d28a7dd8f371bdc44b2c94f33c1e7e83094d7bd47378c85693576316f713fd66f34cbb45a8d285c7e", 0x59, 0x1c}], 0x2, &(0x7f0000001780)={[{'hpfs\x00'}, {'hpfs\x00'}, {}, {'[:-p('}, {'\x97}(+'}, {'/dev/nbd'}], [{@appraise}, {@smackfsdef={'smackfsdef', 0x3d, 'hpfs\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@dont_hash}, {@obj_user}, {@dont_appraise}, {@fowner_lt={'fowner<', r0}}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:09 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x200000000000000, 0x0) 01:28:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x100000000000000) 01:28:09 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x600000000000000, 0x0) 01:28:09 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x5421, 0x20000000) [ 339.147824][ T3112] block nbd0: Attempted send on invalid socket [ 339.154034][ T3112] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 339.168637][ T3112] block nbd1: Attempted send on invalid socket [ 339.174962][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 339.186887][T18618] hpfs: hpfs_map_sector(): read error 01:28:09 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf5ffffff, 0x0) [ 339.195348][T18661] hpfs: hpfs_map_sector(): read error [ 339.200930][ T3112] block nbd0: Attempted send on invalid socket [ 339.207128][ T3112] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 339.220697][T18667] hpfs: hpfs_map_sector(): read error 01:28:09 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x300000000000000, 0x0) 01:28:09 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getegid() mount$fuseblk(&(0x7f0000000040), &(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000180), 0x205400, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@default_permissions}, {@allow_other}, {@blksize}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x20000000400000}}], [{@obj_user={'obj_user', 0x3d, '/dev/nbd'}}]}}) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x10, 0x0) [ 339.332038][T18713] loop1: detected capacity change from 0 to 264192 01:28:09 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x400000000000000, 0x0) 01:28:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x400000000000000) 01:28:09 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x700000000000000, 0x0) 01:28:09 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf6ffffff, 0x0) 01:28:09 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x5450, 0x20000000) [ 339.433592][ T3112] block nbd1: Attempted send on invalid socket [ 339.439977][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 339.471223][T18730] hpfs: hpfs_map_sector(): read error 01:28:10 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 339.545141][ T3112] block nbd1: Attempted send on invalid socket [ 339.551344][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 339.562262][T18744] hpfs: hpfs_map_sector(): read error 01:28:10 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf9260000, 0x0) 01:28:10 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x800000000000000, 0x0) 01:28:10 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x500000000000000, 0x0) 01:28:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x800000000000000) [ 339.710521][ T3112] block nbd1: Attempted send on invalid socket [ 339.716920][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 339.727839][T18771] hpfs: hpfs_map_sector(): read error [ 339.734064][ T2044] block nbd1: Attempted send on invalid socket [ 339.740270][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 01:28:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x1000000000000000) 01:28:10 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x600000000000000, 0x0) [ 339.758195][T18778] hpfs: hpfs_map_sector(): read error 01:28:10 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:10 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x900000000000000, 0x0) 01:28:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x1f00000000000000) 01:28:10 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf9fdffff, 0x0) 01:28:10 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x5451, 0x20000000) 01:28:10 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x700000000000000, 0x0) 01:28:10 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x800000000000000, 0x0) [ 339.916335][ T3112] block nbd1: Attempted send on invalid socket [ 339.922628][ T3112] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 339.942273][T18813] hpfs: hpfs_map_sector(): read error [ 339.948524][ T2044] block nbd1: Attempted send on invalid socket [ 339.955070][ T2044] blk_update_request: I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 01:28:10 executing program 1: mknod$loop(&(0x7f00000003c0)='./file1\x00', 0x10, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, 0x0) clone(0x281000, &(0x7f0000000400)="0b0ef418cda2634ab99f8b878b5b1c8588fdb13da5287eb6806e0e8f60b7f40c4c9d732049d4c1a9f7513d31675ac1568e6ff44ce713f40c889585a61ef5ff6b7e216277ea1ee06c0cb009a5caaef61e5598040933109b804384cdd5a1c2adc2a16872b968b8ecdd13d431daaccdc1c36233dd19b8e7f55cec6bd94dd22628f70567904a91b391c50400aac9addc0f807e75693e5fafef8037a0e27db69ff0c369f17ad30d742ee08d0c4c4d7eb29c1068bec21266999f213239125f3b4e93f6ae09968bcd32cf2186c31b1c033f7b847f6bd6d6c2dfa97a82a6", &(0x7f0000000080), &(0x7f0000000500), &(0x7f0000000540)="d429d3e09d4c1508db36545ed87ac1391e51f5936859e895ebbcb7946f6f746d49b066b3af41a0f63e4c2e0642d46f6bed61efe6fd05ee00bdd00b31276a13c7a46d34037ec93cbe136e9fd0aefe37e70f9421eb37f1dd7ea3d71f8264d4427ecc91840d93e7b0a9ab72d5d11b3f073fce0eae8e6af60957a9ddd1842a7524b6b6d64062bffbd0") open$dir(&(0x7f0000000600)='./file0\x00', 0xc00, 0xc) clone(0x8100, &(0x7f0000000140)="ef6102fc4126d1d62b6a30ad298d3137f03ede6a3b19e0822a382c13721aa239a7cc2820e00e0d6f9a60820a0f3f815e79e4142fc141ff55a39946e61f12c90afd26f1b34c30ce714c80349d664b89d2f12c38634b192067e8548ca6206fe7656bfe3809e39ebd8ed3f77d0e86dd2b2b641efeead87f307f1ca1f11c029203b0674d5ad80f383e859980cd43b784bfc7be8357b1165d2ab74d97034d9287e4d809ec215e598551929ce3876c88e8ab06cd8b979594b81e619f6fd7301a87d44ec3d193aae22e273026a3da240b3af69d9e9ac896b7664c3b9599e84acfa32f6d", &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="70c5d321d05908c0b7eac9bbf19d42026622c32696deaccf9ac348f6452e6ff19e6976639c98b584b734725126c4998297e9c5e24ba494662446ffa7fee47771bf93b8ddc2edd403bf490440d8ef90f571f31da306855ce78f1166cb7a9cd6d7df3baeacfe782374fd2956e4f81ac69a032268f67ace7736585a52d52689eb20289e75affc0e64d330969386cf9f289273e2561ce5b32a6f1c5a285ffe1e4b0df7aae46bb5f155f5b81440a8ebd4026aa013ba1af58f6280c499a0fa6cd66ca3b434afb2d464108371") mkdir(&(0x7f00000000c0)='./file0\x00', 0x10) 01:28:10 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x900000000000000, 0x0) 01:28:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x2000000000000000) [ 339.966314][T18818] hpfs: hpfs_map_sector(): read error 01:28:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0xffefffffff7f0000) 01:28:10 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfeffffff, 0x0) 01:28:10 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa00000000000000, 0x0) 01:28:10 