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"}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_CPUID(r5, 0xaea3, 0x0) r6 = dup3(r2, r4, 0x0) dup2(r6, r5) syz_kvm_setup_cpu$x86(r1, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f00000000c0)="0f01c4c744240032010000c744240258000000ff2c24f240d3f066b8ec008ec00f01cb66430f78c15100f30fc770f30f0f951f0000009e260fb24d00af"}], 0x0, 0x40, 0x0, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_NMI(r7, 0xae9a) r8 = dup3(r0, r1, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r8, r7) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 168.418592] FAULT_INJECTION: forcing a failure. [ 168.418592] name failslab, interval 1, probability 0, space 0, times 1 [ 168.457663] CPU: 0 PID: 12241 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 168.465570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.467059] audit: type=1804 audit(1630680027.264:21274): pid=12243 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir814919736/syzkaller.Rk2pu4/113/bus" dev="sda1" ino=14247 res=1 [ 168.475013] Call Trace: [ 168.475039] dump_stack+0x1fc/0x2ef [ 168.475060] should_fail.cold+0xa/0xf [ 168.475076] ? setup_fault_attr+0x200/0x200 [ 168.475090] ? lock_acquire+0x170/0x3c0 [ 168.475109] __should_failslab+0x115/0x180 [ 168.521588] should_failslab+0x5/0x10 [ 168.525564] __kmalloc+0x2ab/0x3c0 [ 168.529090] ? __se_sys_memfd_create+0xf8/0x440 [ 168.533751] __se_sys_memfd_create+0xf8/0x440 [ 168.538233] ? memfd_file_seals_ptr+0x150/0x150 [ 168.542989] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 168.548350] ? trace_hardirqs_off_caller+0x6e/0x210 [ 168.553356] ? do_syscall_64+0x21/0x620 [ 168.557329] do_syscall_64+0xf9/0x620 [ 168.561124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 168.566297] RIP: 0033:0x4665f9 [ 168.569477] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.588362] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 168.596056] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 168.603310] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 168.610563] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 168.617833] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 168.625099] R13: 0000000020000100 R14: 0000000000001400 R15: 0000000020000040 14:40:28 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) read$FUSE(r4, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, r5, {0x2}}, 0x18) 14:40:28 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:29 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x3f, 0x20, 0x4, 0x3, 0x0, 0x7, 0x1000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x100000001, 0x71e6af64}, 0x4000, 0xa000000000000000, 0x0, 0x8, 0x4, 0x2, 0x1, 0x0, 0x7, 0x0, 0x10001}, r0, 0x6, r1, 0x4) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000340), &(0x7f0000001440)={'syz', 0x3}, 0x0, 0x0, r2) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0), &(0x7f0000000a00)="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", 0x1001, r3) request_key(0x0, &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)='/dev/net/tun\x00', 0xfffffffffffffffd) keyctl$read(0xb, r4, &(0x7f0000005340)=""/4096, 0xd900) 14:40:29 executing program 0: r0 = creat(&(0x7f0000000500)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xbef, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) dup(0xffffffffffffffff) setresuid(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x5) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="db0a031700000000031100001100000002000000", @ANYRES32=r3], 0x18}}, 0x0) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f00000002c0)='./bus\x00', 0x8000, 0x2, &(0x7f0000000300)=[{&(0x7f0000000380)="10216837fd60b9c71d8d8bc2709ffd64f35b1b093c6247c6555563ad507ce015921bc016263cee3d7a913e5cd84d2c596d608798b696f031668ab44f0275c59f858f0093155cd786c0b4ddb713f13fc51789de529f1e9ec1cb875d752d82635b099cf0849ab352625ec3b1a6def60fec4b46acbce055a63740fdc8c17c04717ad27d07bf9966d4cf8d13c20825440bf8cd28fed5a9d123b575cb0a0fb9cdb7b388bf2a2734d8ba9a", 0xa8, 0x5}, {&(0x7f0000000440)="c94d6de7bd0c187f354fee798f7f419d269d5bf37c2d26ab1742a3f78be29698cd23262bc6abed17f457c937b57bf1cbaada9982a2ee769ad384c1a5612af034f6f251b06c96d9703c9c3e3888d77e803fc2691a99b43f624fa0f718b4b06df38bb4fbc8b2d6b256762e34734d44d1a51982194709a18104fcfd75", 0x7b, 0x8000}], 0x40, &(0x7f00000004c0)={[{'\xc5'}], [{@smackfshat={'smackfshat', 0x3d, '+.)^]/\\'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}) r4 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x406, r2) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8916, &(0x7f0000000080)={'veth0_to_bridge\x00', {0x2, 0x0, @broadcast}}) 14:40:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000001c0)={0x4, 0x80, 0x8, 0xb3, 0x8f, 0x40, 0x0, 0x8, 0xe00, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x10280, 0x0, 0x7aab461a, 0x9, 0x3, 0x7ff, 0x1, 0x0, 0x20, 0x0, 0xffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) r3 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3001000010000104000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="e68d9028d26089ec16e88cb2e29280c201df3b58e84e080ae20e6a39e3b5c04d394d03f8d7b57aefd2df4b1399f1a49616b251"], 0x130}}, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="2700000003000000000000000000000000000000000000000600000000000000626f6e64300000"], 0x27) 14:40:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r2 = socket(0x11, 0x800000003, 0x8) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a0dffc2c654"}, 0x80) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x20001, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000bc0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24abab7ba0f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb38359c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c39e8f7e3fccdcda85ce975e99d51b1cec6ddaa76e184300"}) ioctl$KVM_RUN(r6, 0xae80, 0x0) sendmmsg(r1, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000080)=ANY=[@ANYRESOCT=r3], 0x1d8}}, {{&(0x7f00000004c0)=@xdp={0x2c, 0x8, 0x0, 0x3a}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000980)="9eb33050642dfad6d0df9dfc4e608cfd2334b16a97dfca5c423deae9b22f2cf34f61dd632041c6b942f65880e1c12b6948c4383e4d80dcd343b2ded2b3b3c02857796cb1e93c0045fcf8a0c8fa75df5fed9f2aa2d7138daf5e5f41b13e97ec1a15bae199a180052f26e1e27334e21b8c24797c721af4a87abb23296f2771cca8ed63c80694e8701bfff0441a9bd8eb679e7108f9a40625e9f37771bfb14836cf80e88d8553d18866e129722b02b7a5ebf3dd6d5f441771538351f6545dc69436124a01c42ba134533ef84c0bf1ee28d9d4", 0xd1}], 0x1, &(0x7f0000000a80)=ANY=[@ANYBLOB="90000000000000007a44f45800010000bb141109bc07d3d039f077addf6a6485104c4bb3e0d77005c5ac4f832145805f68a106ac5444447b727c141143465da998feb4f904bc017ff4aa9e6d3bbe3b78cbec532447f8e8bc3fe001f23016dff7fb9b17eef98bd98c73d7eee7b894e1ba57fa94489978c9ed0a22bbe70ba3ff94dcbb0dfe8e0dcdf67fc3c34b750000002800000000000000354f1739235d719f0e01000004000000d9addcb933781a46cc8b047b0afef2a9"], 0xb8}}], 0x2, 0x5) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000000c0)) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd60da03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 170.229753] FAULT_INJECTION: forcing a failure. [ 170.229753] name failslab, interval 1, probability 0, space 0, times 0 [ 170.266625] CPU: 0 PID: 12291 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 170.266977] audit: type=1804 audit(1630680029.074:21275): pid=12289 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir814919736/syzkaller.Rk2pu4/114/bus" dev="sda1" ino=14266 res=1 [ 170.274641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.274648] Call Trace: [ 170.274673] dump_stack+0x1fc/0x2ef [ 170.274695] should_fail.cold+0xa/0xf [ 170.274712] ? setup_fault_attr+0x200/0x200 [ 170.274726] ? lock_acquire+0x170/0x3c0 [ 170.274745] __should_failslab+0x115/0x180 [ 170.274761] should_failslab+0x5/0x10 [ 170.274774] kmem_cache_alloc+0x277/0x370 [ 170.274793] ? shmem_destroy_callback+0xb0/0xb0 [ 170.343238] shmem_alloc_inode+0x18/0x40 [ 170.347412] ? shmem_destroy_callback+0xb0/0xb0 [ 170.352077] alloc_inode+0x5d/0x180 [ 170.355720] new_inode+0x1d/0xf0 [ 170.359103] shmem_get_inode+0x96/0x8d0 [ 170.363079] __shmem_file_setup.part.0+0x7a/0x2b0 [ 170.367924] shmem_file_setup+0x61/0x90 [ 170.371902] __se_sys_memfd_create+0x26b/0x440 [ 170.376498] ? memfd_file_seals_ptr+0x150/0x150 [ 170.381167] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 170.386523] ? trace_hardirqs_off_caller+0x6e/0x210 [ 170.391542] ? do_syscall_64+0x21/0x620 [ 170.395509] do_syscall_64+0xf9/0x620 [ 170.399302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 170.404479] RIP: 0033:0x4665f9 [ 170.407665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 170.426553] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 170.434253] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 170.441516] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 170.448774] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 170.456032] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 170.463288] R13: 0000000020000100 R14: 0000000000001400 R15: 0000000020000040 14:40:29 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 170.612268] FAULT_INJECTION: forcing a failure. [ 170.612268] name failslab, interval 1, probability 0, space 0, times 0 [ 170.625115] CPU: 1 PID: 12313 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 170.633050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.642419] Call Trace: [ 170.645025] dump_stack+0x1fc/0x2ef [ 170.648656] should_fail.cold+0xa/0xf [ 170.652550] ? setup_fault_attr+0x200/0x200 [ 170.656914] ? lock_acquire+0x170/0x3c0 [ 170.660897] __should_failslab+0x115/0x180 [ 170.665136] should_failslab+0x5/0x10 [ 170.668931] kmem_cache_alloc+0x277/0x370 [ 170.673073] __d_alloc+0x2b/0xa10 [ 170.676524] d_alloc_pseudo+0x19/0x70 [ 170.680315] alloc_file_pseudo+0xc6/0x250 [ 170.684454] ? alloc_file+0x4d0/0x4d0 [ 170.688245] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 170.693858] ? shmem_get_inode+0x44c/0x8d0 [ 170.698086] __shmem_file_setup.part.0+0x102/0x2b0 [ 170.703009] shmem_file_setup+0x61/0x90 [ 170.706972] __se_sys_memfd_create+0x26b/0x440 [ 170.711543] ? memfd_file_seals_ptr+0x150/0x150 [ 170.716204] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 170.721556] ? trace_hardirqs_off_caller+0x6e/0x210 [ 170.726563] ? do_syscall_64+0x21/0x620 [ 170.730532] do_syscall_64+0xf9/0x620 [ 170.734327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 170.739506] RIP: 0033:0x4665f9 [ 170.742694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 170.761578] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 170.769362] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 170.776672] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 170.783928] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 170.791292] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 170.798549] R13: 0000000020000100 R14: 0000000000001400 R15: 0000000020000040 14:40:29 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 170.902480] FAULT_INJECTION: forcing a failure. [ 170.902480] name failslab, interval 1, probability 0, space 0, times 0 [ 170.914482] CPU: 1 PID: 12320 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 170.922384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.931745] Call Trace: [ 170.934348] dump_stack+0x1fc/0x2ef [ 170.937997] should_fail.cold+0xa/0xf [ 170.941815] ? setup_fault_attr+0x200/0x200 [ 170.946151] ? lock_acquire+0x170/0x3c0 [ 170.950852] __should_failslab+0x115/0x180 [ 170.955100] should_failslab+0x5/0x10 [ 170.958907] kmem_cache_alloc+0x277/0x370 [ 170.963073] __alloc_file+0x21/0x330 [ 170.966803] alloc_empty_file+0x6d/0x170 [ 170.970876] alloc_file+0x5e/0x4d0 [ 170.974431] alloc_file_pseudo+0x165/0x250 [ 170.978682] ? alloc_file+0x4d0/0x4d0 [ 170.982493] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 170.988131] ? shmem_get_inode+0x44c/0x8d0 [ 170.992383] __shmem_file_setup.part.0+0x102/0x2b0 [ 170.997326] shmem_file_setup+0x61/0x90 14:40:29 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) read$FUSE(r4, &(0x7f00000021c0)={0x2020}, 0x2020) [ 171.001315] __se_sys_memfd_create+0x26b/0x440 [ 171.005907] ? memfd_file_seals_ptr+0x150/0x150 [ 171.010605] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 171.015982] ? trace_hardirqs_off_caller+0x6e/0x210 [ 171.021009] ? do_syscall_64+0x21/0x620 [ 171.024992] do_syscall_64+0xf9/0x620 [ 171.028804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 171.033996] RIP: 0033:0x4665f9 14:40:29 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) 14:40:29 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x3f, 0x20, 0x4, 0x3, 0x0, 0x7, 0x1000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x100000001, 0x71e6af64}, 0x4000, 0xa000000000000000, 0x0, 0x8, 0x4, 0x2, 0x1, 0x0, 0x7, 0x0, 0x10001}, r0, 0x6, r1, 0x4) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000340), &(0x7f0000001440)={'syz', 0x3}, 0x0, 0x0, r2) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0), &(0x7f0000000a00)="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", 0x1001, r3) request_key(0x0, &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)='/dev/net/tun\x00', 0xfffffffffffffffd) [ 171.037192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 171.056099] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 171.063820] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 171.071098] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 171.078603] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 171.086011] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 171.093302] R13: 0000000020000100 R14: 0000000000001400 R15: 0000000020000040 14:40:30 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 171.276123] FAULT_INJECTION: forcing a failure. [ 171.276123] name failslab, interval 1, probability 0, space 0, times 0 [ 171.290085] CPU: 1 PID: 12346 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 171.297984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.307342] Call Trace: [ 171.309939] dump_stack+0x1fc/0x2ef [ 171.313592] should_fail.cold+0xa/0xf [ 171.317410] ? setup_fault_attr+0x200/0x200 [ 171.321829] ? lock_acquire+0x170/0x3c0 14:40:30 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) [ 171.325813] __should_failslab+0x115/0x180 [ 171.330054] should_failslab+0x5/0x10 [ 171.333866] kmem_cache_alloc_trace+0x284/0x380 [ 171.338553] apparmor_file_alloc_security+0x394/0xad0 [ 171.343774] ? apparmor_file_receive+0x160/0x160 [ 171.348553] ? __alloc_file+0x21/0x330 [ 171.352459] security_file_alloc+0x40/0x90 [ 171.356706] __alloc_file+0xc9/0x330 [ 171.360432] alloc_empty_file+0x6d/0x170 [ 171.364594] alloc_file+0x5e/0x4d0 [ 171.368151] alloc_file_pseudo+0x165/0x250 [ 171.372405] ? alloc_file+0x4d0/0x4d0 14:40:30 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) [ 171.376212] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 171.381851] ? shmem_get_inode+0x44c/0x8d0 [ 171.386120] __shmem_file_setup.part.0+0x102/0x2b0 [ 171.391324] shmem_file_setup+0x61/0x90 [ 171.395308] __se_sys_memfd_create+0x26b/0x440 [ 171.399899] ? memfd_file_seals_ptr+0x150/0x150 [ 171.404586] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 171.409961] ? trace_hardirqs_off_caller+0x6e/0x210 [ 171.416814] ? do_syscall_64+0x21/0x620 [ 171.420819] do_syscall_64+0xf9/0x620 [ 171.424632] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 171.429826] RIP: 0033:0x4665f9 [ 171.433028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 171.451936] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 171.459662] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 171.467289] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee86 14:40:30 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:30 executing program 0: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) [ 171.474575] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 171.481855] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 171.489132] R13: 0000000020000100 R14: 0000000000001400 R15: 0000000020000040 [ 171.511803] syz-executor.4 (12294) used greatest stack depth: 23688 bytes left 14:40:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000001c0)={0x4, 0x80, 0x8, 0xb3, 0x8f, 0x40, 0x0, 0x8, 0xe00, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x10280, 0x0, 0x7aab461a, 0x9, 0x3, 0x7ff, 0x1, 0x0, 0x20, 0x0, 0xffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) r3 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3001000010000104000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="e68d9028d26089ec16e88cb2e29280c201df3b58e84e080ae20e6a39e3b5c04d394d03f8d7b57aefd2df4b1399f1a49616b251"], 0x130}}, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="2700000003000000000000000000000000000000000000000600000000000000626f6e64300000"], 0x27) 14:40:30 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x3f, 0x20, 0x4, 0x3, 0x0, 0x7, 0x1000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x100000001, 0x71e6af64}, 0x4000, 0xa000000000000000, 0x0, 0x8, 0x4, 0x2, 0x1, 0x0, 0x7, 0x0, 0x10001}, r0, 0x6, r1, 0x4) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000340), &(0x7f0000001440)={'syz', 0x3}, 0x0, 0x0, r2) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0), &(0x7f0000000a00)="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", 0x1001, r3) 14:40:30 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r2 = socket(0x11, 0x800000003, 0x8) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a0dffc2c654"}, 