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2f6405002f6e626430017d19593690e62d0e3d4426f0c3b3ce53060000001ac32fbba5096c51265ab876f4a7919b2c5dba3c931305c08910da832c49408725cf03b082b6badc3875c68e6c39c198ef858d791dc954bc2e49f137131fc78c8e709e9b7f1cccb77313c429229574acb3a8222cb80a36b22b5b62a6ca9ab97e266570e535bda068bf6082360d548008193c88068b19ba634322cdb83fb741964dd71d5965cc9761621768afab4bae0258faba9d7928ed4a568651c28a1745fe724972973f9e938f64b93fa950027a1a070365c85db3e3c6aa44fbddfb517134acd2b313badfbc2358a27f"], &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="696e030000007be19e552395b26578706f72743dffffffff00000000783d6f6e2c75707065726469723d2e2f66696c65302c666f776e65723de558eaf882837b", @ANYRESDEC=0xee01, @ANYBLOB=',smackfsdef=/dev/nbd,uid=', @ANYRESDEC=r1, @ANYBLOB=',rootcontext=system_u,fsmagic=0xffffffffffffd448,smackfstransmute=,dont_appraise,\x00']) 01:28:10 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff000000, 0x0) 01:28:10 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xa00000000000000, 0x0) 01:28:10 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x5452, 0x20000000) 01:28:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0xffffffff00000000) 01:28:10 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc00000000000000, 0x0) 01:28:10 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xc00000000000000, 0x0) 01:28:10 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xff0f0000, 0x0) 01:28:10 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xd00000000000000, 0x0) [ 340.318384][T18890] overlayfs: unrecognized mount option "in" or missing value 01:28:10 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xd00000000000000, 0x0) 01:28:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0xffffffffff600000) 01:28:10 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$setopts(0x4200, 0xffffffffffffffff, 0x3f, 0x8) unlink(&(0x7f0000000040)='./file0\x00') mount(&(0x7f0000000140)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2000, 0x0) 01:28:10 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf00000000000000, 0x0) 01:28:10 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf00000000000000, 0x0) 01:28:11 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x5460, 0x20000000) 01:28:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) openat(r0, &(0x7f0000000300)='./file0\x00', 0x101100, 0xd5) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000448000/0x4000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_setup(0x5b91, &(0x7f0000000280)={0x0, 0xce39, 0x10, 0x3, 0x321, 0x0, r1}, &(0x7f0000029000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000040)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_setup(0x6e4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x4}, &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000656000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r6, r5, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd=r1, 0x1, 0x0}, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x5, 0x0, 0x4, 0x4, 0x1, {0x0, r7}}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, &(0x7f0000000000)={0xfffffffffffffff9, 0x4d, 0x1, 0x3, 0x1, [0xfffffc47, 0xaecd882, 0x5, 0x2]}) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:28:11 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffdffff, 0x0) 01:28:11 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1000000000000000, 0x0) 01:28:11 executing program 1: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xff) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd9r0\x00'], &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:11 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1000000000000000, 0x0) 01:28:11 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffff000, 0x0) 01:28:11 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='binder\x00', 0x0, 0x0) 01:28:11 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1100000000000000, 0x0) 01:28:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/87, 0x57}, {&(0x7f0000000300)=""/251, 0xfb}, {&(0x7f0000000400)=""/210, 0xd2}, {&(0x7f0000000580)=""/227, 0xe3}], 0x4, 0x3, 0x1000) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x1) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x77359400}, 0x1, 0x0, 0x1}, 0x10000007) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, &(0x7f0000000040)={0x3, 0x39ac, 0x63, 0x7, 0x800057, 0xffff, 0xfffff4a2}) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:28:11 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1100000000000000, 0x0) 01:28:11 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffdf9, 0x0) 01:28:11 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x5501, 0x20000000) 01:28:11 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x8000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x100000000}}, {@max_read={'max_read', 0x3d, 0x1}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other}], [{@smackfshat={'smackfshat', 0x3d, ':}$}\')#'}}, {@measure}, {@uid_lt}]}}) 01:28:11 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1f00000000000000, 0x0) 01:28:11 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1f00000000000000, 0x0) 01:28:11 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffdff, 0x0) 01:28:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000580)={@id={0x2, 0x0, @auto="a91076fe90266cf0a84b27e8b8b34bf7"}}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) clock_gettime(0x0, &(0x7f0000000040)) r4 = syz_mount_image$sysv(&(0x7f00000001c0), &(0x7f0000000280)='./file0\x00', 0x8, 0x1, &(0x7f0000000340)=[{&(0x7f00000002c0)="0334177d814b9d726354262965959e4ea09a1eece8d200603b4ff4d32e35fe27f489d9c3254b98f403bf3e8027d3fdd6eb462d87bbba2c0c307c50f021cf8f5edf55a37e9dcb42c21a3dcf6496cae4a0c458fda26d08b2d59402e19001902fa4", 0x60, 0xb3c}], 0x200410, &(0x7f0000000380)={[{'\x00'}, {'#).'}, {')$'}, {'\x00'}, {'!'}, {'\x00'}, {'\x00'}, {'\x00'}, {'+)-:'}, {'+{'}], [{@appraise}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) syz_io_uring_submit(r2, r3, &(0x7f0000000240)=@IORING_OP_STATX={0x15, 0xc4f2fe366789e038, 0x0, r4, &(0x7f0000000400), &(0x7f0000000500)='./file0\x00', 0x2, 0x4000, 0x1}, 0x10000007) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) r5 = syz_mount_image$squashfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x7, 0x4, &(0x7f00000008c0)=[{&(0x7f0000000640)="9baff30f5092803473dd34ca8eab4b9ad9edd2c9fe5068fc53228044beff8b66d70e10463b328beb392bfe10c58938f102999a22549f78accf8ffea0a3c31b7f68e4198c14837fa9e4fd489123ed260a041c9a7757d9c91ceadc897279937a52e3fc9f0cce02816615972202c71f61ef6ab906ab946955fd2893751e95778f1386d05251edf70233d0901acfc197f32b0aaf0f111caadfd2407c5458b15de2bd8b7c7b06e3533b532e2bffbfa8a5e85744e3", 0xb2, 0x6}, {&(0x7f0000000700)="397d9e56c29c2972ba36e0d2ab21d38843983a3510354cd3fd2fe196dcd46d56d9b7c8cf0a68a6c47ad3ab745d471268628f6f9bf1335d8f005abd3e67c4907becfd003216e15e63e38413ed0dfda42bb764c81a4fbbbfef1f15ae424a9c349f33bcd5ecc3bfe19a670ae93c43b07ce7e0cb69872354a40f09fedcbe9aac1452b2441dddffe21e299d1f330dafff7ce1e70c80eb40367fd38f0e7f22b3d21f44", 0xa0, 