0x80) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x20001, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000bc0)={"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"}) ioctl$KVM_RUN(r6, 0xae80, 0x0) sendmmsg(r1, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000080)=ANY=[@ANYRESOCT=r3], 0x1d8}}, {{&(0x7f00000004c0)=@xdp={0x2c, 0x8, 0x0, 0x3a}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000980)="9eb33050642dfad6d0df9dfc4e608cfd2334b16a97dfca5c423deae9b22f2cf34f61dd632041c6b942f65880e1c12b6948c4383e4d80dcd343b2ded2b3b3c02857796cb1e93c0045fcf8a0c8fa75df5fed9f2aa2d7138daf5e5f41b13e97ec1a15bae199a180052f26e1e27334e21b8c24797c721af4a87abb23296f2771cca8ed63c80694e8701bfff0441a9bd8eb679e7108f9a40625e9f37771bfb14836cf80e88d8553d18866e129722b02b7a5ebf3dd6d5f441771538351f6545dc69436124a01c42ba134533ef84c0bf1ee28d9d4", 0xd1}], 0x1, &(0x7f0000000a80)=ANY=[@ANYBLOB="90000000000000007a44f45800010000bb141109bc07d3d039f077addf6a6485104c4bb3e0d77005c5ac4f832145805f68a106ac5444447b727c141143465da998feb4f904bc017ff4aa9e6d3bbe3b78cbec532447f8e8bc3fe001f23016dff7fb9b17eef98bd98c73d7eee7b894e1ba57fa94489978c9ed0a22bbe70ba3ff94dcbb0dfe8e0dcdf67fc3c34b750000002800000000000000354f1739235d719f0e01000004000000d9addcb933781a46cc8b047b0afef2a9"], 0xb8}}], 0x2, 0x5) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000000c0)) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd60da03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 171.661279] FAULT_INJECTION: forcing a failure. [ 171.661279] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 171.680247] CPU: 0 PID: 12380 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 171.688155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.697535] Call Trace: [ 171.700176] dump_stack+0x1fc/0x2ef [ 171.703812] should_fail.cold+0xa/0xf [ 171.707622] ? lock_acquire+0x170/0x3c0 [ 171.711608] ? setup_fault_attr+0x200/0x200 [ 171.715961] __alloc_pages_nodemask+0x239/0x2890 [ 171.720725] ? __lock_acquire+0x6de/0x3ff0 [ 171.724969] ? static_obj+0x50/0x50 [ 171.728608] ? __lock_acquire+0x6de/0x3ff0 [ 171.732849] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 171.737702] ? __lock_acquire+0x6de/0x3ff0 [ 171.741959] ? mark_held_locks+0xf0/0xf0 [ 171.746203] ? unwind_next_frame+0xeee/0x1400 [ 171.750704] ? mark_held_locks+0xf0/0xf0 [ 171.754773] ? deref_stack_reg+0x134/0x1d0 [ 171.759010] ? get_reg+0x176/0x1f0 [ 171.762567] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 171.768459] alloc_pages_vma+0xf2/0x780 [ 171.772448] shmem_alloc_page+0x11c/0x1f0 [ 171.776638] ? shmem_swapin+0x220/0x220 [ 171.780641] ? percpu_counter_add_batch+0x126/0x180 [ 171.785678] ? __vm_enough_memory+0x316/0x650 [ 171.790193] shmem_alloc_and_acct_page+0x15a/0x850 [ 171.795148] shmem_getpage_gfp+0x4e9/0x37f0 [ 171.799502] ? shmem_alloc_and_acct_page+0x850/0x850 [ 171.804617] ? mark_held_locks+0xa6/0xf0 [ 171.808873] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 171.814076] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 171.819284] shmem_write_begin+0xff/0x1e0 [ 171.823458] generic_perform_write+0x1f8/0x4d0 [ 171.828073] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 171.832755] ? current_time+0x1c0/0x1c0 [ 171.836736] ? lock_acquire+0x170/0x3c0 [ 171.840716] __generic_file_write_iter+0x24b/0x610 [ 171.845657] generic_file_write_iter+0x3f8/0x730 [ 171.850462] __vfs_write+0x51b/0x770 [ 171.854185] ? kernel_read+0x110/0x110 [ 171.858094] ? check_preemption_disabled+0x41/0x280 [ 171.863213] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 171.868240] vfs_write+0x1f3/0x540 [ 171.871793] __x64_sys_pwrite64+0x1f7/0x250 [ 171.876120] ? ksys_pwrite64+0x1a0/0x1a0 [ 171.880192] ? trace_hardirqs_off_caller+0x6e/0x210 [ 171.885219] ? do_syscall_64+0x21/0x620 [ 171.889208] do_syscall_64+0xf9/0x620 [ 171.893021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 171.898222] RIP: 0033:0x419797 [ 171.901420] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 171.920327] RSP: 002b:00007fe03889df20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 171.928156] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 171.935508] RDX: 000000000000001d RSI: 0000000020010000 RDI: 0000000000000004 [ 171.942767] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 171.950033] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 14:40:30 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x3f, 0x20, 0x4, 0x3, 0x0, 0x7, 0x1000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x100000001, 0x71e6af64}, 0x4000, 0xa000000000000000, 0x0, 0x8, 0x4, 0x2, 0x1, 0x0, 0x7, 0x0, 0x10001}, r0, 0x6, r1, 0x4) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340), &(0x7f0000001440)={'syz', 0x3}, 0x0, 0x0, r2) [ 171.957295] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 14:40:30 executing program 0: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) 14:40:30 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:31 executing program 4: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) [ 172.154050] syz-executor.4 (12381) used greatest stack depth: 23632 bytes left 14:40:31 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 172.254283] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop1 [ 172.329788] FAULT_INJECTION: forcing a failure. [ 172.329788] name failslab, interval 1, probability 0, space 0, times 0 [ 172.346557] CPU: 1 PID: 12425 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 172.354680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.364034] Call Trace: [ 172.366632] dump_stack+0x1fc/0x2ef [ 172.370277] should_fail.cold+0xa/0xf [ 172.374087] ? setup_fault_attr+0x200/0x200 [ 172.378420] ? lock_acquire+0x170/0x3c0 [ 172.382423] __should_failslab+0x115/0x180 [ 172.386675] should_failslab+0x5/0x10 [ 172.390487] kmem_cache_alloc+0x277/0x370 [ 172.394654] getname_flags+0xce/0x590 [ 172.398477] do_sys_open+0x26c/0x520 [ 172.402213] ? filp_open+0x70/0x70 [ 172.405763] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 172.411139] ? trace_hardirqs_off_caller+0x6e/0x210 [ 172.416176] ? do_syscall_64+0x21/0x620 [ 172.420177] do_syscall_64+0xf9/0x620 [ 172.424103] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.429303] RIP: 0033:0x4196e4 [ 172.432501] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 172.451408] RSP: 002b:00007fe03889ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 172.459305] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 172.466582] RDX: 0000000000000002 RSI: 00007fe03889e000 RDI: 00000000ffffff9c [ 172.473885] RBP: 00007fe03889e000 R08: 0000000000000000 R09: ffffffffffffffff [ 172.481164] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 172.488541] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 14:40:31 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r2 = socket(0x11, 0x800000003, 0x8) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a0dffc2c654"}, 0x80) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x20001, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000bc0)={"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"}) ioctl$KVM_RUN(r6, 0xae80, 0x0) sendmmsg(r1, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000080)=ANY=[@ANYRESOCT=r3], 0x1d8}}, {{&(0x7f00000004c0)=@xdp={0x2c, 0x8, 0x0, 0x3a}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000980)="9eb33050642dfad6d0df9dfc4e608cfd2334b16a97dfca5c423deae9b22f2cf34f61dd632041c6b942f65880e1c12b6948c4383e4d80dcd343b2ded2b3b3c02857796cb1e93c0045fcf8a0c8fa75df5fed9f2aa2d7138daf5e5f41b13e97ec1a15bae199a180052f26e1e27334e21b8c24797c721af4a87abb23296f2771cca8ed63c80694e8701bfff0441a9bd8eb679e7108f9a40625e9f37771bfb14836cf80e88d8553d18866e129722b02b7a5ebf3dd6d5f441771538351f6545dc69436124a01c42ba134533ef84c0bf1ee28d9d4", 0xd1}], 0x1, &(0x7f0000000a80)=ANY=[@ANYBLOB="90000000000000007a44f45800010000bb141109bc07d3d039f077addf6a6485104c4bb3e0d77005c5ac4f832145805f68a106ac5444447b727c141143465da998feb4f904bc017ff4aa9e6d3bbe3b78cbec532447f8e8bc3fe001f23016dff7fb9b17eef98bd98c73d7eee7b894e1ba57fa94489978c9ed0a22bbe70ba3ff94dcbb0dfe8e0dcdf67fc3c34b750000002800000000000000354f1739235d719f0e01000004000000d9addcb933781a46cc8b047b0afef2a9"], 0xb8}}], 0x2, 0x5) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000000c0)) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd60da03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 172.597721] FAULT_INJECTION: forcing a failure. [ 172.597721] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 172.609551] CPU: 1 PID: 12431 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 172.617529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.626886] Call Trace: [ 172.629489] dump_stack+0x1fc/0x2ef [ 172.633141] should_fail.cold+0xa/0xf [ 172.636980] ? setup_fault_attr+0x200/0x200 [ 172.641316] ? do_writepages+0x290/0x290 [ 172.645649] ? unlock_page+0x13d/0x230 [ 172.649555] __alloc_pages_nodemask+0x239/0x2890 [ 172.654336] ? generic_perform_write+0x36c/0x4d0 [ 172.659193] ? __lock_acquire+0x6de/0x3ff0 [ 172.663448] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 172.668309] ? lock_downgrade+0x720/0x720 [ 172.672469] ? lock_acquire+0x170/0x3c0 [ 172.676801] ? up_write+0x18/0x150 [ 172.680347] ? generic_file_write_iter+0x381/0x730 [ 172.685298] cache_grow_begin+0xa4/0x8a0 [ 172.689370] ? setup_fault_attr+0x200/0x200 [ 172.693697] ? lock_acquire+0x170/0x3c0 [ 172.697763] cache_alloc_refill+0x273/0x340 [ 172.702184] kmem_cache_alloc+0x346/0x370 [ 172.706342] getname_flags+0xce/0x590 [ 172.710154] do_sys_open+0x26c/0x520 [ 172.713876] ? filp_open+0x70/0x70 [ 172.717441] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 172.722808] ? trace_hardirqs_off_caller+0x6e/0x210 [ 172.727827] ? do_syscall_64+0x21/0x620 [ 172.731823] do_syscall_64+0xf9/0x620 [ 172.735650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.740844] RIP: 0033:0x4196e4 [ 172.744042] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 172.762942] RSP: 002b:00007fe03889ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 172.770755] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 172.778040] RDX: 0000000000000002 RSI: 00007fe03889e000 RDI: 00000000ffffff9c [ 172.785323] RBP: 00007fe03889e000 R08: 0000000000000000 R09: ffffffffffffffff [ 172.792597] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 172.799888] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 14:40:31 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 172.909116] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 172.988285] FAULT_INJECTION: forcing a failure. [ 172.988285] name failslab, interval 1, probability 0, space 0, times 0 [ 173.006334] CPU: 1 PID: 12445 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 173.014330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.023687] Call Trace: [ 173.026286] dump_stack+0x1fc/0x2ef [ 173.029935] should_fail.cold+0xa/0xf [ 173.033751] ? setup_fault_attr+0x200/0x200 [ 173.038082] ? lock_acquire+0x170/0x3c0 [ 173.042071] __should_failslab+0x115/0x180 [ 173.046312] should_failslab+0x5/0x10 [ 173.050130] kmem_cache_alloc+0x277/0x370 [ 173.054284] __alloc_file+0x21/0x330 [ 173.058003] alloc_empty_file+0x6d/0x170 [ 173.062078] path_openat+0xe9/0x2df0 [ 173.065804] ? __lock_acquire+0x6de/0x3ff0 [ 173.070049] ? path_lookupat+0x8d0/0x8d0 [ 173.074132] ? mark_held_locks+0xf0/0xf0 [ 173.078208] do_filp_open+0x18c/0x3f0 [ 173.082015] ? may_open_dev+0xf0/0xf0 [ 173.085822] ? __alloc_fd+0x28d/0x570 [ 173.089637] ? lock_downgrade+0x720/0x720 [ 173.093785] ? lock_acquire+0x170/0x3c0 [ 173.097758] ? __alloc_fd+0x34/0x570 [ 173.101483] ? do_raw_spin_unlock+0x171/0x230 [ 173.105986] ? _raw_spin_unlock+0x29/0x40 [ 173.110141] ? __alloc_fd+0x28d/0x570 [ 173.113952] do_sys_open+0x3b3/0x520 [ 173.117669] ? filp_open+0x70/0x70 [ 173.121648] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 173.127365] ? trace_hardirqs_off_caller+0x6e/0x210 [ 173.132387] ? do_syscall_64+0x21/0x620 [ 173.136373] do_syscall_64+0xf9/0x620 [ 173.140187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.145384] RIP: 0033:0x4196e4 [ 173.148580] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 173.167569] RSP: 002b:00007fe03889ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 173.175284] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 173.182559] RDX: 0000000000000002 RSI: 00007fe03889e000 RDI: 00000000ffffff9c [ 173.189825] RBP: 00007fe03889e000 R08: 0000000000000000 R09: ffffffffffffffff [ 173.197096] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 173.204365] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 14:40:32 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:32 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x3f, 0x20, 0x4, 0x3, 0x0, 0x7, 0x1000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x100000001, 0x71e6af64}, 0x4000, 0xa000000000000000, 0x0, 0x8, 0x4, 0x2, 0x1, 0x0, 0x7, 0x0, 0x10001}, r0, 0x6, r1, 0x4) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:32 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:32 executing program 0: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) 14:40:32 executing program 4: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) [ 173.381690] FAULT_INJECTION: forcing a failure. [ 173.381690] name failslab, interval 1, probability 0, space 0, times 0 [ 173.416941] CPU: 0 PID: 12455 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 173.424858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.434219] Call Trace: [ 173.436820] dump_stack+0x1fc/0x2ef [ 173.440451] should_fail.cold+0xa/0xf [ 173.444257] ? setup_fault_attr+0x200/0x200 [ 173.448587] ? lock_acquire+0x170/0x3c0 [ 173.452577] __should_failslab+0x115/0x180 [ 173.456860] should_failslab+0x5/0x10 [ 173.460666] kmem_cache_alloc_trace+0x284/0x380 [ 173.465432] apparmor_file_alloc_security+0x394/0xad0 [ 173.470637] ? apparmor_file_receive+0x160/0x160 [ 173.475406] ? __alloc_file+0x21/0x330 [ 173.479309] security_file_alloc+0x40/0x90 [ 173.483558] __alloc_file+0xc9/0x330 [ 173.488479] alloc_empty_file+0x6d/0x170 [ 173.492642] path_openat+0xe9/0x2df0 [ 173.496452] ? __lock_acquire+0x6de/0x3ff0 [ 173.500702] ? path_lookupat+0x8d0/0x8d0 [ 173.504771] ? mark_held_locks+0xf0/0xf0 [ 173.508841] do_filp_open+0x18c/0x3f0 [ 173.512638] ? may_open_dev+0xf0/0xf0 [ 173.516445] ? __alloc_fd+0x28d/0x570 [ 173.520253] ? lock_downgrade+0x720/0x720 [ 173.524408] ? lock_acquire+0x170/0x3c0 [ 173.528380] ? __alloc_fd+0x34/0x570 [ 173.532095] ? do_raw_spin_unlock+0x171/0x230 [ 173.536590] ? _raw_spin_unlock+0x29/0x40 [ 173.540751] ? __alloc_fd+0x28d/0x570 [ 173.544568] do_sys_open+0x3b3/0x520 [ 173.548292] ? filp_open+0x70/0x70 [ 173.552284] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 173.557657] ? trace_hardirqs_off_caller+0x6e/0x210 [ 173.562681] ? do_syscall_64+0x21/0x620 [ 173.566676] do_syscall_64+0xf9/0x620 [ 173.570488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.575676] RIP: 0033:0x4196e4 [ 173.578871] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 173.597773] RSP: 002b:00007fe03889ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 173.605585] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 173.612855] RDX: 0000000000000002 RSI: 00007fe03889e000 RDI: 00000000ffffff9c [ 173.620127] RBP: 00007fe03889e000 R08: 0000000000000000 R09: ffffffffffffffff [ 173.627411] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 173.634681] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 14:40:32 executing program 5: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) read$FUSE(r4, &(0x7f00000021c0)={0x2020}, 0x2020) 14:40:32 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 173.876359] FAULT_INJECTION: forcing a failure. [ 173.876359] name failslab, interval 1, probability 0, space 0, times 0 [ 173.891331] CPU: 1 PID: 12484 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 173.899237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.908593] Call Trace: [ 173.911193] dump_stack+0x1fc/0x2ef [ 173.914839] should_fail.cold+0xa/0xf [ 173.918647] ? setup_fault_attr+0x200/0x200 [ 173.922975] ? lock_acquire+0x170/0x3c0 [ 173.926964] __should_failslab+0x115/0x180 [ 173.931210] should_failslab+0x5/0x10 [ 173.935224] kmem_cache_alloc_trace+0x284/0x380 [ 173.939899] ? loop_info64_to_compat+0x5e0/0x5e0 [ 173.944659] __kthread_create_on_node+0xd2/0x410 [ 173.949424] ? kthread_parkme+0xa0/0xa0 [ 173.953498] ? lo_ioctl+0x1bb/0x20e0 [ 173.957229] ? __mutex_lock+0x365/0x1200 [ 173.961299] ? lock_downgrade+0x720/0x720 [ 173.965457] ? loop_info64_to_compat+0x5e0/0x5e0 [ 173.970224] kthread_create_on_node+0xbb/0xf0 [ 173.974787] ? __kthread_create_on_node+0x410/0x410 [ 173.979804] ? __fget+0x356/0x510 [ 173.983263] ? do_dup2+0x450/0x450 [ 173.986812] ? __lockdep_init_map+0x100/0x5a0 [ 173.991317] ? __lockdep_init_map+0x100/0x5a0 [ 173.995833] lo_ioctl+0xae5/0x20e0 [ 173.999390] ? loop_set_status64+0x110/0x110 [ 174.003823] blkdev_ioctl+0x5cb/0x1a80 [ 174.007729] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.013099] ? blkpg_ioctl+0x9d0/0x9d0 [ 174.016993] ? mark_held_locks+0xf0/0xf0 [ 174.021059] ? mark_held_locks+0xf0/0xf0 [ 174.025145] ? debug_check_no_obj_freed+0x201/0x490 [ 174.030262] ? lock_downgrade+0x720/0x720 [ 174.034420] block_ioctl+0xe9/0x130 [ 174.038048] ? blkdev_fallocate+0x3f0/0x3f0 [ 174.042374] do_vfs_ioctl+0xcdb/0x12e0 [ 174.046266] ? lock_downgrade+0x720/0x720 [ 174.050422] ? check_preemption_disabled+0x41/0x280 [ 174.055442] ? ioctl_preallocate+0x200/0x200 [ 174.059861] ? __fget+0x356/0x510 [ 174.063319] ? do_dup2+0x450/0x450 [ 174.066890] ? do_sys_open+0x2bf/0x520 [ 174.070790] ksys_ioctl+0x9b/0xc0 [ 174.074251] __x64_sys_ioctl+0x6f/0xb0 [ 