0x2}, {&(0x7f0000000b40)="59f9efc9ad5501bea6c39faebd11887d11217cc6dfcbd96cac421fdebdf42c926bbba9277b23c83453cc1213e9d839aa515534e81cd198c78bce3288d8736d882deb3f11a24c4e8bbd59a207dd66766294c267f1281745571a8d944a06b8ca688229224448d54971b61c7fde042f566fc1fd961b4ceb3f06032c8e70f4110c2d2514ae0ae7ad3773dfa55f78a47d6a88fbb297c7ad47ab8f2e89ce4a7aa1fa350f04be9d9627dcc8f745ea8a25f90ed6f53b2dc43535f9e89d61f1ba64943b990b82c1eda2aec16a876f305afdc9ef70d974edb4f9b24141a354d073b4af0c0d585b01c577d70a5487ab18aba53431898b9c700986d578adf8557bab9312f3d12fc69e5e12a3e745fc78cd77ddaebf264e2bc3ee19155254e027075dad49775f8c2168b7f86bb61298ab53e568f5e52f2c06defec6f4d098c4516cb5d60557a28e6ae1496c9c7b7cc4d45f5675fe7e72a4c76397eb6b69386746cb1c9a58b8595e33cf35f4a97d5bef3d8f5c6a68a7352288d4b6ae9dd272042b3a14569442dd40144f83124f1e0f971efc4f08e83c16dc3526cbb5c77f78f033fe11d6873af60477b97a1ae89bd9ba2e4977f063f83e1863b28da6777e7d0275e3414cc22280902c1cff6f5708822c359c27cb99e00e973b6457c9761c17433e37ff65666fb3eaad20621241c5aaa332c36b65e80c9b0eb218402c3c67854185ac4ac28692946d10b05e16837aa3655c1e95fb4fd2e3f14475e1a9aed78678b94db93b9d905a8e5915ff31c9923a34ab918f8102ed87698bfe2652a48009c5ddc830e54b140fcc4c39ebadc670b17fd1d158f50c852a319cea04fc3ebbbf7fae06c27bc360d76c939011eded290ffc07f5892d23d6ca7bdbfaaf00cd162a9e0e1b4d5097fa13f0ccaf4fda76d2253f163f24ec903e933274fd6b55ab16aaddcaa7d4c375706a021c47c81703523cd1923adb774ce9cfb86c69e1925f40b5664e794f30bacc7a673aa7fa62f0e835998153e870a332e37e274768eaaf5e0cafbaa59139d8c6062346464b0501eafbbda3b7dc7dd0ef6b658174cea9bdd0f333727d3e0d5f1d1ba0cc4fae6709045fca2c0fd143d05d88d09ad4e693106c17055717832936e8dd65b332178f6a195ef5a9134b832b0d69ce7c0e0fb2730b358e041f463f8d1046e36b5075fd5cf908b4de886d6416d49fab3d55bfc126736907fa7c656ae9ddb4f1d0fafca7e384b8374c26e3703beaaf032f81aa263f4109370365a3d2a58362ece393f21bb7e0aed5f1f3844336c62719ceca7643aa0e9677abcb15294432ccfe14bd6a07d027db7e3d211cd341e7153166b33234803bba829daed53430a6480388a15d8b0fba2ff2f6abe3b7d7efee033cf156983562ec60d396a97cb38072f8cdab59b809bef52aab09ad7976efa33b4911fb138479da2ebbb48d63b8c6f3e21efc8eb644968a227cea6da1069d367f5259f625e68607d4ae6d5b946651eeb4ec9a443d9c92984ca27ee31c0a458018ca0bfb8eab825d9d2da979b2f2def717efde2050771daf675270842e4c291ef9fbab7db165e13a8d61284af4f7ab42af5c9b6b433bc9d8c6259077b43dcccff966b1a4ab7f6afd718505618000957809182fb374b97a76b5c893e6a5c02decedea09e5979bc0a58c9d22d9cf5745927353ba783cb45c8e674903c121ae6f6469e819baa8c38fa68984ff9de0331953a8c277a1205d9037c17726dcf90afa2123fd37a22ba13a593e0e43fb7ab2ebe0bab38ccbcc6a5aa1039ff78339bb46b3e6f5390004cfb39cc0d180cd23eae0f2bf821229fe65c04a6d69972cda4d877e604b008eeef7fafdd99bcc1a286d810571274dbce60e1b1f892896ddffc649cf15fb5485f39ba84152f133b7bce31068c65e1610fd78a73f0154092649a15d44788bbd87dd206b5122e5907ee44c68c9ea49aa1386b6c4ac669d336c1b527f7bdd84422f7baf52cf30dda8b9ae9d1a32822b7e410fc4de60a685d0888c8e6a64f41728e1267fee087bd50fd374b60610573d5f074190a37483140b87efa4f7f1d0c8137b9eb01d6388e4ae6eaaff63603464e5c09e2d7bc6f3af6870d8cae31c832a6c9ee16167c83b261af8827c6ce704b6f052590b500f4a3193863140d904af8429d076da01d24dcfb521c86c8845c8a45f41d02caa32dae1ee530f0bff125973b546aa3a1f43e81b3fcb5c80958a0701a98b9ea826ecf3847f83f2175c8441627de6f249fa7cf31fd213907f38429cc1550d8eb291d3ed5c9fac2eab864bb2d85a29947653d6fbb5e26dde0f954063741974cc74ab8ece0c5232848182e71c443fd0f90dbe995ad3f9c7d36c40336778c87fcb0e479f71aec1c5c3f41e33fd8d270cec91227b8d50fe827b6b858153d2377859442e565aec5a3d1f9dd4000c03bb116c23ca31d5ac5fff7e9be7a64d6b3356b66888e389185c63ab77cf5cc7e5089040082aed4cf911e9716d42ec35b2dde0575bd81d91cf0cc0b8b06959d10e9b87ee1ab1dcad6d0a63dd77d34c5869fc6684d268691b5090d7cf37d0f12ee15f080460d334b7d97ecf87285ea8d5d115d5a43b72e0bb0ef838d657a1b8883ea4d42cd80264fb367ffa35def81637cd2e4a514debfe1ceaa30ccfd7331f37d5c159dc424e51a56d2ac2970e9e46cdc502588e55c1c04092e2bcba668ef58b6303076cc771842a9a277aa00587f40f6a0126de142d47c2f1b1f88d1d3b562fbcfdbc1b74509a91a4667da9d35de592139d248594d023d096774824d9affe0c115a1599c596503beb6a3e898767be49b71642c831d031ce08197a51fd17c42b8f9aaf050937b9c131d20b01c5aa5188452617551e68d1721c829e77dcd137035d940460466353f3a0a28076bfc1c1973115dd17928f35f1b8f4fa08d468a4146be49b16a236f14dcabf3bd73398055513a2fd358026c6e3204a57996b44e2d2416ff6370c03ae07d6077ab4423ea56f7891fee07de74c968ebdb13b0fe2a79b619da424521f38cdd10b6b79571cfbc4961692868675293394c039cd9620f7b9820cac93ae98a9dc7f5e3e3c4ff195f735efa1b092b46508aa1e1a92fc8ac8568c50f36fd991206794054178c55fd81784ca8c6ead473df7305194292f1e10bdec3c329bd86accd9b2035557b91912732686278a4453645d8e1eefc00c6e830388870f4f86cb2b04c7d0ece792317f3cf40f66bd4da8a86783f795ff20f9a7dfaf5213a8779af521719ffd09fd5d250a3bd6ed498f9dbe404dddc11e4abfcdc453428201e2c365e250b87296ef7bb60f48c19b039f86bf0aa92e6ab3a6905feb5ea3e205606d72c0f509bbc4dc577995b022c7510f29947d1397bf2b1d9c10b30b007f18925995b9a1f19b280f5b3a1198c722778dbc3b895ea8dba349484add239f1bf259ba2c03b16348612c3ef5c8cf58b0e7058f53b8d4b83496dd0879d39b091c79b2f7af9c88a453f88b13c19685d6a2405bd7ad0b0aa1d418abe596add9dea6cebdffecaa21f3e8a3c876ecd5bf45ca875c98aa5ebb6ebebce6aea576762df2eefcc87dfe8509bef547007ded04ae66247dce8d1db5c05d0923e8603c3ab02bda0de7394dce01a0695c058bba7dd4d7a7799b6a8c98b9c3d7b9fc6a37655170b3dfe0d8aaab8c674885090885da950bb4d113926efccb0a70adb4a745aaf7c6a43b5848f1dcb430305df718a51275f9016e31df8f4293819796145bd629b5830eb5631c3420940e7fecde3441c9e81811a7c84a4dad9cf97090b36fa5f533ddc4ad7f090548997f0f3b4e9e5e7f20d49b19209e4d4d08fcb3a50f113738c58fbdebb3962abf4f6d76d58378f26599ea9960fe8e3d5939e063db32ae223329fbf46094a57e16761a2c35a7a92dc46c642d44e632806b5ac17fc4bf306fe26cd8791f067529bcfaaa0ead7ba5da6617dd85a261d1271c9f9bbb8010570a3ef71e3fb59d352222f7382369fb00e406c61ed8214ade6a9e632ad0886cc378f7af6faf1145741c90ee117df0cc6f90bd8cdbb406433d67c89a4c73b7080c910ceae5927ffc185a3ee9b39da22cf09b5510b4134ce4c0cbe872b4502905d6c8f8251e719b6453512f409d7ff5bc1e96ad17fe12ab74a36a12e1b3593fbaa387844beafad40cab9b062032e8ec46c3b76790377d4b6c89b334b34d259f9b3afc01622634088ce0945609cdd80a1fa4c15aff179fe67f31aac17f7a8b13e53783f2e4b17df2f6b8302ff561f0be164346ea56a189b09b1e0327f21964748084cdccdf5fbee871e9e4e3b3bcedbdba88ffc79354de0873be49e2f1918816274f40e48290907d52fe59cc709826ce41a6dce0e038791662a83fc4f710e408ffa9dac3ac95dbd70ef4005d8706f346744282bdc236cc48bca4308b4eaaf72b9642e5beaf7bd87d8442c3708790947435f6113f720e62600d19ce1a9bf3d68602682b4c81ebc2fb86318ecc89db1055b5c0549ccfcd980c06f0ec0af317567b60f383e81dcaddf2831f4ef6792a3862483f7d1d8fffbc0e677aa7671191e09d938c6eaf2d3572d5935d666864e4ab1db7414c72fb649566e81c2327d8a164ec66f5ce76dd0dcd0203b4513ecffe666a4727006c0bf658453d4366cd2965f2a42ebc397ac81a4e08baa1679da70154b313de04eda07b78df86be36ede06661fccff1c0c457503f929e9d7d984f68660c8e1ab4dace1bf18f0b905792add373597c64da06dcd5980dbbe1bfb5df23458bb12c6d4727d9d9c10a8f5f5a1e06cab376e424ef963b56d3bde6612a365c5872d170a8fc9c341e394fab5e630c4210a4cb3f35085eb2c4ff95303cc553be5cd186e76ef26a590c0dd9f0d0f1f759637c182db7030c7fdfdd802380db1c700822eaf1b010c4d2d12130ebe7e943ede1416fd94c6802217fb827c1b8911aae330c8d2fe27f64418256955e46d91cb40db0f47f3972906c00f9ba394c63c55797200bfda3e575f0b841a66ec633f1283d210dcfab4c5605cb65f0d94a87ff12513968e623cab14566bb926dd51aeacda0f0ed10e06614d58405bf1b1440bbb97181a1914cc0dbf637bfc3485efc13da7b4c43120d988b4b0ee7473cbf4df49d928a9dc34f30a76586332cbf09b1cf4398c5107ef94da6e5c14aabee7313170cc4853b75acb7437443ca9107c852bbbe737fc212542b8d2cb17038a878cffb3311524ba7201641d7c826a8d4f533d537c75b7a61aa1b8746311b02d94e57f8eaa0d8bf9bea7939d8c89b82b1aecf86139c9e65d0af608c9c4f5563f35b6f7ad86216378019bf7664818cd2f6db5484f1343675b97b636a263c0887242acfb42c0ac371481c093f287906eaa7443f7a1bd3f7138fe5c0b053e23c60f565405d2a8a85608bec3b4b121432df97405b18dfafe4c6d69550ff231af918f9d63afe95ea58313982dbcba93c6c21e343ede11fa5d8776f072acea8f93a7315872efb7944c373447e188fe4914b2bae09e8b2e741c046d63d174bf56e41d5935cb0b324f6aba3146c9ac91ec44809e1dc537a78099376fc3a03078306e2670f9f17ba22ca019976ec23467fbbbd018f3b25a26f8d8eb725adfcecd9e58408678ad4571bc37988e8a8d2f461073baa61346c5ec39d17bce38b80b490ab8681e3dbe42bde866d0e0ecd4b95aad69e01c25668b28b7d2d566d8977713b6417bd0fbc2f12e0c2bb1de3abe6bd773316f85816222918a923f0284b28881f06fa2a6b8260b0833ebee9c39fa9928174132848dfa92e3f6bfa5fadf3ee5ccbcb3cf398295b094bec3d14a8", 0x1000, 0x101}, {&(0x7f00000007c0)="f2ee0c46dfd86aab1247cba3f6a66d460845783fb1d51a557d1a87eaa0a93a497956399b52921e90d41e5a498124753509fb0321a9a669a0ef5cb1b000afaaad467d5314e3bc847b816f4d2384641e22970cecfaaa24c3bd16fa3e42ca2ac60cb2f2356e0e14a70f776f556603fac0dd30c234f92a5106555462720d114311195a17efe1d4f881354eb8b6acb32a1d754b792248d98d689acff5f85a3d8d4a3597a39e5e487f63395a78471b0e477991529bc3dec8d57683ca4f3a620cecb2439267da3c3c1cc8fe332cef9235ef47b00e0c", 0xd2, 0x10000}], 0x1002410, &(0x7f0000000940)={[], [{@smackfsroot={'smackfsroot', 0x3d, '!-'}}, {@obj_user={'obj_user', 0x3d, 'obj_role'}}, {@appraise}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@subj_type={'subj_type', 0x3d, '#).'}}, {@subj_role={'subj_role', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '^\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x31, 0x32, 0x35, 0x62, 0x37, 0x63, 0x63], 0x2d, [0x0, 0x30, 0x37, 0x37], 0x2d, [0x34, 0x53, 0x37, 0x36], 0x2d, [0x63, 0x33, 0x32, 0x37], 0x2d, [0x66, 0x30, 0x39, 0x30, 0x30, 0x30, 0x56, 0x35]}}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x31, 0xf, 0x2, 0x33, 0x65], 0x2d, [0x2f, 0x62, 0x63, 0x63], 0x2d, [0x63, 0x65, 0x66, 0x35], 0x2d, [0x66, 0x66, 0x39, 0x32], 0x2d, [0x30, 0x30, 0x61, 0x61, 0x34, 0x36, 0x37, 0x33]}}}, {@seclabel}]}) preadv(r5, &(0x7f0000000ac0)=[{&(0x7f0000000a00)=""/169, 0xa9}, {&(0x7f0000001b40)=""/182, 0xb6}, {&(0x7f0000001c00)=""/111, 0x6f}], 0x3, 0x9, 0x1) 01:28:11 executing program 1: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000300), 0x10080, 0x0) write$sequencer(r0, &(0x7f0000000340)=[@t={0x40, 0x0, 0xfb, 0x1}, @echo=0x8, @e={0xff, 0x3, 0x5, 0x4, @generic, 0xd8, 0x4, 0x40}, @generic, @l={0x92, 0x3, 0xb0, 0x18, 0x8, 0x3, 0x1}, @v={0x93, 0xd, 0xa0, 0x1e, @MIDI_NOTEON=@special, 0x4, 0xff}], 0x25) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x4000080, &(0x7f0000000140)="a04b97d1528c69306f12ad0236108205f1e0166a33f003d56ef9185486554675fa6927b73d15afc60434f61d71a2c13349276f1cef4cd9a1814ebdc358f793be7c3158e3894969ee38eadf506efa1431ba2d71ea1ede957a7e532ae20879775b185b5b7053170509a427e4058b74cd9ab73b603eca03a241e591f2cf9ff11df0406fd00ca372b1548817ce6ced9d51d783189873705537a4bf595f8c86eead72d74c27dc29e062896fb5ad6e16476512a520f6d5470763f4edf7f177ced1721652c57b2c4d795f8b9d8838629b65bb9c0f4c", &(0x7f0000000040), &(0x7f0000000240), &(0x7f0000000280)="1a0ae273f8989c9bfd23a26bc56daa665effdd0d9ad8ac1eb62047fb6275063271f2dc6cd850dff0d55da4610e1f24f61edd4e0f84895b9c1038d184802b5d9eb1983f9b95e795750cc9abc08df0cea3627652fab53599e2f32c15b1f2e7800c35248e85568fa55b3f") mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 340.846157][T19015] hpfs: hpfs_map_sector(): read error 01:28:11 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2000000000000000, 0x0) 01:28:11 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2000000000000000, 0x0) 01:28:11 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xffffff7f, 0x0) [ 340.961393][T19040] hpfs: hpfs_map_sector(): read error [ 340.969374][T19043] loop2: detected capacity change from 0 to 11 01:28:11 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='}dev/nbd0\x00'], &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='debugfs\x00', 0x0, 0x0) clone(0x4000000, &(0x7f0000000040)="b3aa6dfa865f1b74e5a23df40d341ebb584286c068ceb22a6620cd8aa1e43027469c27f7", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="f3f13b19fa6f21ab2c571049747ac9114944378d55da506297c5002a8709605cf18b68239b5399873ee591b9a673466ce09dd5aa555b9e05cfeafe3b0c07abaaed5f13bb642aac8cebf2316ede1820c334de390053f462377847fb4781b22ad534de053f2b61b60a7fd55ff3bfbb6227e0e8ca20512166aede493ca2d8ae07c9ebc836ed25a868f0b8f574a9858b") 01:28:11 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2010000000000000, 0x0) 01:28:11 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x5509, 0x20000000) 01:28:11 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2010000000000000, 0x0) [ 341.025092][T19043] VFS: unable to find oldfs superblock on device loop2 01:28:11 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2300000000000000, 0x0) 01:28:11 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000140)='./file0\x00', 0x40, 0x103) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='vxfs\x00', 0x143068, 0x0) [ 341.114292][T19069] loop2: detected capacity change from 0 to 256 01:28:11 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xffffff8c, 0x0) [ 341.168120][T19043] loop2: detected capacity change from 0 to 11 [ 341.199611][T19043] VFS: unable to find oldfs superblock on device loop2 01:28:11 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3f00000000000000, 0x0) 01:28:11 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x2300000000000000, 0x0) 01:28:11 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000140), 0x2, 0x3) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:11 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffff5, 0x0) 01:28:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000640)=""/46, 0x2e}, {&(0x7f0000000680)=""/138, 0x8a}, {&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/238, 0xee}], 0x4, 0x3, 0xcc9c) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@dellinkprop={0x20, 0x6d, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)=@ipv6_delrule={0x30, 0x21, 0x10a0496eababe62, 0x70bd2a, 0x25dfdbfc, {0xa, 0x10, 0x20, 0x9, 0x8c, 0x0, 0x0, 0x6, 0x2}, [@FRA_DST={0x14, 0x1, @local}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x20008800) mmap$IORING_OFF_SQES(&(0x7f0000530000/0x1000)=nil, 0x1000, 0x1000000, 0x12, r1, 0x10000000) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) r6 = accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14, 0x800) preadv(r6, &(0x7f00000001c0)=[{&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000000280)=""/129, 0x81}, {&(0x7f0000000340)=""/231, 0xe7}, {&(0x7f0000000440)=""/147, 0x93}], 0x4, 0x4e, 0x7) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) r7 = socket$unix(0x1, 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000043c0)={&(0x7f0000000ac0)='./file0\x00'}, 0x10) recvmmsg$unix(r7, &(0x7f0000004300)=[{{&(0x7f0000000980)=@abs, 0x6e, &(0x7f00000030c0)=[{&(0x7f0000000a00)=""/164, 0xa4}, {&(0x7f0000001b40)=""/88, 0x58}, {&(0x7f0000001bc0)=""/255, 0xff}, {&(0x7f0000000ac0)}, {&(0x7f0000001cc0)=""/196, 0xc4}, {&(0x7f0000001dc0)=""/131, 0x83}, {&(0x7f0000001e80)=""/194, 0xc2}, {&(0x7f0000001f80)=""/4096, 0x1000}, {&(0x7f0000002fc0)=""/154, 0x9a}, {&(0x7f0000003080)=""/18, 0x12}], 0xa, &(0x7f0000003180)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}, {{0x0, 0x0, &(0x7f00000042c0)=[{&(0x7f0000003200)=""/117, 