174.078145] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 174.082730] do_syscall_64+0xf9/0x620 [ 174.086543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.091733] RIP: 0033:0x4663b7 [ 174.094934] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 174.113847] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 174.121566] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 174.128839] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 174.136107] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 174.143469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 174.150736] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 14:40:33 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 174.241318] FAULT_INJECTION: forcing a failure. [ 174.241318] name failslab, interval 1, probability 0, space 0, times 0 [ 174.252841] CPU: 0 PID: 12488 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 174.260727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.270344] Call Trace: [ 174.272944] dump_stack+0x1fc/0x2ef [ 174.276591] should_fail.cold+0xa/0xf [ 174.280404] ? setup_fault_attr+0x200/0x200 [ 174.284830] ? lock_acquire+0x170/0x3c0 [ 174.288826] __should_failslab+0x115/0x180 [ 174.293075] should_failslab+0x5/0x10 [ 174.296886] kmem_cache_alloc+0x277/0x370 [ 174.301046] __kernfs_new_node+0xd2/0x680 [ 174.305205] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 174.309963] ? _raw_spin_unlock_irq+0x5a/0x80 [ 174.314464] ? __cpu_to_node+0x7b/0xa0 [ 174.318357] ? mark_held_locks+0xf0/0xf0 [ 174.322414] ? io_schedule_timeout+0x140/0x140 [ 174.326996] ? enqueue_entity+0xf86/0x3850 [ 174.331231] ? set_user_nice.part.0+0x3b9/0xab0 [ 174.335910] kernfs_create_dir_ns+0x9e/0x230 [ 174.340323] internal_create_group+0x1c1/0xb20 [ 174.344918] ? sysfs_remove_link_from_group+0x70/0x70 [ 174.350111] ? lock_downgrade+0x720/0x720 [ 174.354362] lo_ioctl+0xf7c/0x20e0 [ 174.357921] ? loop_set_status64+0x110/0x110 [ 174.362332] blkdev_ioctl+0x5cb/0x1a80 [ 174.369442] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.374810] ? blkpg_ioctl+0x9d0/0x9d0 [ 174.378701] ? mark_held_locks+0xf0/0xf0 [ 174.382763] ? mark_held_locks+0xf0/0xf0 [ 174.387364] ? debug_check_no_obj_freed+0x201/0x490 [ 174.392389] ? lock_downgrade+0x720/0x720 [ 174.396539] block_ioctl+0xe9/0x130 [ 174.400339] ? blkdev_fallocate+0x3f0/0x3f0 [ 174.404662] do_vfs_ioctl+0xcdb/0x12e0 [ 174.408551] ? lock_downgrade+0x720/0x720 [ 174.412706] ? check_preemption_disabled+0x41/0x280 [ 174.417733] ? ioctl_preallocate+0x200/0x200 [ 174.422150] ? __fget+0x356/0x510 [ 174.425611] ? do_dup2+0x450/0x450 [ 174.429158] ? do_sys_open+0x2bf/0x520 [ 174.433067] ksys_ioctl+0x9b/0xc0 [ 174.436539] __x64_sys_ioctl+0x6f/0xb0 14:40:33 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 174.440434] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 174.445025] do_syscall_64+0xf9/0x620 [ 174.448839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.454030] RIP: 0033:0x4663b7 [ 174.457229] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 174.476135] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 174.483858] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 14:40:33 executing program 0: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:33 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x3f, 0x20, 0x4, 0x3, 0x0, 0x7, 0x1000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x100000001, 0x71e6af64}, 0x4000, 0xa000000000000000, 0x0, 0x8, 0x4, 0x2, 0x1, 0x0, 0x7, 0x0, 0x10001}, r0, 0x6, r1, 0x4) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) 14:40:33 executing program 5: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) read$FUSE(r4, &(0x7f00000021c0)={0x2020}, 0x2020) 14:40:33 executing program 4: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) [ 174.491121] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 174.498385] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 174.505648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 174.513257] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 174.567054] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:40:33 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 174.734699] FAULT_INJECTION: forcing a failure. [ 174.734699] name failslab, interval 1, probability 0, space 0, times 0 [ 174.746861] CPU: 0 PID: 12516 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 174.754755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.764116] Call Trace: [ 174.766718] dump_stack+0x1fc/0x2ef [ 174.770363] should_fail.cold+0xa/0xf [ 174.774178] ? setup_fault_attr+0x200/0x200 [ 174.778509] ? lock_acquire+0x170/0x3c0 [ 174.782487] __should_failslab+0x115/0x180 [ 174.786717] should_failslab+0x5/0x10 [ 174.790505] kmem_cache_alloc+0x277/0x370 [ 174.794645] __kernfs_new_node+0xd2/0x680 [ 174.798785] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 174.803534] ? kernfs_activate+0x2c/0x1d0 [ 174.807671] ? lock_downgrade+0x720/0x720 [ 174.811814] ? kernfs_add_one+0x51/0x4c0 [ 174.815876] ? mutex_trylock+0x1a0/0x1a0 [ 174.819943] ? __mutex_unlock_slowpath+0xea/0x610 [ 174.824881] kernfs_new_node+0x92/0x120 [ 174.828846] __kernfs_create_file+0x51/0x340 [ 174.833249] sysfs_add_file_mode_ns+0x226/0x540 [ 174.837914] internal_create_group+0x355/0xb20 [ 174.842491] ? sysfs_remove_link_from_group+0x70/0x70 [ 174.847671] ? lock_downgrade+0x720/0x720 [ 174.851817] lo_ioctl+0xf7c/0x20e0 [ 174.855366] ? loop_set_status64+0x110/0x110 [ 174.859766] blkdev_ioctl+0x5cb/0x1a80 [ 174.863643] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.868999] ? blkpg_ioctl+0x9d0/0x9d0 [ 174.872874] ? mark_held_locks+0xf0/0xf0 [ 174.876924] ? mark_held_locks+0xf0/0xf0 [ 174.880975] ? debug_check_no_obj_freed+0x201/0x490 [ 174.885982] ? lock_downgrade+0x720/0x720 [ 174.890120] block_ioctl+0xe9/0x130 [ 174.893734] ? blkdev_fallocate+0x3f0/0x3f0 [ 174.898045] do_vfs_ioctl+0xcdb/0x12e0 [ 174.901922] ? lock_downgrade+0x720/0x720 [ 174.906060] ? check_preemption_disabled+0x41/0x280 [ 174.911065] ? ioctl_preallocate+0x200/0x200 [ 174.915464] ? __fget+0x356/0x510 [ 174.918907] ? do_dup2+0x450/0x450 [ 174.922436] ? do_sys_open+0x2bf/0x520 [ 174.926318] ksys_ioctl+0x9b/0xc0 [ 174.929762] __x64_sys_ioctl+0x6f/0xb0 [ 174.933639] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 174.938206] do_syscall_64+0xf9/0x620 [ 174.941998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.947191] RIP: 0033:0x4663b7 [ 174.950374] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 174.969622] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 174.977317] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 174.984584] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 174.991839] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 174.999201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 175.006544] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 14:40:33 executing program 4: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) 14:40:33 executing program 0: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:33 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 175.059308] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:40:33 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:34 executing program 5: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) read$FUSE(r4, &(0x7f00000021c0)={0x2020}, 0x2020) 14:40:34 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x3f, 0x20, 0x4, 0x3, 0x0, 0x7, 0x1000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x100000001, 0x71e6af64}, 0x4000, 0xa000000000000000, 0x0, 0x8, 0x4, 0x2, 0x1, 0x0, 0x7, 0x0, 0x10001}, r0, 0x6, r1, 0x4) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) [ 175.229240] FAULT_INJECTION: forcing a failure. [ 175.229240] name failslab, interval 1, probability 0, space 0, times 0 [ 175.242383] CPU: 1 PID: 12539 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 175.250387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.259749] Call Trace: [ 175.262470] dump_stack+0x1fc/0x2ef [ 175.266117] should_fail.cold+0xa/0xf [ 175.269930] ? setup_fault_attr+0x200/0x200 [ 175.274260] ? lock_acquire+0x170/0x3c0 [ 175.278252] __should_failslab+0x115/0x180 [ 175.282499] should_failslab+0x5/0x10 [ 175.286303] kmem_cache_alloc+0x277/0x370 [ 175.290463] __kernfs_new_node+0xd2/0x680 [ 175.294626] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 175.299398] ? kernfs_activate+0x2c/0x1d0 [ 175.303561] ? lock_downgrade+0x720/0x720 [ 175.307720] ? kernfs_add_one+0x51/0x4c0 [ 175.311884] ? mutex_trylock+0x1a0/0x1a0 [ 175.315965] ? __mutex_unlock_slowpath+0xea/0x610 [ 175.320826] kernfs_new_node+0x92/0x120 [ 175.324811] __kernfs_create_file+0x51/0x340 14:40:34 executing program 4: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) [ 175.329232] sysfs_add_file_mode_ns+0x226/0x540 [ 175.333904] internal_create_group+0x355/0xb20 [ 175.338480] ? sysfs_remove_link_from_group+0x70/0x70 [ 175.343769] ? lock_downgrade+0x720/0x720 [ 175.347919] lo_ioctl+0xf7c/0x20e0 [ 175.351452] ? loop_set_status64+0x110/0x110 [ 175.355897] blkdev_ioctl+0x5cb/0x1a80 [ 175.359773] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.365177] ? blkpg_ioctl+0x9d0/0x9d0 [ 175.369068] ? mark_held_locks+0xf0/0xf0 [ 175.373154] ? mark_held_locks+0xf0/0xf0 [ 175.377200] ? debug_check_no_obj_freed+0x201/0x490 [ 175.382218] ? lock_downgrade+0x720/0x720 [ 175.387921] block_ioctl+0xe9/0x130 [ 175.391530] ? blkdev_fallocate+0x3f0/0x3f0 [ 175.395922] do_vfs_ioctl+0xcdb/0x12e0 [ 175.399803] ? lock_downgrade+0x720/0x720 [ 175.403949] ? check_preemption_disabled+0x41/0x280 [ 175.408958] ? ioctl_preallocate+0x200/0x200 [ 175.413352] ? __fget+0x356/0x510 [ 175.416791] ? do_dup2+0x450/0x450 [ 175.420319] ? do_sys_open+0x2bf/0x520 [ 175.424209] ksys_ioctl+0x9b/0xc0 [ 175.427703] __x64_sys_ioctl+0x6f/0xb0 [ 175.431573] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 175.436139] do_syscall_64+0xf9/0x620 [ 175.439927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.445101] RIP: 0033:0x4663b7 [ 175.448275] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 175.467162] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:40:34 executing program 0: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:34 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 175.474850] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 175.482107] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 175.489370] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 175.496641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 175.503899] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 175.528651] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:40:34 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 175.636812] FAULT_INJECTION: forcing a failure. [ 175.636812] name failslab, interval 1, probability 0, space 0, times 0 [ 175.649004] CPU: 1 PID: 12566 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 175.656891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.666336] Call Trace: [ 175.668939] dump_stack+0x1fc/0x2ef [ 175.672583] should_fail.cold+0xa/0xf [ 175.676399] ? setup_fault_attr+0x200/0x200 [ 175.680727] ? lock_acquire+0x170/0x3c0 [ 175.684712] __should_failslab+0x115/0x180 [ 175.689567] should_failslab+0x5/0x10 [ 175.693377] kmem_cache_alloc+0x277/0x370 [ 175.697545] __kernfs_new_node+0xd2/0x680 [ 175.701707] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 175.706476] ? __mutex_unlock_slowpath+0xea/0x610 [ 175.711421] ? wait_for_completion_io+0x10/0x10 [ 175.716098] ? kernfs_next_descendant_post+0x19c/0x290 [ 175.721393] kernfs_new_node+0x92/0x120 [ 175.725375] __kernfs_create_file+0x51/0x340 [ 175.729801] sysfs_add_file_mode_ns+0x226/0x540 14:40:34 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x3f, 0x20, 0x4, 0x3, 0x0, 0x7, 0x1000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x100000001, 0x71e6af64}, 0x4000, 0xa000000000000000, 0x0, 0x8, 0x4, 0x2, 0x1, 0x0, 0x7, 0x0, 0x10001}, r0, 0x6, r1, 0x4) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) 14:40:34 executing program 5: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) 14:40:34 executing program 4: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 175.734479] internal_create_group+0x355/0xb20 [ 175.739162] ? sysfs_remove_link_from_group+0x70/0x70 [ 175.744361] ? lock_downgrade+0x720/0x720 [ 175.748711] lo_ioctl+0xf7c/0x20e0 [ 175.752530] ? loop_set_status64+0x110/0x110 [ 175.756947] blkdev_ioctl+0x5cb/0x1a80 [ 175.760846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.766220] ? blkpg_ioctl+0x9d0/0x9d0 [ 175.770114] ? mark_held_locks+0xf0/0xf0 [ 175.774177] ? mark_held_locks+0xf0/0xf0 [ 175.778246] ? debug_check_no_obj_freed+0x201/0x490 [ 175.783277] ? lock_downgrade+0x720/0x720 [ 175.787430] block_ioctl+0xe9/0x130 [ 175.791051] ? blkdev_fallocate+0x3f0/0x3f0 [ 175.795364] do_vfs_ioctl+0xcdb/0x12e0 [ 175.799254] ? lock_downgrade+0x720/0x720 [ 175.803668] ? check_preemption_disabled+0x41/0x280 [ 175.808683] ? ioctl_preallocate+0x200/0x200 [ 175.813099] ? __fget+0x356/0x510 [ 175.816572] ? do_dup2+0x450/0x450 [ 175.820101] ? do_sys_open+0x2bf/0x520 [ 175.823975] ksys_ioctl+0x9b/0xc0 [ 175.827417] __x64_sys_ioctl+0x6f/0xb0 [ 175.831300] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 175.835958] do_syscall_64+0xf9/0x620 [ 175.839749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.844920] RIP: 0033:0x4663b7 [ 175.848093] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 175.866980] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 175.874678] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 14:40:34 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:34 executing program 0: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 175.881940] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 175.889212] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 175.896463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 175.903739] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 175.961696] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:40:34 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:34 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 176.135267] FAULT_INJECTION: forcing a failure. [ 176.135267] name failslab, interval 1, probability 0, space 0, times 0 [ 176.153503] CPU: 1 PID: 12600 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 176.161404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.170761] Call Trace: [ 176.173365] dump_stack+0x1fc/0x2ef [ 176.176999] should_fail.cold+0xa/0xf [ 176.180813] ? setup_fault_attr+0x200/0x200 14:40:35 executing program 4: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:35 executing program 5: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) [ 176.185144] ? lock_acquire+0x170/0x3c0 [ 176.189137] __should_failslab+0x115/0x180 [ 176.193380] should_failslab+0x5/0x10 [ 176.197190] kmem_cache_alloc+0x277/0x370 [ 176.201433] __kernfs_new_node+0xd2/0x680 [ 176.205567] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 176.210312] ? __mutex_unlock_slowpath+0xea/0x610 [ 176.215141] ? wait_for_completion_io+0x10/0x10 [ 176.219820] ? kernfs_next_descendant_post+0x19c/0x290 [ 176.225084] kernfs_new_node+0x92/0x120 [ 176.229043] __kernfs_create_file+0x51/0x340 [ 176.233449] sysfs_add_file_mode_ns+0x226/0x540 [ 176.238105] internal_create_group+0x355/0xb20 [ 176.242691] ? sysfs_remove_link_from_group+0x70/0x70 [ 176.247863] ? lock_downgrade+0x720/0x720 [ 176.251999] lo_ioctl+0xf7c/0x20e0 [ 176.255525] ? loop_set_status64+0x110/0x110 [ 176.259930] blkdev_ioctl+0x5cb/0x1a80 [ 176.263803] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.269165] ? blkpg_ioctl+0x9d0/0x9d0 [ 176.273051] ? mark_held_locks+0xf0/0xf0 [ 176.277219] ? mark_held_locks+0xf0/0xf0 [ 176.281272] ? debug_check_no_obj_freed+0x201/0x490 [ 176.286273] ? lock_downgrade+0x720/0x720 [ 176.290416] block_ioctl+0xe9/0x130 [ 176.294055] ? blkdev_fallocate+0x3f0/0x3f0 [ 176.298453] do_vfs_ioctl+0xcdb/0x12e0 [ 176.302331] ? lock_downgrade+0x720/0x720 [ 176.306465] ? check_preemption_disabled+0x41/0x280 [ 176.311467] ? ioctl_preallocate+0x200/0x200 [ 176.315859] ? __fget+0x356/0x510 [ 176.319298] ? do_dup2+0x450/0x450 [ 176.322826] ? do_sys_open+0x2bf/0x520 [ 176.326703] ksys_ioctl+0x9b/0xc0 [ 176.330144] __x64_sys_ioctl+0x6f/0xb0 [ 176.334027] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 176.338597] do_syscall_64+0xf9/0x620 [ 176.342402] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.347581] RIP: 0033:0x4663b7 [ 176.350760] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 176.369758] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 176.377455] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 14:40:35 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:35 executing program 0: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 176.384726] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 176.391984] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 176.399235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 176.406585] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 176.454258] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:40:35 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 176.586498] FAULT_INJECTION: forcing a failure. [ 176.586498] name failslab, interval 1, probability 0, space 0, times 0 [ 176.603977] CPU: 1 PID: 12629 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 176.611893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.621265] Call Trace: [ 176.623866] dump_stack+0x1fc/0x2ef [ 176.627506] should_fail.cold+0xa/0xf [ 176.631316] ? setup_fault_attr+0x200/0x200 14:40:35 executing program 4: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:35 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:35 executing program 5: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) [ 176.635645] ? lock_acquire+0x170/0x3c0 [ 176.639635] __should_failslab+0x115/0x180 [ 176.643880] should_failslab+0x5/0x10 [ 176.647687] kmem_cache_alloc+0x277/0x370 [ 176.651846] __kernfs_new_node+0xd2/0x680 [ 176.656006] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 176.660779] ? __mutex_unlock_slowpath+0xea/0x610 [ 176.665627] ? wait_for_completion_io+0x10/0x10 [ 176.670286] ? kernfs_next_descendant_post+0x19c/0x290 [ 176.675552] kernfs_new_node+0x92/0x120 [ 176.679520] __kernfs_create_file+0x51/0x340 [ 176.683918] sysfs_add_file_mode_ns+0x226/0x540 [ 176.688583] internal_create_group+0x355/0xb20 [ 176.693175] ? sysfs_remove_link_from_group+0x70/0x70 [ 176.698349] ? lock_downgrade+0x720/0x720 [ 176.702536] lo_ioctl+0xf7c/0x20e0 [ 176.706071] ? loop_set_status64+0x110/0x110 [ 176.710469] blkdev_ioctl+0x5cb/0x1a80 [ 176.714345] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.719689] ? blkpg_ioctl+0x9d0/0x9d0 [ 176.723561] ? mark_held_locks+0xf0/0xf0 [ 176.727605] ? mark_held_locks+0xf0/0xf0 [ 176.731650] ? debug_check_no_obj_freed+0x201/0x490 [ 176.736654] ? lock_downgrade+0x720/0x720 [ 176.740788] block_ioctl+0xe9/0x130 [ 176.744435] ? blkdev_fallocate+0x3f0/0x3f0 [ 176.748739] do_vfs_ioctl+0xcdb/0x12e0 [ 176.752611] ? lock_downgrade+0x720/0x720 [ 176.756740] ? check_preemption_disabled+0x41/0x280 [ 176.761763] ? ioctl_preallocate+0x200/0x200 [ 176.766161] ? __fget+0x356/0x510 [ 176.769597] ? do_dup2+0x450/0x450 [ 176.773118] ? do_sys_open+0x2bf/0x520 [ 176.776990] ksys_ioctl+0x9b/0xc0 [ 176.780428] __x64_sys_ioctl+0x6f/0xb0 [ 176.784314] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 176.788965] do_syscall_64+0xf9/0x620 [ 176.792750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.797921] RIP: 0033:0x4663b7 [ 176.801096] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 176.819982] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 176.827673] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 14:40:35 executing program 0: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:35 executing program 2: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 176.834924] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 176.842172] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 176.849426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 176.856679] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 176.878925] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:40:35 executing program 0: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:35 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 177.047780] FAULT_INJECTION: forcing a failure. [ 177.047780] name failslab, interval 1, probability 0, space 0, times 0 [ 177.059677] CPU: 0 PID: 12661 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 177.067570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.076932] Call Trace: [ 177.079535] dump_stack+0x1fc/0x2ef [ 177.083173] should_fail.cold+0xa/0xf [ 177.086981] ? is_bpf_text_address+0xfc/0x1b0 [ 177.091487] ? setup_fault_attr+0x200/0x200 14:40:35 executing program 2: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:35 executing program 5: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:35 executing program 0: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 177.095814] ? kernel_text_address+0xbd/0xf0 [ 177.100253] ? __kernel_text_address+0x9/0x30 [ 177.104763] ? unwind_get_return_address+0x51/0x90 [ 177.109700] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.115074] __should_failslab+0x115/0x180 [ 177.119318] should_failslab+0x5/0x10 [ 177.123121] kmem_cache_alloc+0x3f/0x370 [ 177.127183] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 177.132902] idr_get_free+0x50e/0xa10 [ 177.136762] idr_alloc_u32+0x1a5/0x320 [ 177.140685] ? __fprop_inc_percpu_max+0x210/0x210 [ 177.145515] ? node_tag_clear+0xb5/0x1b0 [ 177.149561] ? should_fail+0x142/0x7b0 [ 177.153435] ? fs_reclaim_release+0xd0/0x110 [ 177.157836] idr_alloc_cyclic+0x102/0x230 [ 177.161967] ? idr_alloc+0x130/0x130 [ 177.165827] ? __kernfs_new_node+0xf9/0x680 [ 177.170133] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 177.175136] __kernfs_new_node+0x11a/0x680 [ 177.179356] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 177.184095] ? __mutex_unlock_slowpath+0xea/0x610 [ 177.188925] ? wait_for_completion_io+0x10/0x10 [ 177.193597] ? kernfs_next_descendant_post+0x19c/0x290 [ 177.198857] kernfs_new_node+0x92/0x120 [ 177.202815] __kernfs_create_file+0x51/0x340 [ 177.207210] sysfs_add_file_mode_ns+0x226/0x540 [ 177.211862] internal_create_group+0x355/0xb20 [ 177.216430] ? sysfs_remove_link_from_group+0x70/0x70 [ 177.221600] ? lock_downgrade+0x720/0x720 [ 177.225735] lo_ioctl+0xf7c/0x20e0 [ 177.229272] ? loop_set_status64+0x110/0x110 [ 177.233675] blkdev_ioctl+0x5cb/0x1a80 [ 177.237658] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.243009] ? blkpg_ioctl+0x9d0/0x9d0 [ 177.246890] ? mark_held_locks+0xf0/0xf0 [ 177.250940] ? mark_held_locks+0xf0/0xf0 [ 177.255212] ? debug_check_no_obj_freed+0x201/0x490 [ 177.260323] ? lock_downgrade+0x720/0x720 [ 177.264464] block_ioctl+0xe9/0x130 [ 177.268074] ? blkdev_fallocate+0x3f0/0x3f0 [ 177.272383] do_vfs_ioctl+0xcdb/0x12e0 [ 177.276257] ? lock_downgrade+0x720/0x720 [ 177.280403] ? check_preemption_disabled+0x41/0x280 [ 177.285403] ? ioctl_preallocate+0x200/0x200 [ 177.289795] ? __fget+0x356/0x510 [ 177.293244] ? do_dup2+0x450/0x450 [ 177.296779] ? do_sys_open+0x2bf/0x520 [ 177.300785] ksys_ioctl+0x9b/0xc0 [ 177.304231] __x64_sys_ioctl+0x6f/0xb0 [ 177.308104] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 177.312678] do_syscall_64+0xf9/0x620 [ 177.316467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.321638] RIP: 0033:0x4663b7 [ 177.324812] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 14:40:36 executing program 4: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:36 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 177.343956] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 177.351670] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 177.358924] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 177.366301] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 177.373558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 177.380919] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 14:40:36 executing program 4: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:36 executing program 2: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) getpid() write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 177.438773] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:40:36 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:36 executing program 2: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:36 executing program 2: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 177.574732] FAULT_INJECTION: forcing a failure. [ 177.574732] name failslab, interval 1, probability 0, space 0, times 0 [ 177.590114] CPU: 1 PID: 12696 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 177.598022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.607380] Call Trace: [ 177.609982] dump_stack+0x1fc/0x2ef [ 177.613622] should_fail.cold+0xa/0xf [ 177.617435] ? setup_fault_attr+0x200/0x200 14:40:36 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:36 executing program 0: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:36 executing program 4: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 177.621764] ? lock_acquire+0x170/0x3c0 [ 177.625749] __should_failslab+0x115/0x180 [ 177.629995] should_failslab+0x5/0x10 [ 177.633800] kmem_cache_alloc+0x277/0x370 [ 177.637960] __kernfs_new_node+0xd2/0x680 [ 177.642124] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 177.646891] ? __mutex_unlock_slowpath+0xea/0x610 [ 177.651750] ? wait_for_completion_io+0x10/0x10 [ 177.656425] ? kernfs_next_descendant_post+0x19c/0x290 [ 177.661712] kernfs_new_node+0x92/0x120 [ 177.665680] __kernfs_create_file+0x51/0x340 [ 177.670199] sysfs_add_file_mode_ns+0x226/0x540 [ 177.674853] internal_create_group+0x355/0xb20 [ 177.679422] ? sysfs_remove_link_from_group+0x70/0x70 [ 177.684611] ? lock_downgrade+0x720/0x720 [ 177.688780] lo_ioctl+0xf7c/0x20e0 [ 177.692320] ? loop_set_status64+0x110/0x110 [ 177.696985] blkdev_ioctl+0x5cb/0x1a80 [ 177.700874] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.706230] ? blkpg_ioctl+0x9d0/0x9d0 [ 177.710100] ? finish_task_switch+0x118/0x760 [ 177.714589] ? mark_held_locks+0xf0/0xf0 [ 177.718635] ? debug_check_no_obj_freed+0x201/0x490 [ 177.723635] ? lock_downgrade+0x720/0x720 [ 177.727780] block_ioctl+0xe9/0x130 [ 177.731573] ? blkdev_fallocate+0x3f0/0x3f0 [ 177.735889] do_vfs_ioctl+0xcdb/0x12e0 [ 177.739759] ? lock_downgrade+0x720/0x720 [ 177.743891] ? check_preemption_disabled+0x41/0x280 [ 177.748891] ? ioctl_preallocate+0x200/0x200 [ 177.753285] ? __fget+0x356/0x510 [ 177.756722] ? do_dup2+0x450/0x450 [ 177.760253] ? do_sys_open+0x2bf/0x520 [ 177.764146] ksys_ioctl+0x9b/0xc0 [ 177.767595] __x64_sys_ioctl+0x6f/0xb0 [ 177.771477] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 177.776058] do_syscall_64+0xf9/0x620 [ 177.779950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.785125] RIP: 0033:0x4663b7 [ 177.788332] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 177.807578] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:40:36 executing program 5: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 177.820240] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 177.827496] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 177.834763] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 177.842035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 177.849319] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 14:40:36 executing program 2: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 177.885982] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:40:36 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:36 executing program 2: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:36 executing program 2: gettid() r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 178.027868] FAULT_INJECTION: forcing a failure. [ 178.027868] name failslab, interval 1, probability 0, space 0, times 0 [ 178.043402] CPU: 0 PID: 12730 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 178.051313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.060682] Call Trace: [ 178.063292] dump_stack+0x1fc/0x2ef [ 178.066938] should_fail.cold+0xa/0xf [ 178.070752] ? setup_fault_attr+0x200/0x200 14:40:36 executing program 5: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 178.075114] ? lock_acquire+0x170/0x3c0 [ 178.079105] ? dev_uevent_filter+0xd0/0xd0 [ 178.083349] __should_failslab+0x115/0x180 [ 178.087605] should_failslab+0x5/0x10 [ 178.091410] kmem_cache_alloc_trace+0x284/0x380 [ 178.096088] ? dev_uevent_filter+0xd0/0xd0 [ 178.100341] kobject_uevent_env+0x236/0x1480 [ 178.104772] lo_ioctl+0xff9/0x20e0 [ 178.108325] ? loop_set_status64+0x110/0x110 [ 178.112742] blkdev_ioctl+0x5cb/0x1a80 [ 178.116741] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.122099] ? blkpg_ioctl+0x9d0/0x9d0 [ 178.125982] ? mark_held_locks+0xf0/0xf0 [ 178.130124] ? mark_held_locks+0xf0/0xf0 [ 178.134175] ? debug_check_no_obj_freed+0x201/0x490 [ 178.139188] ? lock_downgrade+0x720/0x720 [ 178.143325] block_ioctl+0xe9/0x130 [ 178.146940] ? blkdev_fallocate+0x3f0/0x3f0 [ 178.151251] do_vfs_ioctl+0xcdb/0x12e0 [ 178.155273] ? lock_downgrade+0x720/0x720 [ 178.159426] ? check_preemption_disabled+0x41/0x280 [ 178.164433] ? ioctl_preallocate+0x200/0x200 [ 178.168918] ? __fget+0x356/0x510 [ 178.172358] ? do_dup2+0x450/0x450 [ 178.175893] ? do_sys_open+0x2bf/0x520 [ 178.179771] ksys_ioctl+0x9b/0xc0 [ 178.183211] __x64_sys_ioctl+0x6f/0xb0 [ 178.187080] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 178.191649] do_syscall_64+0xf9/0x620 [ 178.195435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.200610] RIP: 0033:0x4663b7 [ 178.203783] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 178.222686] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 178.230377] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 178.237717] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 178.244973] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 178.252288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 178.259569] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 14:40:37 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:37 executing program 0: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) getpid() write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:37 executing program 4: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 178.284847] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:40:37 executing program 0: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:37 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:37 executing program 0: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:37 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:37 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 178.465576] FAULT_INJECTION: forcing a failure. [ 178.465576] name failslab, interval 1, probability 0, space 0, times 0 [ 178.493646] CPU: 1 PID: 12765 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 178.501559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.510921] Call Trace: [ 178.513520] dump_stack+0x1fc/0x2ef [ 178.517168] should_fail.cold+0xa/0xf [ 178.520984] ? setup_fault_attr+0x200/0x200 [ 178.525300] ? lock_acquire+0x170/0x3c0 [ 178.529269] __should_failslab+0x115/0x180 [ 178.533496] should_failslab+0x5/0x10 [ 178.537298] __kmalloc+0x2ab/0x3c0 [ 178.540827] ? kobject_get_path+0xbf/0x240 [ 178.545063] kobject_get_path+0xbf/0x240 [ 178.549118] kobject_uevent_env+0x25c/0x1480 [ 178.553522] lo_ioctl+0xff9/0x20e0 [ 178.557059] ? loop_set_status64+0x110/0x110 [ 178.561458] blkdev_ioctl+0x5cb/0x1a80 [ 178.565336] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.570686] ? blkpg_ioctl+0x9d0/0x9d0 [ 178.574586] ? mark_held_locks+0xf0/0xf0 [ 178.578659] ? mark_held_locks+0xf0/0xf0 [ 178.582719] ? debug_check_no_obj_freed+0x201/0x490 [ 178.587729] ? lock_downgrade+0x720/0x720 [ 178.591878] block_ioctl+0xe9/0x130 [ 178.595507] ? blkdev_fallocate+0x3f0/0x3f0 [ 178.599829] do_vfs_ioctl+0xcdb/0x12e0 [ 178.603847] ? lock_downgrade+0x720/0x720 [ 178.608078] ? check_preemption_disabled+0x41/0x280 [ 178.613088] ? ioctl_preallocate+0x200/0x200 [ 178.617488] ? __fget+0x356/0x510 [ 178.620932] ? do_dup2+0x450/0x450 [ 178.624461] ? do_sys_open+0x2bf/0x520 [ 178.628377] ksys_ioctl+0x9b/0xc0 [ 178.631823] __x64_sys_ioctl+0x6f/0xb0 [ 178.635702] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 178.640358] do_syscall_64+0xf9/0x620 [ 178.644168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.649358] RIP: 0033:0x4663b7 14:40:37 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:37 executing program 4: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:37 executing program 0: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 178.652547] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 178.671433] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 178.679233] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 178.686487] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 178.693741] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 178.700995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 178.708254] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 178.735309] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:40:37 executing program 5: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:37 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:37 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:37 executing program 0: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:37 executing program 4: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:37 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:37 executing program 0: gettid() r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:37 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 178.929225] FAULT_INJECTION: forcing a failure. [ 178.929225] name failslab, interval 1, probability 0, space 0, times 0 [ 178.966410] CPU: 0 PID: 12793 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 14:40:37 executing program 5: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 178.974492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.983849] Call Trace: [ 178.986449] dump_stack+0x1fc/0x2ef [ 178.990093] should_fail.cold+0xa/0xf [ 178.993908] ? setup_fault_attr+0x200/0x200 [ 178.998322] ? lock_acquire+0x170/0x3c0 [ 179.002296] __should_failslab+0x115/0x180 [ 179.006719] should_failslab+0x5/0x10 [ 179.010500] kmem_cache_alloc_node+0x245/0x3b0 [ 179.015069] __alloc_skb+0x71/0x560 [ 179.018677] alloc_uevent_skb+0x7b/0x210 [ 179.022720] kobject_uevent_env+0xa90/0x1480 [ 179.027114] lo_ioctl+0xff9/0x20e0 [ 179.030636] ? loop_set_status64+0x110/0x110 [ 179.035024] blkdev_ioctl+0x5cb/0x1a80 [ 179.038892] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.044265] ? blkpg_ioctl+0x9d0/0x9d0 [ 179.048237] ? mark_held_locks+0xf0/0xf0 [ 179.052290] ? mark_held_locks+0xf0/0xf0 [ 179.056344] ? debug_check_no_obj_freed+0x201/0x490 [ 179.061346] ? lock_downgrade+0x720/0x720 [ 179.065479] block_ioctl+0xe9/0x130 [ 179.069090] ? blkdev_fallocate+0x3f0/0x3f0 [ 179.073393] do_vfs_ioctl+0xcdb/0x12e0 [ 179.077270] ? lock_downgrade+0x720/0x720 [ 179.081411] ? check_preemption_disabled+0x41/0x280 [ 179.086408] ? ioctl_preallocate+0x200/0x200 [ 179.090796] ? __fget+0x356/0x510 [ 179.094245] ? do_dup2+0x450/0x450 [ 179.097880] ? do_sys_open+0x2bf/0x520 [ 179.101758] ksys_ioctl+0x9b/0xc0 [ 179.105199] __x64_sys_ioctl+0x6f/0xb0 [ 179.109074] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 179.113639] do_syscall_64+0xf9/0x620 [ 179.117431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.122609] RIP: 0033:0x4663b7 [ 179.125780] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 179.144660] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 179.152353] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 179.159601] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 179.166857] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 14:40:38 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:38 executing program 4: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) getpid() write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 179.174113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 179.181361] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 179.235613] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:40:38 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:38 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:38 executing program 4: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:38 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:38 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:38 executing program 4: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:38 executing program 0: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:38 executing program 5: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 179.413352] FAULT_INJECTION: forcing a failure. [ 179.413352] name failslab, interval 1, probability 0, space 0, times 0 [ 179.449825] CPU: 0 PID: 12837 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 179.457736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.467094] Call Trace: [ 179.469693] dump_stack+0x1fc/0x2ef [ 179.473320] should_fail.cold+0xa/0xf [ 179.477106] ? setup_fault_attr+0x200/0x200 [ 179.481480] ? lock_acquire+0x170/0x3c0 [ 179.485437] __should_failslab+0x115/0x180 [ 179.489654] should_failslab+0x5/0x10 [ 179.493693] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 179.498826] __kmalloc_node_track_caller+0x38/0x70 [ 179.504019] __alloc_skb+0xae/0x560 [ 179.507636] alloc_uevent_skb+0x7b/0x210 [ 179.511682] kobject_uevent_env+0xa90/0x1480 [ 179.516090] lo_ioctl+0xff9/0x20e0 [ 179.519618] ? loop_set_status64+0x110/0x110 [ 179.524014] blkdev_ioctl+0x5cb/0x1a80 [ 179.527883] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.533230] ? blkpg_ioctl+0x9d0/0x9d0 [ 179.537099] ? mark_held_locks+0xf0/0xf0 [ 179.541144] ? mark_held_locks+0xf0/0xf0 [ 179.545190] ? debug_check_no_obj_freed+0x201/0x490 [ 179.550187] ? lock_downgrade+0x720/0x720 [ 179.554334] block_ioctl+0xe9/0x130 [ 179.557952] ? blkdev_fallocate+0x3f0/0x3f0 [ 179.562310] do_vfs_ioctl+0xcdb/0x12e0 [ 179.566200] ? lock_downgrade+0x720/0x720 [ 179.570345] ? check_preemption_disabled+0x41/0x280 [ 179.575357] ? ioctl_preallocate+0x200/0x200 [ 179.579764] ? __fget+0x356/0x510 [ 179.583201] ? do_dup2+0x450/0x450 [ 179.586727] ? do_sys_open+0x2bf/0x520 [ 179.590602] ksys_ioctl+0x9b/0xc0 [ 179.594071] __x64_sys_ioctl+0x6f/0xb0 [ 179.597948] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 179.602531] do_syscall_64+0xf9/0x620 [ 179.606323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.611495] RIP: 0033:0x4663b7 [ 179.614667] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 179.633721] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 179.641470] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 179.648812] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 179.656062] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 14:40:38 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 179.663310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 179.670558] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 179.719912] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:40:38 executing program 4: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:38 executing program 0: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:38 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, 0x0, 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:38 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:38 executing program 4: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:38 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, 0x0, 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 179.900099] FAULT_INJECTION: forcing a failure. [ 179.900099] name failslab, interval 1, probability 0, space 0, times 0 [ 179.916333] CPU: 1 PID: 12869 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 179.924234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.933588] Call Trace: [ 179.936186] dump_stack+0x1fc/0x2ef [ 179.939825] should_fail.cold+0xa/0xf [ 179.943637] ? setup_fault_attr+0x200/0x200 14:40:38 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:38 executing program 0: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:38 executing program 4: gettid() r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 179.947971] ? lock_acquire+0x170/0x3c0 [ 179.952142] __should_failslab+0x115/0x180 [ 179.956391] should_failslab+0x5/0x10 [ 179.960197] kmem_cache_alloc+0x277/0x370 [ 179.964347] skb_clone+0x151/0x3d0 [ 179.967904] netlink_broadcast_filtered+0x8e5/0xbc0 [ 179.972940] netlink_broadcast+0x35/0x40 [ 179.977017] kobject_uevent_env+0xa56/0x1480 [ 179.981445] lo_ioctl+0xff9/0x20e0 [ 179.985002] ? loop_set_status64+0x110/0x110 [ 179.989418] blkdev_ioctl+0x5cb/0x1a80 [ 179.993315] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 14:40:38 executing program 5: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 179.998683] ? blkpg_ioctl+0x9d0/0x9d0 [ 180.002577] ? mark_held_locks+0xf0/0xf0 [ 180.006656] ? mark_held_locks+0xf0/0xf0 [ 180.010728] ? debug_check_no_obj_freed+0x201/0x490 [ 180.016271] ? lock_downgrade+0x720/0x720 [ 180.020420] block_ioctl+0xe9/0x130 [ 180.024046] ? blkdev_fallocate+0x3f0/0x3f0 [ 180.028364] do_vfs_ioctl+0xcdb/0x12e0 [ 180.032270] ? lock_downgrade+0x720/0x720 [ 180.036408] ? check_preemption_disabled+0x41/0x280 [ 180.041414] ? ioctl_preallocate+0x200/0x200 [ 180.045816] ? __fget+0x356/0x510 [ 180.049248] ? do_dup2+0x450/0x450 [ 180.052898] ? do_sys_open+0x2bf/0x520 [ 180.056774] ksys_ioctl+0x9b/0xc0 [ 180.060290] __x64_sys_ioctl+0x6f/0xb0 [ 180.064167] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 180.068823] do_syscall_64+0xf9/0x620 [ 180.072613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.077804] RIP: 0033:0x4663b7 [ 180.080991] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 180.099895] RSP: 002b:00007fe03889df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 180.107596] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 180.114861] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 180.122126] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 180.129389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 180.136652] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 180.158829] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:40:39 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:39 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:39 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, 0x0, 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:39 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:39 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:39 executing program 4: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 180.371140] FAULT_INJECTION: forcing a failure. [ 180.371140] name failslab, interval 1, probability 0, space 0, times 0 [ 180.397402] CPU: 1 PID: 12904 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 180.405318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.414681] Call Trace: [ 180.417279] dump_stack+0x1fc/0x2ef 14:40:39 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 180.420917] should_fail.cold+0xa/0xf [ 180.424730] ? setup_fault_attr+0x200/0x200 [ 180.429070] ? lock_acquire+0x170/0x3c0 [ 180.433057] __should_failslab+0x115/0x180 [ 180.437300] should_failslab+0x5/0x10 [ 180.441105] kmem_cache_alloc+0x277/0x370 [ 180.445258] getname_flags+0xce/0x590 [ 180.449240] do_mkdirat+0x8d/0x2d0 [ 180.452883] ? __ia32_sys_mknod+0x120/0x120 [ 180.457563] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 180.462938] ? trace_hardirqs_off_caller+0x6e/0x210 14:40:39 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, 0x0, 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 180.467963] ? do_syscall_64+0x21/0x620 [ 180.471959] do_syscall_64+0xf9/0x620 [ 180.475766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.480962] RIP: 0033:0x465707 [ 180.484156] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 180.503058] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 180.510773] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 14:40:39 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:39 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, 0x0, 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:39 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:39 executing program 4: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:39 executing program 5: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 180.518047] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 180.525320] RBP: 00007fe03889e040 R08: 0000000000000000 R09: ffffffffffffffff [ 180.532600] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 180.539879] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:39 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:39 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, 0x0, 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:39 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:39 executing program 4: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:39 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 180.776628] FAULT_INJECTION: forcing a failure. [ 180.776628] name failslab, interval 1, probability 0, space 0, times 0 14:40:39 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 180.830236] CPU: 1 PID: 12948 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 180.838146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.847509] Call Trace: [ 180.850112] dump_stack+0x1fc/0x2ef [ 180.853757] should_fail.cold+0xa/0xf [ 180.857571] ? setup_fault_attr+0x200/0x200 [ 180.861930] ? lock_acquire+0x170/0x3c0 [ 180.865930] __should_failslab+0x115/0x180 [ 180.870175] should_failslab+0x5/0x10 [ 180.873986] kmem_cache_alloc+0x277/0x370 [ 180.878150] getname_flags+0xce/0x590 [ 180.881960] do_mkdirat+0x8d/0x2d0 [ 180.885539] ? __ia32_sys_mknod+0x120/0x120 [ 180.889871] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 180.895245] ? trace_hardirqs_off_caller+0x6e/0x210 [ 180.900271] ? do_syscall_64+0x21/0x620 [ 180.904254] do_syscall_64+0xf9/0x620 [ 180.908070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.913261] RIP: 0033:0x465707 14:40:39 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 180.916459] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 180.935365] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 180.943088] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 180.950370] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 180.957738] RBP: 00007fe03889e040 R08: 0000000000000000 R09: ffffffffffffffff [ 180.965015] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 180.972294] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:39 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:39 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:39 executing program 5: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:39 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:39 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:39 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 181.134188] FAULT_INJECTION: forcing a failure. [ 181.134188] name failslab, interval 1, probability 0, space 0, times 0 [ 181.162824] CPU: 0 PID: 12976 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 181.170738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.180096] Call Trace: 14:40:40 executing program 3: getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 181.182698] dump_stack+0x1fc/0x2ef [ 181.186342] should_fail.cold+0xa/0xf [ 181.190340] ? setup_fault_attr+0x200/0x200 [ 181.194668] ? lock_acquire+0x170/0x3c0 [ 181.198657] __should_failslab+0x115/0x180 [ 181.202938] should_failslab+0x5/0x10 [ 181.206751] kmem_cache_alloc+0x277/0x370 [ 181.210912] getname_flags+0xce/0x590 [ 181.214726] do_mkdirat+0x8d/0x2d0 [ 181.218276] ? __ia32_sys_mknod+0x120/0x120 [ 181.222612] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 181.227993] ? trace_hardirqs_off_caller+0x6e/0x210 14:40:40 executing program 3: getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 181.233110] ? do_syscall_64+0x21/0x620 [ 181.237096] do_syscall_64+0xf9/0x620 [ 181.240909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.246099] RIP: 0033:0x465707 [ 181.249290] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 181.268199] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 181.275917] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 14:40:40 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 181.283280] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 181.290573] RBP: 00007fe03889e040 R08: 0000000000000000 R09: ffffffffffffffff [ 181.297858] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 181.305144] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:40 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:40 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:40 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:40 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, 0x0, 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 181.476601] FAULT_INJECTION: forcing a failure. [ 181.476601] name failslab, interval 1, probability 0, space 0, times 0 [ 181.523939] CPU: 0 PID: 13010 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 181.531853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.541212] Call Trace: [ 181.543844] dump_stack+0x1fc/0x2ef [ 181.547486] should_fail.cold+0xa/0xf [ 181.551318] ? setup_fault_attr+0x200/0x200 [ 181.555654] __should_failslab+0x115/0x180 [ 181.559896] should_failslab+0x5/0x10 [ 181.563787] kmem_cache_alloc+0x277/0x370 [ 181.567940] ? ext4_sync_fs+0x8d0/0x8d0 14:40:40 executing program 5: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) getpid() write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:40 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:40 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 181.571997] ext4_alloc_inode+0x1a/0x630 [ 181.576064] ? ext4_sync_fs+0x8d0/0x8d0 [ 181.580043] alloc_inode+0x5d/0x180 [ 181.583935] new_inode+0x1d/0xf0 [ 181.587314] __ext4_new_inode+0x400/0x5a20 [ 181.591562] ? putname+0xe1/0x120 [ 181.595027] ? do_mkdirat+0xa0/0x2d0 [ 181.598765] ? ext4_free_inode+0x1780/0x1780 [ 181.603180] ? debug_check_no_obj_freed+0x201/0x490 [ 181.608200] ? __dquot_initialize+0x298/0xb70 [ 181.612790] ? lock_acquire+0x170/0x3c0 [ 181.616773] ? dquot_initialize_needed+0x290/0x290 14:40:40 executing program 5: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 181.621729] ? trace_hardirqs_off+0x64/0x200 [ 181.626149] ? common_perm+0x4be/0x800 [ 181.630045] ext4_mkdir+0x396/0xe10 [ 181.633681] ? putname+0xe1/0x120 [ 181.637145] ? ext4_init_dot_dotdot+0x600/0x600 [ 181.641832] ? generic_permission+0x116/0x4d0 [ 181.646333] ? security_inode_permission+0xc5/0xf0 [ 181.651279] ? inode_permission.part.0+0x10c/0x450 [ 181.656220] vfs_mkdir+0x508/0x7a0 [ 181.660118] do_mkdirat+0x262/0x2d0 [ 181.663755] ? __ia32_sys_mknod+0x120/0x120 [ 181.668098] ? trace_hardirqs_off_caller+0x6e/0x210 14:40:40 executing program 5: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:40 executing program 5: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 181.673125] ? do_syscall_64+0x21/0x620 [ 181.677112] do_syscall_64+0xf9/0x620 [ 181.680918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.686104] RIP: 0033:0x465707 [ 181.689298] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 181.708639] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 181.716353] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 14:40:40 executing program 5: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 181.723633] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 181.732386] RBP: 00007fe03889e040 R08: 0000000000000000 R09: ffffffffffffffff [ 181.739659] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 181.746937] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:40 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:40 executing program 5: gettid() r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:40 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:40 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, 0x0, 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:40 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:40 