0x75}, {&(0x7f0000003280)=""/4096, 0x1000}, {&(0x7f0000004280)=""/2, 0x2}], 0x3}}], 0x2, 0x2000, &(0x7f0000004380)={0x0, 0x989680}) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:28:11 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x6364, 0x20000000) 01:28:11 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4000000000000000, 0x0) 01:28:11 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffff6, 0x0) 01:28:11 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="2f651415aa48643000947e5f63a011552f46be229659bcbebdca386a3ee5b677f1e7af1ed3dc481156cccc434d67eb8954ecf80eb181c8efd32614a57eb310000007000000ddc4f91f7205c979accce06100000000000000fe7c885c7e72c0527d29e40845a58487f283c593889c379a33fe28a46ba893e600"], &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) tkill(r0, 0x13) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x3ff, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="ab9fefbf211c99e0115e2499299466a25dd7c7c0a35e6b7ad445629acf21a48470b2624bcce6ff377d11e7451bb237ec9f5f54e120812199c25eb2f71c26fa83b8f2c278a53f9912413157f97d53339f24aa664b6ac1c11a96fb1a59d08b36498d9ee75e082f41f7786f3d9ecfd64a18089b822b278b680909cb7aa5a0209580", 0x80, 0x4}, {&(0x7f0000000280)="60b59c3bb61df09df7cb8b5ea01c2fbfec2f31d1fdb17cf05c0cf7a504726a5fb4dfb8c914a8a8d79d4665c6e5f5cdba6e4aba5b89a6afc156602a72e19d84d6f1a0f76afd8bd344", 0x48, 0x400}, {&(0x7f0000000300)="4d64ca86a23fc11e394eb7246b747e935ca855a08f3b212698c5a416f3fbc00f64445023b4272afdad4a505ec2eab0874aaa815701a3557861a6ce46e0fea34cc6211ebf5e7cc8c882c1d88f2c", 0x4d, 0x8}], 0x1, &(0x7f0000000580)={[{@huge_advise}, {@gid={'gid', 0x3d, r1}}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'local', '=static', @void}}}, {@uid={'uid', 0x3d, r2}}], [{@fsname={'fsname', 0x3d, '#^%'}}, {@permit_directio}, {@appraise}, {@dont_hash}, {@appraise_type}]}) 01:28:11 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4800000000000000, 0x0) 01:28:11 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x3f00000000000000, 0x0) 01:28:12 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfffffffe, 0x0) 01:28:12 executing program 1: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000180)={'erspan0\x00', 0x0, 0x8000, 0x7, 0x4a0, 0x7, {{0x7, 0x4, 0x3, 0x4, 0x1c, 0x68, 0x0, 0x1, 0x4, 0x0, @broadcast, @local, {[@generic={0x82, 0x7, "0eb848feae"}]}}}}}) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000540)={&(0x7f0000000200)={0x30c, 0x12, 0x2, 0x70bd28, 0x25dfdbfc, {0x26, 0xf9, 0xff, 0x4, {0x4e24, 0x4e24, [0xef7, 0x1, 0x7fffffff, 0xfffffa40], [0x2, 0x4270, 0x7ff, 0x8001], r0, [0x6, 0x40]}, 0x8, 0x800}, [@INET_DIAG_REQ_BYTECODE={0xc, 0x1, "91bf8ec65b3fe189"}, @INET_DIAG_REQ_BYTECODE={0x59, 0x1, "1985078b270d0e743f2f6a22d2c66700a99a93fc01614194ec5d166fc9c5dd2af95a390894a116318118d18ece64e2c8ff69b6037b584157b34f1cd911dcaa9ce86609e35aa0e3e335c6692ce69c881bd9b374b7e2"}, @INET_DIAG_REQ_BYTECODE={0x3c, 0x1, "e4a8eb7d71bc3b1b9f3a00233f07897bcb063b45f4f68665d7e406891d929d91aaed119c9d1b19280bacf99332fa36668a6dcc733453cdc6"}, @INET_DIAG_REQ_BYTECODE={0x79, 0x1, "22a3fbc120e1e31deccab211b9a29d41e449d87d8a099f0fbd675f576e46fe072ba1d44b7c9352d96c35035ae95a04b3ed12b142d4e6936b90a56407010926fb33bb8bdf1c6bd040d02eb023777a56e46e9e09983a6ee2683c01dc232774846a653a9593f29f4bc32f9b1a5bc5618e3d0a2da8c785"}, @INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "ebff3536f3774a2be3becc84c67c21165f02fdba76310ea52fdd0a1ee0bd26bd3f616cab45b769f84a17035ffc1ddb4d9fce0a99c3d48f2e710be838fe6f1cac921a005a8443f086bc48ffbde7f0bf083e08c110cf438c4d017c85ad38e33237de7ae145a698cc0c69065c23c9d69ff471ef6c7470e50b2e936abfb5efda085470fcd2b046878dc7f2610d6003f5bce9eb446ed7983716674d352fd2ae"}, @INET_DIAG_REQ_BYTECODE={0x7a, 0x1, "8197b4e9e1c8f920e835a0c26f44283ac171f2ba36a82015eba255eb727b0e4f3ef17844c66ca7b845fa5bf885d6dfb8cabd0f0cfb0e1f3adff4d173c4986adba83f712f14dd41a8e663fe5d83b90d68aabaff43c12e6d164be7ad419a64b91792bd568ca3a0a563e80f1e1980638dcfd6cdae4e35c1"}, @INET_DIAG_REQ_BYTECODE={0x7f, 0x1, "cf252a0da2ffd11c605484729f4120901e3dbf8feddd96a4d710a3576d678ddd6914fb0eeb23fff382bdfa6001bd06fa44b9a08f4089ef66c34d2349a8587aecc1697f9dad6de6b35513dfa77e0871ecc6d9f5ab625e78269a714ccf5b8c7fda1a4db24720c38cbf1d0a3d06a71bf9be62f454df0877afb474647a"}]}, 0x30c}, 0x1, 0x0, 0x0, 0x4}, 0x20044890) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x400000, 0x140) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:12 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4000000000000000, 0x0) 01:28:12 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4c00000000000000, 0x0) [ 341.489118][T19165] loop1: detected capacity change from 0 to 4 01:28:12 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x6611, 0x20000000) [ 341.631393][T19206] hpfs: hpfs_map_sector(): read error [ 341.648854][T19211] hpfs: hpfs_map_sector(): read error 01:28:12 executing program 2: ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000000)={0xd735, 0x0, 0x5, 0x1f, 0xf2, "2b54868f6e252d865247a8a2c7cd4716b7689b", 0x3, 0xff}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffd}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:28:12 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6000000000000000, 0x0) 01:28:12 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4800000000000000, 0x0) 01:28:12 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x200000) getpeername$unix(r0, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) 01:28:12 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xedc000000000, 0x0) 01:28:12 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x8912, 0x20000000) 01:28:12 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6800000000000000, 0x0) 01:28:12 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x1000000000000, 0x0) 01:28:12 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x800000, &(0x7f0000000140)="600acd1bef0357ccbf84857e3b081c8c8949ad9fe6e0b7a4ca5db4f2ff0b70d55bd38f3ec1bff0b71db09b83bfbeca80d007cf778738ce78b58320816db4cb0a893a2d512dbf03ab6bbe9f47a081f2109edab59bc367dadb43fdb345b244fa53172c37c9b0ee1a9d03a8382f76894cf651a8ba083276a7ebbca4e643efd682b8d41a49811aa80f2579914cc4673a13df7c8ce2321dfd873c2e2e2c2745a0f11ac77171b175accb7968cd79e8574c0af553bb3029f276051738a5517df4ae644c683670bd633864d7d380eca8c969280dce1d1d3bd878e0d04001dc19c38faf16d720e9f77930b7ed0f8ee997e2", &(0x7f0000000040), &(0x7f0000000240), &(0x7f0000000280)="301206faad0b0d1ed1943ebf87d10320f513a03fdf02cfa9857c6a60286604c858034ac1b2b531a0aa4ef5bd9fd1766a11") mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) [ 342.316241][T19236] hpfs: hpfs_map_sector(): read error 01:28:12 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x4c00000000000000, 0x0) 01:28:12 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xe000000000000, 0x0) 01:28:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_setup(0x6c20, &(0x7f0000000000)={0x0, 0x15f, 0x8, 0x3, 0x2f0, 0x0, r0}, &(0x7f0000763000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r2, r4, &(0x7f0000000280)=@IORING_OP_NOP={0x0, 0x4}, 0x9) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:28:12 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6c00000000000000, 0x0) [ 342.456535][T19275] hpfs: hpfs_map_sector(): read error 01:28:13 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x40000000000000, 