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:40 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:40 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:40 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:40 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 182.066256] FAULT_INJECTION: forcing a failure. [ 182.066256] name failslab, interval 1, probability 0, space 0, times 0 14:40:40 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, 0x0, 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:40 executing program 5: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 182.150816] CPU: 0 PID: 13080 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 182.158816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.168178] Call Trace: [ 182.170780] dump_stack+0x1fc/0x2ef [ 182.174429] should_fail.cold+0xa/0xf [ 182.178270] ? setup_fault_attr+0x200/0x200 [ 182.182618] __should_failslab+0x115/0x180 [ 182.186869] should_failslab+0x5/0x10 [ 182.190679] kmem_cache_alloc+0x277/0x370 [ 182.194838] ? ext4_sync_fs+0x8d0/0x8d0 14:40:41 executing program 5: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 182.198825] ext4_alloc_inode+0x1a/0x630 [ 182.202898] ? ext4_sync_fs+0x8d0/0x8d0 [ 182.206888] alloc_inode+0x5d/0x180 [ 182.210539] new_inode+0x1d/0xf0 [ 182.213915] __ext4_new_inode+0x400/0x5a20 [ 182.218259] ? putname+0xe1/0x120 [ 182.221772] ? do_mkdirat+0xa0/0x2d0 [ 182.225504] ? ext4_free_inode+0x1780/0x1780 [ 182.229921] ? debug_check_no_obj_freed+0x201/0x490 [ 182.234947] ? __dquot_initialize+0x298/0xb70 [ 182.239898] ? lock_acquire+0x170/0x3c0 [ 182.243973] ? dquot_initialize_needed+0x290/0x290 14:40:41 executing program 5: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 182.248914] ? trace_hardirqs_off+0x64/0x200 [ 182.253340] ? common_perm+0x4be/0x800 [ 182.257241] ext4_mkdir+0x396/0xe10 [ 182.260883] ? putname+0xe1/0x120 [ 182.264350] ? ext4_init_dot_dotdot+0x600/0x600 [ 182.269033] ? generic_permission+0x116/0x4d0 [ 182.273537] ? security_inode_permission+0xc5/0xf0 [ 182.278483] ? inode_permission.part.0+0x10c/0x450 [ 182.283602] vfs_mkdir+0x508/0x7a0 [ 182.287421] do_mkdirat+0x262/0x2d0 [ 182.291062] ? __ia32_sys_mknod+0x120/0x120 [ 182.295483] ? trace_hardirqs_off_caller+0x6e/0x210 [ 182.300860] ? do_syscall_64+0x21/0x620 [ 182.304849] do_syscall_64+0xf9/0x620 [ 182.308760] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.313958] RIP: 0033:0x465707 [ 182.317155] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 182.336060] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 182.343866] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 182.351155] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 182.360341] RBP: 00007fe03889e040 R08: 0000000000000000 R09: ffffffffffffffff [ 182.367705] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 182.374981] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:41 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:41 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:41 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:41 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:41 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:41 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 182.538452] FAULT_INJECTION: forcing a failure. [ 182.538452] name failslab, interval 1, probability 0, space 0, times 0 14:40:41 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 182.605816] CPU: 0 PID: 13124 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 182.613738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.623097] Call Trace: [ 182.625701] dump_stack+0x1fc/0x2ef [ 182.629351] should_fail.cold+0xa/0xf [ 182.633171] ? setup_fault_attr+0x200/0x200 [ 182.637513] __should_failslab+0x115/0x180 [ 182.641769] should_failslab+0x5/0x10 [ 182.645580] kmem_cache_alloc+0x277/0x370 [ 182.649742] ? ext4_sync_fs+0x8d0/0x8d0 14:40:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 182.653741] ext4_alloc_inode+0x1a/0x630 [ 182.657823] ? ext4_sync_fs+0x8d0/0x8d0 [ 182.661808] alloc_inode+0x5d/0x180 [ 182.665441] new_inode+0x1d/0xf0 [ 182.668816] __ext4_new_inode+0x400/0x5a20 [ 182.673064] ? putname+0xe1/0x120 [ 182.676525] ? do_mkdirat+0xa0/0x2d0 [ 182.680268] ? ext4_free_inode+0x1780/0x1780 [ 182.684684] ? debug_check_no_obj_freed+0x201/0x490 [ 182.689719] ? __dquot_initialize+0x298/0xb70 [ 182.694226] ? lock_acquire+0x170/0x3c0 [ 182.698216] ? dquot_initialize_needed+0x290/0x290 [ 182.703157] ? trace_hardirqs_off+0x64/0x200 [ 182.707574] ? common_perm+0x4be/0x800 [ 182.711474] ext4_mkdir+0x396/0xe10 [ 182.715110] ? putname+0xe1/0x120 [ 182.718582] ? ext4_init_dot_dotdot+0x600/0x600 [ 182.723261] ? generic_permission+0x116/0x4d0 [ 182.727771] ? security_inode_permission+0xc5/0xf0 [ 182.732723] ? inode_permission.part.0+0x10c/0x450 [ 182.737670] vfs_mkdir+0x508/0x7a0 [ 182.741222] do_mkdirat+0x262/0x2d0 [ 182.744861] ? __ia32_sys_mknod+0x120/0x120 [ 182.749194] ? trace_hardirqs_off_caller+0x6e/0x210 14:40:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 182.754215] ? do_syscall_64+0x21/0x620 [ 182.758199] do_syscall_64+0xf9/0x620 [ 182.762016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.767208] RIP: 0033:0x465707 [ 182.770404] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 182.789312] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 182.797032] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 14:40:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 182.804305] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 182.811583] RBP: 00007fe03889e040 R08: 0000000000000000 R09: ffffffffffffffff [ 182.818858] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 182.826135] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:41 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:41 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:41 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:41 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:41 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:41 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 183.036797] FAULT_INJECTION: forcing a failure. [ 183.036797] name failslab, interval 1, probability 0, space 0, times 0 14:40:41 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:41 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 183.130860] CPU: 0 PID: 13171 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 183.138776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.148234] Call Trace: [ 183.150868] dump_stack+0x1fc/0x2ef [ 183.154513] should_fail.cold+0xa/0xf [ 183.158347] ? setup_fault_attr+0x200/0x200 [ 183.162684] ? lock_downgrade+0x720/0x720 [ 183.166859] __should_failslab+0x115/0x180 [ 183.171108] should_failslab+0x5/0x10 [ 183.174921] __kmalloc+0x2ab/0x3c0 14:40:42 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 183.178555] ? ext4_find_extent+0x9bb/0xc70 [ 183.182903] ext4_find_extent+0x9bb/0xc70 [ 183.187074] ext4_ext_map_blocks+0x1c0/0x7390 [ 183.191594] ? __lock_acquire+0x6de/0x3ff0 [ 183.195852] ? mark_held_locks+0xf0/0xf0 [ 183.200015] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 183.205394] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 183.210592] ? mark_held_locks+0xf0/0xf0 [ 183.214672] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 183.219539] ? ext4_es_lookup_extent+0x375/0xb60 [ 183.224311] ? ext4_map_blocks+0x59f/0x1a50 [ 183.228783] ? lock_acquire+0x170/0x3c0 [ 183.232774] ? ext4_map_blocks+0x740/0x1a50 [ 183.237116] ext4_map_blocks+0x7a2/0x1a50 [ 183.241284] ? check_preemption_disabled+0x41/0x280 [ 183.246406] ? ext4_issue_zeroout+0x160/0x160 [ 183.250914] ? __brelse+0x84/0xa0 [ 183.254382] ? __ext4_new_inode+0x2eb/0x5a20 [ 183.258931] ext4_getblk+0xad/0x4f0 [ 183.262577] ? ext4_iomap_begin+0xe00/0xe00 [ 183.266958] ? ext4_free_inode+0x1780/0x1780 [ 183.271385] ? debug_check_no_obj_freed+0x201/0x490 [ 183.276501] ? __dquot_initialize+0x298/0xb70 [ 183.281024] ext4_bread+0x7c/0x210 [ 183.284580] ? ext4_getblk+0x4f0/0x4f0 [ 183.288476] ? dquot_initialize_needed+0x290/0x290 [ 183.293418] ? trace_hardirqs_off+0x64/0x200 [ 183.297843] ext4_append+0x155/0x370 [ 183.301572] ext4_mkdir+0x5bd/0xe10 [ 183.305225] ? ext4_init_dot_dotdot+0x600/0x600 [ 183.310100] ? generic_permission+0x116/0x4d0 [ 183.314618] ? inode_permission.part.0+0x10c/0x450 [ 183.319567] vfs_mkdir+0x508/0x7a0 [ 183.323218] do_mkdirat+0x262/0x2d0 [ 183.326861] ? __ia32_sys_mknod+0x120/0x120 [ 183.331206] ? trace_hardirqs_off_caller+0x6e/0x210 [ 183.336243] ? do_syscall_64+0x21/0x620 [ 183.340264] do_syscall_64+0xf9/0x620 [ 183.344081] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.349278] RIP: 0033:0x465707 [ 183.352478] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 183.371399] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 183.379123] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 183.386497] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 183.393782] RBP: 00007fe03889e040 R08: 0000000000000000 R09: ffffffffffffffff [ 183.401058] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 183.408336] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:42 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:42 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, 0x0, 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:42 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:42 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:42 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:42 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, 0x0, 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 183.593741] FAULT_INJECTION: forcing a failure. [ 183.593741] name failslab, interval 1, probability 0, space 0, times 0 14:40:42 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:42 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:42 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, 0x0, 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 183.692788] CPU: 0 PID: 13220 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 183.700702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.710064] Call Trace: [ 183.712676] dump_stack+0x1fc/0x2ef [ 183.716374] should_fail.cold+0xa/0xf [ 183.720204] ? setup_fault_attr+0x200/0x200 [ 183.724719] ? lock_downgrade+0x720/0x720 [ 183.728887] ? check_preemption_disabled+0x41/0x280 [ 183.733926] __should_failslab+0x115/0x180 [ 183.738174] should_failslab+0x5/0x10 [ 183.741984] kmem_cache_alloc+0x277/0x370 [ 183.746145] ext4_mb_new_blocks+0x60a/0x4370 [ 183.750574] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 183.755642] ? ext4_cache_extents+0x68/0x2d0 [ 183.760059] ? ext4_find_extent+0x9bb/0xc70 [ 183.764404] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 183.769731] ? ext4_ext_search_right+0x2c7/0xb60 [ 183.774497] ? ext4_inode_to_goal_block+0x2d2/0x3e0 [ 183.779532] ext4_ext_map_blocks+0x2aa2/0x7390 [ 183.784138] ? __lock_acquire+0x6de/0x3ff0 [ 183.788392] ? mark_held_locks+0xf0/0xf0 [ 183.792464] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 183.797841] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 183.803045] ? mark_held_locks+0xf0/0xf0 [ 183.807118] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 183.812005] ? ext4_es_lookup_extent+0x375/0xb60 [ 183.816793] ? ext4_map_blocks+0x59f/0x1a50 [ 183.821143] ext4_map_blocks+0x7a2/0x1a50 [ 183.825313] ? check_preemption_disabled+0x41/0x280 [ 183.830345] ? ext4_issue_zeroout+0x160/0x160 [ 183.834854] ? __brelse+0x84/0xa0 [ 183.838319] ? __ext4_new_inode+0x2eb/0x5a20 [ 183.842750] ext4_getblk+0xad/0x4f0 [ 183.846394] ? ext4_iomap_begin+0xe00/0xe00 [ 183.850814] ? ext4_free_inode+0x1780/0x1780 [ 183.855233] ? debug_check_no_obj_freed+0x201/0x490 [ 183.860260] ? __dquot_initialize+0x298/0xb70 [ 183.864776] ext4_bread+0x7c/0x210 [ 183.868329] ? ext4_getblk+0x4f0/0x4f0 [ 183.872231] ? dquot_initialize_needed+0x290/0x290 [ 183.877172] ? trace_hardirqs_off+0x64/0x200 [ 183.881596] ext4_append+0x155/0x370 [ 183.885418] ext4_mkdir+0x5bd/0xe10 [ 183.889068] ? ext4_init_dot_dotdot+0x600/0x600 [ 183.893756] ? generic_permission+0x116/0x4d0 [ 183.898275] ? inode_permission.part.0+0x10c/0x450 [ 183.903259] vfs_mkdir+0x508/0x7a0 [ 183.906811] do_mkdirat+0x262/0x2d0 [ 183.910448] ? __ia32_sys_mknod+0x120/0x120 [ 183.914782] ? trace_hardirqs_off_caller+0x6e/0x210 [ 183.919813] ? do_syscall_64+0x21/0x620 [ 183.923919] do_syscall_64+0xf9/0x620 [ 183.927789] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.932986] RIP: 0033:0x465707 [ 183.936198] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 183.955421] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 183.963116] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 183.970544] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 183.977796] RBP: 00007fe03889e040 R08: 0000000000000000 R09: ffffffffffffffff [ 183.985104] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 183.992490] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:42 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:42 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:42 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:42 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:42 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 184.156203] FAULT_INJECTION: forcing a failure. [ 184.156203] name failslab, interval 1, probability 0, space 0, times 0 [ 184.183779] CPU: 1 PID: 13272 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 184.191704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.201066] Call Trace: [ 184.203671] dump_stack+0x1fc/0x2ef [ 184.207320] should_fail.cold+0xa/0xf [ 184.211138] ? setup_fault_attr+0x200/0x200 [ 184.215473] ? lock_downgrade+0x720/0x720 [ 184.219647] __should_failslab+0x115/0x180 [ 184.224166] should_failslab+0x5/0x10 [ 184.227989] __kmalloc+0x2ab/0x3c0 [ 184.231542] ? ext4_find_extent+0x9bb/0xc70 [ 184.236051] ext4_find_extent+0x9bb/0xc70 [ 184.240233] ext4_ext_map_blocks+0x1c0/0x7390 [ 184.244749] ? __lock_acquire+0x6de/0x3ff0 [ 184.249095] ? mark_held_locks+0xf0/0xf0 [ 184.253302] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 184.258681] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 184.263884] ? mark_held_locks+0xf0/0xf0 [ 184.268041] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 184.272932] ? ext4_es_lookup_extent+0x375/0xb60 [ 184.277708] ? ext4_map_blocks+0x59f/0x1a50 [ 184.282054] ? lock_acquire+0x170/0x3c0 [ 184.286099] ? ext4_map_blocks+0x740/0x1a50 [ 184.290438] ext4_map_blocks+0x7a2/0x1a50 [ 184.294602] ? check_preemption_disabled+0x41/0x280 [ 184.299688] ? ext4_issue_zeroout+0x160/0x160 14:40:43 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 184.304289] ? __brelse+0x84/0xa0 [ 184.307751] ? __ext4_new_inode+0x2eb/0x5a20 [ 184.312180] ext4_getblk+0xad/0x4f0 [ 184.315817] ? ext4_iomap_begin+0xe00/0xe00 [ 184.320166] ? ext4_free_inode+0x1780/0x1780 [ 184.324586] ? debug_check_no_obj_freed+0x201/0x490 [ 184.329695] ? __dquot_initialize+0x298/0xb70 [ 184.334216] ext4_bread+0x7c/0x210 [ 184.337771] ? ext4_getblk+0x4f0/0x4f0 [ 184.341675] ? dquot_initialize_needed+0x290/0x290 [ 184.346629] ? trace_hardirqs_off+0x64/0x200 [ 184.351059] ext4_append+0x155/0x370 14:40:43 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 184.354788] ext4_mkdir+0x5bd/0xe10 [ 184.358435] ? ext4_init_dot_dotdot+0x600/0x600 [ 184.363133] ? generic_permission+0x116/0x4d0 [ 184.367642] ? inode_permission.part.0+0x10c/0x450 [ 184.372582] vfs_mkdir+0x508/0x7a0 [ 184.376250] do_mkdirat+0x262/0x2d0 [ 184.379892] ? __ia32_sys_mknod+0x120/0x120 [ 184.384233] ? trace_hardirqs_off_caller+0x6e/0x210 [ 184.389257] ? do_syscall_64+0x21/0x620 [ 184.393244] do_syscall_64+0xf9/0x620 [ 184.397066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.402267] RIP: 0033:0x465707 14:40:43 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 184.405470] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 184.424381] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 184.432100] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 184.439384] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 184.446668] RBP: 00007fe03889e040 R08: 0000000000000000 R09: ffffffffffffffff 14:40:43 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:43 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 184.454214] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 184.461494] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:43 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:43 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:43 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:43 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:43 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 184.654199] FAULT_INJECTION: forcing a failure. [ 184.654199] name failslab, interval 1, probability 0, space 0, times 0 [ 184.704135] CPU: 0 PID: 13316 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 184.712053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.721418] Call Trace: [ 184.724021] dump_stack+0x1fc/0x2ef [ 184.727665] should_fail.cold+0xa/0xf [ 184.731488] ? setup_fault_attr+0x200/0x200 [ 184.735825] ? lock_acquire+0x170/0x3c0 [ 184.739823] __should_failslab+0x115/0x180 [ 184.744084] should_failslab+0x5/0x10 [ 184.747901] __kmalloc_track_caller+0x2a6/0x3c0 [ 184.752584] ? strndup_user+0x70/0x120 [ 184.756484] memdup_user+0x22/0xb0 [ 184.760037] strndup_user+0x70/0x120 [ 184.763785] ksys_mount+0x34/0x130 [ 184.767347] __x64_sys_mount+0xba/0x150 [ 184.771336] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 