0x0) 01:28:13 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x8913, 0x20000000) 01:28:13 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6000000000000000, 0x0) 01:28:13 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf0ffffffffffff, 0x0) 01:28:13 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7400000000000000, 0x0) 01:28:13 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6800000000000000, 0x0) 01:28:13 executing program 1: ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x3d, 0x6, &(0x7f0000000300)="47a051dc409057f8c419d8c0b178a3ce7f9882a580921f2fb18695b3f6683203238017018f0158fe4239c0b3a2ddaca131e0f0b0f8c04ec88fed0c6ffcad9d3c15310a70115951a65956539ca2574ef96a93af80e92e2072b53fb499ae2307e2924f2603411333e8e8f959fea2b12ee41ec64e4b1bed07d3d8939f6df634e9a8f45f27d89b187c47fe4271169ffff49b8b070f7e8fe9458407899fd33a5d024f4dc44e3ebba592b2d9ad8ab0304ae0ba1a90c04b77d03af974ee76293c8bc993313eaf9c4a24a143b8cf2a9a3ee8ebfa03980a1404f2a450b10f4bb4be94136eec54b5cfd7cae6774980c2ec48d56acac6155883a425f4"}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='cgroup\x00', 0x0, 0x0) 01:28:13 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7a00000000000000, 0x0) 01:28:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$I2C(&(0x7f0000000000), 0xfe2c, 0x400) preadv(r1, &(0x7f0000000740)=[{&(0x7f0000000040)=""/57, 0x39}, {&(0x7f0000000280)=""/105, 0x69}, {&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000000300)=""/87, 0x57}, {&(0x7f0000000380)=""/99, 0x63}, {&(0x7f0000000400)=""/185, 0xb9}, {&(0x7f00000001c0)=""/8, 0x8}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000000580)=""/170, 0xaa}, {&(0x7f0000000640)=""/210, 0xd2}], 0xa, 0x81, 0x27dfd9f3) r2 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r2, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:28:13 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x100000000000000, 0x0) 01:28:13 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x8914, 0x20000000) 01:28:13 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465762f0ba5113000"], &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:13 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7fffffffffffffff, 0x0) 01:28:13 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x6c00000000000000, 0x0) 01:28:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000280)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/208, 0xd0}, {&(0x7f0000000400)=""/70, 0x46}, {&(0x7f00000001c0)=""/10, 0xa}, {&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000000480)=""/39, 0x27}], 0x5, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x80}, 0x40010003) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000640)={0x1ff, 0x0, {0xffffffffffffffff}, {0x0}, 0x8, 0x2}) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000000680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1e00}}, {@allow_other}], [{@permit_directio}, {@uid_gt={'uid>', r4}}, {@subj_user={'subj_user', 0x3d, '!\\+,]./[[}'}}, {@pcr={'pcr', 0x3d, 0x30}}, {@dont_measure}]}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r6, r7, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r5, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:28:13 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)=@nl, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/52, 0x34}], 0x1}, 0x40000100) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:13 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x200000000000000, 0x0) 01:28:13 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8503000000000000, 0x0) 01:28:13 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7400000000000000, 0x0) [ 342.946796][T19382] fuse: blksize only supported for fuseblk [ 342.956901][T19383] hpfs: hpfs_map_sector(): read error 01:28:13 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x910000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:13 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x300000000000000, 0x0) [ 342.996213][T19386] hpfs: hpfs_map_sector(): read error 01:28:13 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7a00000000000000, 0x0) [ 343.061297][T19409] hpfs: hpfs_map_sector(): read error 01:28:13 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x8933, 0x20000000) 01:28:13 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8cffffff00000000, 0x0) 01:28:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040), 0x802, 0x0) fcntl$lock(r1, 0x6, &(0x7f00000001c0)={0x2, 0x2, 0x6, 0xcb4, 0xffffffffffffffff}) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) sendfile(r2, r0, &(0x7f0000000000), 0x6) r3 = syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000002f80)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}}, 0x10000007) io_uring_enter(r3, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:28:13 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x7fffffffffffffff, 0x0) 01:28:13 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x400000000000000, 0x0) [ 343.110711][T19415] hpfs: hpfs_map_sector(): read error 01:28:13 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@sg0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) 01:28:13 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf5ffffff00000000, 0x0) 01:28:13 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x500000000000000, 0x0) 01:28:13 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x8cffffff00000000, 0x0) 01:28:13 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf6ffffff00000000, 0x0) 01:28:13 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x600000000000000, 0x0) 01:28:13 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) clone(0x20008200, &(0x7f0000000040)="78cd3b23182ad8caaa0dfa3c0c2d45cbf18b3af539d324bcc2075ef31f0d0295479be24b1cddc4165861ae6a712f", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="d70d838b791a588396b81b1f13ec9e638fd1c05a305d9d448130ab74eeaeac1b51e788ee") 01:28:13 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x89e1, 0x20000000) 01:28:13 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f00000020c0)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x11}, 0x1c, 0x0}}], 0x1, 0x20000840) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000000)) r1 = syz_io_uring_setup(0x187, &(0x7f0000000080)={0x0, 0x0, 0x2, 0xffff}, &(0x7f000015e000/0xc000)=nil, &(0x7f0000355000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f00000020c0)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x11}, 0x1c, 0x0}}], 0x1, 0x20000840) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000004c0)={&(0x7f0000000480)=[0x6, 0x4, 0xf464, 0x2, 0x3], 0x5, 0x800, 0x0, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000002640)={0x0, 0x68, &(0x7f00000025c0)=[@in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0xffff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8001}, @in6={0xa, 0x4e24, 0x40, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x800}]}, &(0x7f0000002680)=0x10) sendmmsg$inet_sctp(r5, &(0x7f0000002780)=[{&(0x7f0000000500)=@in6={0xa, 0x4e24, 0x6, @remote, 0x3}, 