184.775937] do_syscall_64+0xf9/0x620 [ 184.779761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.784962] RIP: 0033:0x467b1a 14:40:43 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:43 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:43 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:43 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:43 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 184.788177] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 184.807109] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 184.814835] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 184.822125] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 [ 184.829408] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 [ 184.836687] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 184.844019] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:43 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:43 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:43 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:43 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:43 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 185.098280] FAULT_INJECTION: forcing a failure. [ 185.098280] name failslab, interval 1, probability 0, space 0, times 0 14:40:43 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c4602000000"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:43 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 185.183740] CPU: 0 PID: 13362 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 185.191655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.201021] Call Trace: [ 185.203627] dump_stack+0x1fc/0x2ef [ 185.207277] should_fail.cold+0xa/0xf [ 185.211093] ? setup_fault_attr+0x200/0x200 [ 185.215431] ? lock_acquire+0x170/0x3c0 [ 185.219426] __should_failslab+0x115/0x180 [ 185.223677] should_failslab+0x5/0x10 [ 185.227494] __kmalloc_track_caller+0x2a6/0x3c0 [ 185.232176] ? strndup_user+0x70/0x120 [ 185.236083] memdup_user+0x22/0xb0 [ 185.239642] strndup_user+0x70/0x120 [ 185.243376] ksys_mount+0x34/0x130 [ 185.246934] __x64_sys_mount+0xba/0x150 [ 185.250927] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 185.255520] do_syscall_64+0xf9/0x620 [ 185.259338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.264533] RIP: 0033:0x467b1a 14:40:44 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:44 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:44 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 185.267772] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 185.286683] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 185.294408] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 185.301694] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 [ 185.308981] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 [ 185.316265] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 185.323554] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:44 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:44 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:44 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:44 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:44 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 185.548214] FAULT_INJECTION: forcing a failure. [ 185.548214] name failslab, interval 1, probability 0, space 0, times 0 [ 185.579449] CPU: 1 PID: 13411 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 185.587363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:40:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:40:44 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 185.596729] Call Trace: [ 185.599336] dump_stack+0x1fc/0x2ef [ 185.602984] should_fail.cold+0xa/0xf [ 185.606808] ? setup_fault_attr+0x200/0x200 [ 185.611150] ? lock_acquire+0x170/0x3c0 [ 185.615145] __should_failslab+0x115/0x180 [ 185.619391] should_failslab+0x5/0x10 [ 185.623202] __kmalloc_track_caller+0x2a6/0x3c0 [ 185.627885] ? strndup_user+0x70/0x120 [ 185.631783] ? _copy_from_user+0xd2/0x130 [ 185.635951] memdup_user+0x22/0xb0 [ 185.639504] strndup_user+0x70/0x120 [ 185.643228] ksys_mount+0x6f/0x130 [ 185.646787] __x64_sys_mount+0xba/0x150 [ 185.650781] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 185.655377] do_syscall_64+0xf9/0x620 [ 185.659198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.664394] RIP: 0033:0x467b1a [ 185.667599] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 185.686515] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 14:40:44 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:44 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 185.694236] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 185.701515] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 [ 185.708927] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 [ 185.716204] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 185.723487] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 14:40:44 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:44 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:44 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:44 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:44 executing program 3: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:44 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:44 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 185.989968] FAULT_INJECTION: forcing a failure. [ 185.989968] name failslab, interval 1, probability 0, space 0, times 0 14:40:44 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c4602000000"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 186.065216] CPU: 0 PID: 13454 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 186.073133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.082521] Call Trace: [ 186.085137] dump_stack+0x1fc/0x2ef [ 186.088782] should_fail.cold+0xa/0xf [ 186.092600] ? setup_fault_attr+0x200/0x200 [ 186.096936] ? lock_acquire+0x170/0x3c0 [ 186.100934] __should_failslab+0x115/0x180 [ 186.105274] should_failslab+0x5/0x10 [ 186.109086] __kmalloc_track_caller+0x2a6/0x3c0 [ 186.113769] ? strndup_user+0x70/0x120 [ 186.117671] ? _copy_from_user+0xd2/0x130 [ 186.121837] memdup_user+0x22/0xb0 [ 186.125501] strndup_user+0x70/0x120 [ 186.129228] ksys_mount+0x6f/0x130 [ 186.132801] __x64_sys_mount+0xba/0x150 [ 186.136828] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 186.141421] do_syscall_64+0xf9/0x620 [ 186.145241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.151087] RIP: 0033:0x467b1a [ 186.154290] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 186.173203] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 186.180927] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 186.188209] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 [ 186.195493] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 [ 186.202778] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 14:40:44 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c4602000000"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:44 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:45 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:45 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:45 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c4602"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 186.210058] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:45 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:45 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:45 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 186.397316] FAULT_INJECTION: forcing a failure. [ 186.397316] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 186.409276] CPU: 0 PID: 13496 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 186.417256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.426623] Call Trace: [ 186.429230] dump_stack+0x1fc/0x2ef [ 186.432876] should_fail.cold+0xa/0xf [ 186.436698] ? setup_fault_attr+0x200/0x200 [ 186.441037] ? unwind_next_frame+0xeee/0x1400 [ 186.445544] ? __save_stack_trace+0x72/0x190 [ 186.449973] ? deref_stack_reg+0x134/0x1d0 [ 186.454223] ? get_reg+0x176/0x1f0 [ 186.457780] __alloc_pages_nodemask+0x239/0x2890 [ 186.462558] ? cmp_ex_search+0x87/0xb0 [ 186.466469] ? __lock_acquire+0x6de/0x3ff0 [ 186.470725] ? copy_mount_options+0x1e9/0x380 [ 186.475242] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 186.480095] ? ex_handler_default+0x14/0x90 [ 186.484426] ? phys_mem_access_encrypted+0x10/0x10 [ 186.489374] ? no_context+0xce/0x940 [ 186.493229] ? force_sig_info_fault.constprop.0+0x320/0x320 [ 186.498953] ? bad_area_access_error+0x23b/0x4a0 [ 186.503738] cache_grow_begin+0xa4/0x8a0 [ 186.507829] ? setup_fault_attr+0x200/0x200 [ 186.512164] ? lock_acquire+0x170/0x3c0 [ 186.516159] cache_alloc_refill+0x273/0x340 [ 186.520495] kmem_cache_alloc+0x346/0x370 [ 186.524652] getname_flags+0xce/0x590 [ 186.528477] user_path_at_empty+0x2a/0x50 [ 186.532640] do_mount+0x147/0x2f50 [ 186.536197] ? cmp_ex_sort+0xc0/0xc0 [ 186.539976] ? __do_page_fault+0x180/0xd60 [ 186.544228] ? copy_mount_string+0x40/0x40 [ 186.548484] ? memset+0x20/0x40 [ 186.551778] ? copy_mount_options+0x26f/0x380 [ 186.556289] ksys_mount+0xcf/0x130 [ 186.559848] __x64_sys_mount+0xba/0x150 [ 186.563827] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 186.568519] do_syscall_64+0xf9/0x620 [ 186.572346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.577572] RIP: 0033:0x467b1a [ 186.580750] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 186.600042] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 186.607745] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 186.615005] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 [ 186.622270] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 [ 186.629578] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 186.636851] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:45 executing program 3: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:45 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:45 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:45 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:45 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 186.652095] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:40:45 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:45 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:45 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:45 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 186.812869] FAULT_INJECTION: forcing a failure. [ 186.812869] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 186.824707] CPU: 0 PID: 13530 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 186.832599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.841966] Call Trace: [ 186.844572] dump_stack+0x1fc/0x2ef [ 186.848226] should_fail.cold+0xa/0xf [ 186.852049] ? setup_fault_attr+0x200/0x200 [ 186.856479] ? unwind_next_frame+0xeee/0x1400 [ 186.860990] ? __save_stack_trace+0x72/0x190 [ 186.865413] ? deref_stack_reg+0x134/0x1d0 [ 186.869667] ? get_reg+0x176/0x1f0 [ 186.873228] __alloc_pages_nodemask+0x239/0x2890 [ 186.877999] ? cmp_ex_search+0x87/0xb0 [ 186.881907] ? __lock_acquire+0x6de/0x3ff0 [ 186.886161] ? copy_mount_options+0x1e9/0x380 [ 186.890674] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 186.895536] ? ex_handler_default+0x14/0x90 [ 186.899870] ? phys_mem_access_encrypted+0x10/0x10 [ 186.905341] ? no_context+0xce/0x940 [ 186.909074] ? force_sig_info_fault.constprop.0+0x320/0x320 [ 186.914798] ? bad_area_access_error+0x23b/0x4a0 [ 186.919581] cache_grow_begin+0xa4/0x8a0 [ 186.923657] ? setup_fault_attr+0x200/0x200 [ 186.927993] ? lock_acquire+0x170/0x3c0 [ 186.931985] cache_alloc_refill+0x273/0x340 [ 186.936322] kmem_cache_alloc+0x346/0x370 [ 186.940504] getname_flags+0xce/0x590 [ 186.944317] user_path_at_empty+0x2a/0x50 [ 186.948486] do_mount+0x147/0x2f50 [ 186.952043] ? cmp_ex_sort+0xc0/0xc0 [ 186.955851] ? __do_page_fault+0x180/0xd60 [ 186.960102] ? copy_mount_string+0x40/0x40 [ 186.964386] ? memset+0x20/0x40 [ 186.967676] ? copy_mount_options+0x26f/0x380 [ 186.972185] ksys_mount+0xcf/0x130 [ 186.975744] __x64_sys_mount+0xba/0x150 [ 186.979737] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 186.984345] do_syscall_64+0xf9/0x620 [ 186.988169] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.993364] RIP: 0033:0x467b1a 14:40:45 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c4602"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:45 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:45 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c4602"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 186.996564] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 187.015477] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 187.023202] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 187.030481] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 [ 187.037759] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 [ 187.045041] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 187.052323] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:45 executing program 3: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:45 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:45 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 187.061782] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:40:45 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:45 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 187.205491] FAULT_INJECTION: forcing a failure. [ 187.205491] name failslab, interval 1, probability 0, space 0, times 0 [ 187.242936] CPU: 0 PID: 13572 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 187.250853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.260218] Call Trace: [ 187.262826] dump_stack+0x1fc/0x2ef [ 187.266473] should_fail.cold+0xa/0xf [ 187.270294] ? setup_fault_attr+0x200/0x200 [ 187.274715] ? lock_acquire+0x170/0x3c0 [ 187.279201] __should_failslab+0x115/0x180 [ 187.283452] should_failslab+0x5/0x10 [ 187.287263] __kmalloc_track_caller+0x2a6/0x3c0 [ 187.291958] ? kstrdup_const+0x53/0x80 [ 187.295864] kstrdup+0x36/0x70 [ 187.299080] kstrdup_const+0x53/0x80 [ 187.302893] alloc_vfsmnt+0xb5/0x780 [ 187.306718] ? _raw_read_unlock+0x29/0x40 [ 187.310879] vfs_kern_mount.part.0+0x27/0x470 [ 187.315401] do_mount+0x115c/0x2f50 [ 187.319044] ? cmp_ex_sort+0xc0/0xc0 [ 187.322769] ? __do_page_fault+0x180/0xd60 [ 187.327019] ? copy_mount_string+0x40/0x40 [ 187.331274] ? memset+0x20/0x40 [ 187.334571] ? copy_mount_options+0x26f/0x380 [ 187.339087] ksys_mount+0xcf/0x130 [ 187.342646] __x64_sys_mount+0xba/0x150 [ 187.346627] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 187.351218] do_syscall_64+0xf9/0x620 [ 187.355215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.360406] RIP: 0033:0x467b1a [ 187.363607] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 187.382606] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 187.390500] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 187.397780] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 14:40:46 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 3: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 187.405061] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 [ 187.412343] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 187.419674] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:46 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c4602000000"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:46 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 187.700627] FAULT_INJECTION: forcing a failure. [ 187.700627] name failslab, interval 1, probability 0, space 0, times 0 14:40:46 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 187.755017] CPU: 1 PID: 13624 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 187.762928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.772288] Call Trace: [ 187.774895] dump_stack+0x1fc/0x2ef [ 187.778538] should_fail.cold+0xa/0xf [ 187.782357] ? setup_fault_attr+0x200/0x200 [ 187.786780] ? lock_acquire+0x170/0x3c0 [ 187.791125] __should_failslab+0x115/0x180 [ 187.795378] should_failslab+0x5/0x10 [ 187.799191] __kmalloc_track_caller+0x2a6/0x3c0 [ 187.804147] ? kstrdup_const+0x53/0x80 [ 187.808045] kstrdup+0x36/0x70 [ 187.811252] kstrdup_const+0x53/0x80 [ 187.814976] alloc_vfsmnt+0xb5/0x780 [ 187.818702] ? _raw_read_unlock+0x29/0x40 [ 187.822860] vfs_kern_mount.part.0+0x27/0x470 [ 187.827800] do_mount+0x115c/0x2f50 [ 187.831439] ? cmp_ex_sort+0xc0/0xc0 [ 187.835336] ? __do_page_fault+0x180/0xd60 [ 187.839585] ? copy_mount_string+0x40/0x40 [ 187.843846] ? memset+0x20/0x40 [ 187.847142] ? copy_mount_options+0x26f/0x380 [ 187.851660] ksys_mount+0xcf/0x130 [ 187.855221] __x64_sys_mount+0xba/0x150 [ 187.859214] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 187.863803] do_syscall_64+0xf9/0x620 [ 187.867624] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.872822] RIP: 0033:0x467b1a [ 187.876022] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 187.894932] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 187.902659] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 187.909943] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 [ 187.917226] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 [ 187.924515] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 187.931797] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:46 executing program 3: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:46 