0x1c, &(0x7f0000001980)=[{&(0x7f0000000540)="a555c4072c8ff6179a9920fd878882178d35fb30cf132032aeb31c9834a6141d9e38ed8b181291d19d9ce10f2941ce9ae9ba3425c58e2d894254510afd55a479eb94263b512cf31e18ac733068f4f458ae107befaebde458c72cf0799fa8e6bee00bcb39b99a477910bcea2172c3d900823ef1e79aec21ae0fefa593abcbc574cafb9664c3051605464753c24611a07de7a41eb3c4310e3c6573a5d53379036f7dcf66e1a9a937d2e8dccfd4fbf8f4b99b00efa5df5d3ef69492e32b719d683ee4aa646bb15a0ce1215a576d66b74aea27afea2748fea2eb7a2dbfa7a4d973c213e0f5cc15cd8fe58fdffa", 0xeb}, {&(0x7f0000000640)="f986213991541139542d4f88ed18e8da83d6f32267677859e28a7ce9a8ddea2726120a16390d704aba0657fb25424dad9d9378c7f32170043bb6a905e78e27d42090f8092a8f7340539197e2f153dc4b2a78a7dcd014889bdce8228a8f44", 0x5e}, {&(0x7f00000006c0)="c15c90f601cf67676c81eb936b767646625bf1201448e185e845134660866c90bf70f19fc20f93e5ddb0d5d5cb675789cb8826f5a136df04286fe8e95aa19013646e107a9d0e86ae63f200282e263719e270f99800711409c15f7d4c0435b2d1c62eba3c3ae30d471771e924922886a1c9e332f82f3c936c2458f52f119595f413d53a85bbd30afe725544fb221cc16addf0e5fae9686f9725c64ff7e3cb8d410b9d00fa923b8fe784714c88ab7dec901f72fd080f1230d45f5d5fe688dceffe31e1d2bd8a1363415d", 0xc9}, {&(0x7f00000007c0)="25f96098606c805d364a45cfe56de93f4f05c886dcfb1e62f5a02752feea664ea5728fac957ef3f6ae3a326702e204105c1ba373d00add029b08b464dc6eb91d9ea1b5896f1620982391c57e0206a1e81bf4f88dd3975622f0286913339c61ab7b069b892ef75e7cb7d4a165837a91e5ff0c35f17386bc4bbb2f6368467cc0f2e6b04509fef9944cccc902a5c60f653090231a8fc8f2ebe846bd556dd1ed50f7ecad1b70b1d1faf3f6d5", 0xaa}, {&(0x7f0000000880)="d35b0b975502862307d51a921c5d417b14fd88dbdd5a09be0e6b9e49c1ea1045baa9074233bd3e51810f98be1a76abfd996b252b5ccefcbfda03e1a33c7261cf61412083a472a62b1f62a3e76c502768f2408a5725452de2", 0x58}, {&(0x7f0000000900)="6fe41f4462b7f66211dd444abf1057a8a534ed314a132c91e429798b99bdf0eb77c3300de1dee572b6046b16cdce0f4707e78e60b78ad01df9379e7a67f3", 0x3e}, {&(0x7f0000000940)="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", 0x1000}, {&(0x7f0000001940)="44baa5a42381a05e27d59a1b77", 0xd}], 0x8, &(0x7f0000001a00)=[@prinfo={0x18, 0x84, 0x5, {0x0, 0xf952}}, @sndinfo={0x20, 0x84, 0x2, {0x6, 0x1, 0xa5, 0x9}}, @authinfo={0x18, 0x84, 0x6, {0x800}}, @sndinfo={0x20, 0x84, 0x2, {0x5, 0x4, 0x1, 0x7}}, @dstaddrv6={0x20, 0x84, 0x8, @private1={0xfc, 0x1, '\x00', 0x1}}, @init={0x18, 0x84, 0x0, {0x5, 0xfff9, 0xff, 0x8f48}}], 0xa8, 0x10d}, {&(0x7f0000001ac0)=@in6={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000001b00)="32df3f7a0b921667c34d6f04c8717686bd4082d27e5f39b4779a19d1617c1623eebdb8111116590f1b774320a1c23d03d048f9d066274be5ed8e5b5d44e2408d0835e5aabc54ff845a0e0e6585cae4b242e63227dd116a3525b69b61577bf579f3ebfc0967ec1596918d5d365adf32", 0x6f}, {&(0x7f0000001b80)}, {&(0x7f0000001bc0)="c56323714cc948d38beed69899dc512bbaf771a25be3b3be251e385a1bb148369cedf1de852a527decc62a30f8a5d900125a95a0fc9b44f17c3750397c9cff93e709386a889a82ac0f9500ae67aef21e1ce528b3f8c40bea8bd3a2801c8e0e72ba4e958249ba4204749e96425fa931c9b4fee738f3a49668bdae18d141d150be8fa0a7ec8b87e3724100c563985af8d4fdb579302b38db", 0x97}, {&(0x7f0000001c80)="e6850f986d2d6428e9d5ad63c5dcdd2608baaa006a8dfb4c58fcb1db6f8451f5336a3a044aa1bc2eaebdf309d3853820f73b63a7ef66648d026219d235ef66c004bbe96de816a308a91c480e7e0fa098a7f97d25ff454e32fc95ab1a3ab465", 0x5f}, {&(0x7f0000001d00)="1cd5ffd2111e9b5511c3985fbaf21dbdec7dfa26cd47d554e5b5579bd738691ee13b82666426f92e2d71407498b8a5ab2df2aaa742b2de0cedfa75f6c33be2b9a53cb31ebab8ffb8219dfa6cc61653c790dfa7398658859c124e30f9f90f2c01c4759ba1c6820ec7f15ec6744e9c1a244dd7a348e8788e402bafd4dfeeee723ad813b3203a9a071375ebab62cb6ff684919f2d", 0x93}], 0x5, &(0x7f0000001e40)=[@dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @sndrcv={0x30, 0x84, 0x1, {0x5, 0x400, 0x8200, 0x8b59, 0x10000, 0x1, 0x1, 0x5d7}}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @init={0x18, 0x84, 0x0, {0x1, 0xc3, 0x800, 0x8}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @sndinfo={0x20, 0x84, 0x2, {0x7, 0x8206, 0x5, 0x80000001}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, '\x00', 0x10}}, @authinfo={0x18, 0x84, 0x6, {0x8000}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x800}}, @authinfo={0x18, 0x84, 0x6, {0x8404}}], 0x120, 0x44100}, {&(0x7f0000001f80)=@in6={0xa, 0x4e23, 0x4, @local, 0x2}, 0x1c, &(0x7f0000002200)=[{&(0x7f0000001fc0)="c9d1655a22bce7cfa8c5de16a0559938246aaba41cec9387f635d5960d3f35d956146a7d2cc1a5191f6ae0b113c67bcf3b04afbadd289a1ba872209032157347f1b0d4e0ae62c7eeeffb0e0890f906eb817f2379a31699bbc557295afe4f8833a1f5992a2b22ee42b49c6b35d020d987fc77060c2355fb459038ffa0bfd36428c55923d0fab371541c8e287f82889f617502e62c9dfe69265c037b6891dda215e1795a5229b4168ee1", 0xa9}, {&(0x7f0000002100)="dea0aad7ff5a711e01cdadfef317a797cfa344dadf2d1b6cb79d7b94f9270ea62348af75154e37e53260fae0202a0ceba19cdf0f05ca16bba198a3004479b2dd9a1eed0f0d83b0e203b8dfd0d14aa2b580b5bfcea75b50aeb8b2cdbc6e76c7871744b472feae87bdf6f9f551ed8901607d047c926651dceb19b5a4393224287f3e50f113e6430ee074f0fc87d2c5a793cfce7e7a875da1a926a33eede33852c8c9b96df8e403ff05daa872f3efb470a9aa577b15b273dde9eef2b2b4df132fcda2e7c81674cda56e091a11607c8daf1f560abae19a7263b26feec5f1c921d72d09cd5a8c6223", 0xe6}, {&(0x7f0000002080)="e8f4", 0x2}], 0x3, &(0x7f0000002240)=[@dstaddrv4={0x18, 0x84, 0x7, @loopback}, @authinfo={0x18, 0x84, 0x6, {0xa2}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x1}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x3}}, @init={0x18, 0x84, 0x0, {0x4, 0xd9, 0x40, 0x7}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, '\x00', 0x42}}, @dstaddrv6={0x20, 0x84, 0x8, @local}], 0xb8, 0x4000850}, {&(0x7f0000002300)=@in={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000002500)=[{&(0x7f0000002340)="f9e8c0c9563b192097a5bb002c99ce41bc731d7889cbacd7f9e1408db509557090222533aba98af7e9d7adf181f7d25d37f0f115f937e3edfd9aa2e4d3f67200a0c51179f83b51c7c8a98d9160d1602d2b5588744b340220c8069db69983c454c8377029c935666337c94a5e21c1c2781ab9cdca11ff448f9f805d18f9d58179a9eab4aa3c0cd8c11e2ade4bd130af3331cb5d3ec3e5d1daf6e6492d40db090a6d64e9b10a427c154b3c36040ad9c9d6e401c33b91fea731d8a5e35d5f878c70", 0xc0}, {&(0x7f0000002400)="038e602a629e438ef4cc2a9017dbefbc1cd8749b0561a54181395f65731cdb2be3d7bec077416c9a9cb0404f9a72008b015722306d03890a92068d589893f13f83206109e3892560e440a2c1b5a1f9d1a6a8f7e6f120f117d902f946cc35d31bb4482d0f87b627fdad445385e96ab731cc57f458ff0d370e9324e2f2b37d61fcddb79516f2f3c7b05e866c9a73451a77ef14172960d54c59709519b131fe76f73df501f3d1c823574b6e4c5180c23efff8410eead861e65107541ab71366a3ba2e47167cd6f6f15c4932af79baaccd1334e98cfeeca76239bfbfc12c3606f672f10e92644b615387f353e4", 0xeb}, {&(0x7f0000002fc0)="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", 0x1000}], 0x3, 0x0, 0x0, 0xc000}, {&(0x7f0000002540)=@in={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10, &(0x7f0000002580), 0x0, &(0x7f00000026c0)=[@dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x1b}}, @init={0x18, 0x84, 0x0, {0x7, 0x2506, 0x100, 0xdd14}}, @sndinfo={0x20, 0x84, 0x2, {0x439, 0x201, 0xa40, 0x101, r6}}, @init={0x18, 0x84, 0x0, {0x7, 0x8, 0x1, 0x8}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @authinfo={0x18, 0x84, 0x6, {0x6}}], 0x98, 0x400c050}], 0x5, 0x1) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r4, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'rfc3686(essiv(cbc(aes),sha256))\x00'}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000300)="b67690b101006616f602581561afb0473aa08d267acb102e421cc64f1e9f161e48c4a35824b5a96f28da9dabba6fba0fcb7cd430528eee5eb3e923465718c9f61f70e348681e2a0f3f618c224f251410603abe263f342895765734728f9f7a7bdb6af1a2e82741ffc5445471cc21e9a90df215e0", 0x74}, {&(0x7f0000000380)="bb98483bf38fa0731de2a561db93153a7962d3e7f8450e516e034210995932c804ed4b1a6f0ccce7d8b21193f6d6da4a9537c419e145e4c6f287a3b7af4e441706c1d9f9b40de4479ffa467e06aa", 0x4e}, {&(0x7f0000000400)="ecb9e0da63f10741f312f4e1be50d7b22217d85f5f7e58c2be3c6dd402639ee09f0148c2548aa8d42996f83f96b40fe661619d2e692357aa9656db576758a3667423a1caae5ab29205bd4afe40", 0x4d}], 0x3}, 0x0, 0x14883}, 0x10000007) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 01:28:13 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x9048000000000000, 0x0) 01:28:13 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf9fdffff00000000, 0x0) 01:28:13 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x28, 0x0) [ 343.384901][T19475] hpfs: hpfs_map_sector(): read error [ 343.417047][T19481] hpfs: hpfs_map_sector(): read error 01:28:13 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf5ffffff00000000, 0x0) 01:28:14 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfbffffff00000000, 0x0) 01:28:14 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x700000000000000, 0x0) [ 343.535090][T19503] general protection fault, probably for non-canonical address 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN [ 343.547451][T19503] KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] [ 343.555935][T19503] CPU: 1 PID: 19503 Comm: iou-sqp-19488 Not tainted 5.14.0-syzkaller #0 [ 343.564423][T19503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.574571][T19503] RIP: 0010:__io_file_supports_nowait+0x26/0x500 [ 343.581423][T19503] Code: 00 00 00 00 41 55 41 54 41 89 f4 55 48 89 fd 53 e8 6f 61 96 ff 48 8d 7d 20 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 2d 04 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b [ 343.601200][T19503] RSP: 0018:ffffc900188b7800 EFLAGS: 00010212 [ 343.607344][T19503] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 343.615301][T19503] RDX: 0000000000000004 RSI: ffffffff81dfb791 RDI: 0000000000000020 [ 343.623256][T19503] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 343.631210][T19503] R10: ffffffff81e28292 R11: 0000000000000001 R12: 0000000000000000 [ 343.639165][T19503] R13: ffffc900188b78d8 R14: 0000000000000000 R15: 0000000000000001 [ 343.647161][T19503] FS: 00007ff8549db700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 343.656101][T19503] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 343.662671][T19503] CR2: 000000000000000e CR3: 0000000090c91000 CR4: 0000000000350ee0 [ 343.670715][T19503] Call Trace: [ 343.673984][T19503] io_read+0x4a9/0x1140 [ 343.678133][T19503] ? perf_trace_lock+0xeb/0x4d0 [ 343.682971][T19503] ? io_uring_setup+0x2d60/0x2d60 [ 343.687983][T19503] ? __lockdep_reset_lock+0x1a0/0x1a0 [ 343.693343][T19503] ? __lockdep_reset_lock+0x1a0/0x1a0 [ 343.698732][T19503] ? rcu_read_lock_sched_held+0xd/0x70 [ 343.704204][T19503] ? lock_release+0x522/0x720 [ 343.708865][T19503] ? finish_task_switch.isra.0+0x22d/0xa50 [ 343.714657][T19503] ? lock_downgrade+0x6e0/0x6e0 [ 343.719493][T19503] ? perf_sched_cb_inc+0x280/0x280 [ 343.724594][T19503] io_issue_sqe+0x209/0x6ba0 [ 343.729174][T19503] ? finish_task_switch.isra.0+0x306/0xa50 [ 343.734967][T19503] ? __switch_to+0x5cc/0x1060 [ 343.739637][T19503] ? __schedule+0x948/0x26f0 [ 343.744220][T19503] ? io_write+0xed0/0xed0 [ 343.748537][T19503] ? perf_trace_lock+0xeb/0x4d0 [ 343.753372][T19503] ? rcu_read_lock_sched_held+0xd/0x70 [ 343.758926][T19503] ? lock_acquire+0x442/0x510 [ 343.763599][T19503] ? __lockdep_reset_lock+0x1a0/0x1a0 [ 343.768959][T19503] ? preempt_schedule_common+0x59/0xc0 [ 343.774413][T19503] __io_queue_sqe+0x90/0xb50 [ 343.778991][T19503] ? rcu_read_lock_sched_held+0xd/0x70 [ 343.784435][T19503] ? io_issue_sqe+0x6ba0/0x6ba0 [ 343.789270][T19503] ? tctx_task_work+0x11e/0x610 [ 343.794193][T19503] ? lock_downgrade+0x6e0/0x6e0 [ 343.799031][T19503] ? ww_mutex_unlock+0x2f0/0x2f0 [ 343.803954][T19503] ? rwlock_bug.part.0+0x90/0x90 [ 343.808882][T19503] io_req_task_submit+0xbf/0x1b0 [ 343.813807][T19503] tctx_task_work+0x166/0x610 [ 343.818473][T19503] ? io_fallback_req_func+0x3e0/0x3e0 [ 343.823829][T19503] ? rwlock_bug.part.0+0x90/0x90 [ 343.828757][T19503] task_work_run+0xdd/0x1a0 [ 343.833270][T19503] io_sq_thread+0x867/0x1370 [ 343.838001][T19503] ? io_uring_cancel_generic+0x740/0x740 [ 343.843621][T19503] ? lock_release+0x522/0x720 [ 343.848374][T19503] ? ret_from_fork+0x8/0x30 [ 343.852872][T19503] ? finish_wait+0x270/0x270 [ 343.857708][T19503] ? rwlock_bug.part.0+0x90/0x90 [ 343.862634][T19503] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 343.869039][T19503] ? io_uring_cancel_generic+0x740/0x740 [ 343.874833][T19503] ? io_uring_cancel_generic+0x740/0x740 [ 343.880453][T19503] ret_from_fork+0x1f/0x30 [ 343.884864][T19503] Modules linked in: 01:28:14 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80, 0x1aa) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465762f6e5b6c6c623080"], &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f00000020c0)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x11}, 0x1c, 0x0}}], 0x1, 0x20000840) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r1, &(0x7f00000020c0)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x11}, 0x1c, 0x0}}], 0x1, 0x20000840) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f00000020c0)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x11}, 0x1c, 0x0}}], 0x1, 0x20000840) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x4) wait4(r3, 0x0, 0x8, &(0x7f00000001c0)) 01:28:14 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xf6ffffff00000000, 0x0) 01:28:14 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0xfeffffff00000000, 0x0) 01:28:14 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x800000000000000, 0x0) [ 343.977303][T19503] ---[ end trace abe434a1ef70ef49 ]--- [ 343.985416][T19503] RIP: 0010:__io_file_supports_nowait+0x26/0x500 01:28:14 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1908b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x89e3, 0x20000000) [ 344.009138][T19503] Code: 00 00 00 00 41 55 41 54 41 89 f4 55 48 89 fd 53 e8 6f 61 96 ff 48 8d 7d 20 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 2d 04 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b [ 344.105324][T19503] RSP: 0018:ffffc900188b7800 EFLAGS: 00010212 [ 344.120379][T19503] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 344.131659][T19503] RDX: 0000000000000004 RSI: ffffffff81dfb791 RDI: 0000000000000020 [ 344.141030][T19503] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 344.155300][T19503] R10: ffffffff81e28292 R11: 0000000000000001 R12: 0000000000000000 [ 344.166286][T19503] R13: ffffc900188b78d8 R14: 0000000000000000 R15: 0000000000000001 [ 344.175275][T19503] FS: 00007ff8549db700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 344.187338][T19503] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 344.194499][T19503] CR2: 00000000200015c0 CR3: 0000000090c91000 CR4: 0000000000350ef0 [ 344.206609][T19503] Kernel panic - not syncing: Fatal exception [ 344.219246][T19503] Kernel Offset: disabled [ 344.223914][T19503] Rebooting in 86400 seconds..