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:46 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:47 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 188.161034] FAULT_INJECTION: forcing a failure. [ 188.161034] name failslab, interval 1, probability 0, space 0, times 0 [ 188.209767] CPU: 1 PID: 13672 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 188.217682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.227132] Call Trace: [ 188.229743] dump_stack+0x1fc/0x2ef [ 188.233386] should_fail.cold+0xa/0xf [ 188.237206] ? setup_fault_attr+0x200/0x200 [ 188.241649] ? lock_acquire+0x170/0x3c0 [ 188.245650] __should_failslab+0x115/0x180 [ 188.249909] should_failslab+0x5/0x10 [ 188.253725] __kmalloc+0x2ab/0x3c0 [ 188.257280] ? prealloc_shrinker+0x15d/0x340 [ 188.261703] prealloc_shrinker+0x15d/0x340 [ 188.265954] sget_userns+0x7b4/0xcd0 [ 188.269679] ? set_bdev_super+0x110/0x110 [ 188.273890] ? ns_test_super+0x50/0x50 [ 188.277798] ? set_bdev_super+0x110/0x110 [ 188.281963] ? ns_test_super+0x50/0x50 [ 188.285878] sget+0x102/0x140 [ 188.288996] mount_bdev+0xf8/0x3b0 [ 188.292612] ? squashfs_alloc_inode+0x40/0x40 [ 188.297123] mount_fs+0xa3/0x310 [ 188.300704] vfs_kern_mount.part.0+0x68/0x470 [ 188.305219] do_mount+0x115c/0x2f50 [ 188.308875] ? cmp_ex_sort+0xc0/0xc0 [ 188.312605] ? __do_page_fault+0x180/0xd60 [ 188.316858] ? copy_mount_string+0x40/0x40 [ 188.321115] ? memset+0x20/0x40 [ 188.324494] ? copy_mount_options+0x26f/0x380 [ 188.329027] ksys_mount+0xcf/0x130 [ 188.332582] __x64_sys_mount+0xba/0x150 [ 188.336572] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 188.341175] do_syscall_64+0xf9/0x620 [ 188.344989] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.350186] RIP: 0033:0x467b1a [ 188.353385] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 188.372294] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 188.380017] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 188.387306] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 [ 188.394781] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 [ 188.402074] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 14:40:47 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 188.409354] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:47 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1100) 14:40:47 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c4602"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:47 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:47 executing program 3: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:47 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:47 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:47 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:47 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:47 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:47 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1100) [ 188.669958] FAULT_INJECTION: forcing a failure. [ 188.669958] name failslab, interval 1, probability 0, space 0, times 0 [ 188.709842] CPU: 0 PID: 13720 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 188.717749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.727109] Call Trace: [ 188.729711] dump_stack+0x1fc/0x2ef [ 188.733355] should_fail.cold+0xa/0xf [ 188.737171] ? setup_fault_attr+0x200/0x200 [ 188.741507] ? lock_acquire+0x170/0x3c0 [ 188.745502] __should_failslab+0x115/0x180 [ 188.749751] should_failslab+0x5/0x10 [ 188.753562] kmem_cache_alloc+0x277/0x370 [ 188.757732] getname_kernel+0x4e/0x370 [ 188.761632] kern_path+0x1b/0x40 [ 188.765006] lookup_bdev+0xfc/0x220 14:40:47 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 188.768643] ? bd_acquire+0x440/0x440 [ 188.772458] blkdev_get_by_path+0x1b/0xd0 [ 188.776612] mount_bdev+0x5b/0x3b0 [ 188.780162] ? squashfs_alloc_inode+0x40/0x40 [ 188.784670] mount_fs+0xa3/0x310 [ 188.788054] vfs_kern_mount.part.0+0x68/0x470 [ 188.792562] do_mount+0x115c/0x2f50 [ 188.796198] ? cmp_ex_sort+0xc0/0xc0 [ 188.799919] ? __do_page_fault+0x180/0xd60 [ 188.804166] ? copy_mount_string+0x40/0x40 [ 188.808422] ? memset+0x20/0x40 [ 188.811719] ? copy_mount_options+0x26f/0x380 [ 188.816222] ksys_mount+0xcf/0x130 14:40:47 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1100) [ 188.819796] __x64_sys_mount+0xba/0x150 [ 188.823781] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 188.828373] do_syscall_64+0xf9/0x620 [ 188.832191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.837470] RIP: 0033:0x467b1a [ 188.840669] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 188.859623] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 14:40:47 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:47 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 188.867553] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 188.874833] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 [ 188.882112] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 [ 188.889389] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 188.896672] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:47 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x0) 14:40:47 executing program 3: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:47 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:47 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:47 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:47 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1100) 14:40:47 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1100) 14:40:47 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x0) 14:40:48 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:48 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1100) 14:40:48 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1100) [ 189.189072] FAULT_INJECTION: forcing a failure. [ 189.189072] name failslab, interval 1, probability 0, space 0, times 0 14:40:48 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x0) [ 189.243221] CPU: 0 PID: 13772 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 189.251489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.260939] Call Trace: [ 189.263544] dump_stack+0x1fc/0x2ef [ 189.267187] should_fail.cold+0xa/0xf [ 189.271006] ? setup_fault_attr+0x200/0x200 [ 189.275337] ? lock_acquire+0x170/0x3c0 [ 189.279326] __should_failslab+0x115/0x180 [ 189.283656] should_failslab+0x5/0x10 [ 189.287460] kmem_cache_alloc_trace+0x284/0x380 14:40:48 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1100) [ 189.292134] ? set_bdev_super+0x110/0x110 [ 189.296289] ? ns_test_super+0x50/0x50 [ 189.300187] sget_userns+0x122/0xcd0 [ 189.303910] ? set_bdev_super+0x110/0x110 [ 189.308072] ? ns_test_super+0x50/0x50 [ 189.311965] ? set_bdev_super+0x110/0x110 [ 189.316127] ? ns_test_super+0x50/0x50 [ 189.320023] sget+0x102/0x140 [ 189.323137] mount_bdev+0xf8/0x3b0 [ 189.326778] ? squashfs_alloc_inode+0x40/0x40 [ 189.331286] mount_fs+0xa3/0x310 [ 189.334698] vfs_kern_mount.part.0+0x68/0x470 [ 189.339212] do_mount+0x115c/0x2f50 14:40:48 executing program 3: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:48 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 189.342849] ? cmp_ex_sort+0xc0/0xc0 [ 189.346566] ? __do_page_fault+0x180/0xd60 [ 189.350856] ? copy_mount_string+0x40/0x40 [ 189.355109] ? memset+0x20/0x40 [ 189.358399] ? copy_mount_options+0x26f/0x380 [ 189.362999] ksys_mount+0xcf/0x130 [ 189.366564] __x64_sys_mount+0xba/0x150 [ 189.370552] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 189.375144] do_syscall_64+0xf9/0x620 [ 189.378958] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.384150] RIP: 0033:0x467b1a [ 189.387352] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 189.406262] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 189.413981] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 189.421345] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 [ 189.428710] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 [ 189.435986] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 189.443263] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:48 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:48 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x0) 14:40:48 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1100) 14:40:48 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:48 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:48 executing program 3: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:48 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x0) 14:40:48 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x0) [ 189.632744] FAULT_INJECTION: forcing a failure. [ 189.632744] name failslab, interval 1, probability 0, space 0, times 0 14:40:48 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 189.691337] CPU: 0 PID: 13812 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 189.699247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.708609] Call Trace: [ 189.711212] dump_stack+0x1fc/0x2ef [ 189.714879] should_fail.cold+0xa/0xf [ 189.718695] ? setup_fault_attr+0x200/0x200 [ 189.723025] ? lock_acquire+0x170/0x3c0 [ 189.727016] __should_failslab+0x115/0x180 [ 189.731262] should_failslab+0x5/0x10 [ 189.735068] kmem_cache_alloc_trace+0x284/0x380 14:40:48 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x0) 14:40:48 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 189.739777] ? set_bdev_super+0x110/0x110 [ 189.743932] ? ns_test_super+0x50/0x50 [ 189.748003] sget_userns+0x122/0xcd0 [ 189.751730] ? set_bdev_super+0x110/0x110 [ 189.755898] ? ns_test_super+0x50/0x50 [ 189.759799] ? set_bdev_super+0x110/0x110 [ 189.763957] ? ns_test_super+0x50/0x50 [ 189.767880] sget+0x102/0x140 [ 189.770996] mount_bdev+0xf8/0x3b0 [ 189.774549] ? squashfs_alloc_inode+0x40/0x40 [ 189.779087] mount_fs+0xa3/0x310 [ 189.782469] vfs_kern_mount.part.0+0x68/0x470 [ 189.786979] do_mount+0x115c/0x2f50 [ 189.790637] ? cmp_ex_sort+0xc0/0xc0 [ 189.794368] ? __do_page_fault+0x180/0xd60 [ 189.798615] ? copy_mount_string+0x40/0x40 [ 189.802876] ? memset+0x20/0x40 [ 189.806163] ? copy_mount_options+0x26f/0x380 [ 189.810667] ksys_mount+0xcf/0x130 [ 189.814219] __x64_sys_mount+0xba/0x150 [ 189.818206] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 189.822797] do_syscall_64+0xf9/0x620 [ 189.826615] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.831809] RIP: 0033:0x467b1a 14:40:48 executing program 0: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 189.835008] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 189.853916] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 189.861648] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 189.869101] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 [ 189.876380] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 [ 189.883650] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 189.890935] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:48 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:48 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:48 executing program 3: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:48 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) 14:40:48 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x0) 14:40:48 executing program 0: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 190.125446] FAULT_INJECTION: forcing a failure. [ 190.125446] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 190.137390] CPU: 1 PID: 13866 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 190.145349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.155146] Call Trace: [ 190.157765] dump_stack+0x1fc/0x2ef [ 190.161403] should_fail.cold+0xa/0xf [ 190.165223] ? setup_fault_attr+0x200/0x200 [ 190.169562] ? get_page_from_freelist+0x1d60/0x4170 [ 190.174592] ? bad_range+0x260/0x3c0 [ 190.178329] __alloc_pages_nodemask+0x239/0x2890 [ 190.183098] ? kernel_poison_pages+0x2c/0x2a0 [ 190.187604] ? get_page_from_freelist+0x1d01/0x4170 [ 190.192633] ? preempt_count_add+0xaf/0x190 [ 190.196964] ? __lock_acquire+0x6de/0x3ff0 [ 190.201211] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 190.206061] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.211437] ? should_fail+0x142/0x7b0 [ 190.215335] ? lock_acquire+0x170/0x3c0 [ 190.219322] ? check_preemption_disabled+0x41/0x280 14:40:48 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x0) [ 190.224360] cache_grow_begin+0xa4/0x8a0 [ 190.228437] ? setup_fault_attr+0x200/0x200 [ 190.232773] ? lock_acquire+0x170/0x3c0 [ 190.236852] cache_alloc_refill+0x273/0x340 [ 190.241193] kmem_cache_alloc+0x346/0x370 [ 190.245356] getname_kernel+0x4e/0x370 [ 190.249256] kern_path+0x1b/0x40 [ 190.252638] lookup_bdev+0xfc/0x220 [ 190.256281] ? bd_acquire+0x440/0x440 [ 190.260101] blkdev_get_by_path+0x1b/0xd0 [ 190.264258] mount_bdev+0x5b/0x3b0 [ 190.267823] ? squashfs_alloc_inode+0x40/0x40 [ 190.272335] mount_fs+0xa3/0x310 [ 190.275715] vfs_kern_mount.part.0+0x68/0x470 [ 190.280227] do_mount+0x115c/0x2f50 [ 190.283873] ? cmp_ex_sort+0xc0/0xc0 [ 190.287616] ? __do_page_fault+0x180/0xd60 [ 190.291886] ? copy_mount_string+0x40/0x40 [ 190.296144] ? memset+0x20/0x40 [ 190.299463] ? copy_mount_options+0x26f/0x380 [ 190.303969] ksys_mount+0xcf/0x130 [ 190.307518] __x64_sys_mount+0xba/0x150 [ 190.311504] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 190.316093] do_syscall_64+0xf9/0x620 [ 190.319901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.325091] RIP: 0033:0x467b1a [ 190.328296] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 190.347323] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 190.355039] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 190.362319] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 14:40:49 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:49 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:49 executing program 3: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:49 executing program 4: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 190.369595] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 [ 190.376877] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 190.384155] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 [ 190.397918] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:40:49 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:49 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 190.526882] FAULT_INJECTION: forcing a failure. [ 190.526882] name failslab, interval 1, probability 0, space 0, times 0 [ 190.544790] CPU: 0 PID: 13900 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 190.552692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.562048] Call Trace: [ 190.564648] dump_stack+0x1fc/0x2ef [ 190.568291] should_fail.cold+0xa/0xf [ 190.572103] ? setup_fault_attr+0x200/0x200 [ 190.576433] ? lock_acquire+0x170/0x3c0 [ 190.580422] __should_failslab+0x115/0x180 [ 190.584665] should_failslab+0x5/0x10 [ 190.588478] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 190.593596] __kmalloc_node+0x38/0x70 [ 190.597408] kvmalloc_node+0x61/0xf0 [ 190.601133] __list_lru_init+0x4c6/0x7f0 [ 190.605306] ? up_read+0x53/0x110 [ 190.608777] sget_userns+0x7e2/0xcd0 [ 190.612496] ? set_bdev_super+0x110/0x110 [ 190.616652] ? ns_test_super+0x50/0x50 [ 190.620547] ? set_bdev_super+0x110/0x110 [ 190.624701] ? ns_test_super+0x50/0x50 [ 190.628635] sget+0x102/0x140 [ 190.631748] mount_bdev+0xf8/0x3b0 [ 190.635299] ? squashfs_alloc_inode+0x40/0x40 [ 190.639805] mount_fs+0xa3/0x310 [ 190.643192] vfs_kern_mount.part.0+0x68/0x470 [ 190.647704] do_mount+0x115c/0x2f50 [ 190.651340] ? cmp_ex_sort+0xc0/0xc0 [ 190.655056] ? __do_page_fault+0x180/0xd60 [ 190.659299] ? copy_mount_string+0x40/0x40 [ 190.663550] ? memset+0x20/0x40 [ 190.666842] ? copy_mount_options+0x26f/0x380 [ 190.671347] ksys_mount+0xcf/0x130 [ 190.675067] __x64_sys_mount+0xba/0x150 [ 190.679054] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 190.683656] do_syscall_64+0xf9/0x620 [ 190.687472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.692672] RIP: 0033:0x467b1a [ 190.695867] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 190.714770] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 14:40:49 executing program 0: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:49 executing program 3: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:49 executing program 4: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) 14:40:49 executing program 0: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:49 executing program 2: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) 14:40:49 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 190.722490] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 190.729763] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 [ 190.737045] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 [ 190.744408] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 190.751679] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:49 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:49 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1100) 14:40:49 executing program 0: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 190.918045] FAULT_INJECTION: forcing a failure. [ 190.918045] name failslab, interval 1, probability 0, space 0, times 0 [ 190.959458] CPU: 0 PID: 13940 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 190.967710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.977065] Call Trace: [ 190.979667] dump_stack+0x1fc/0x2ef [ 190.983306] should_fail.cold+0xa/0xf [ 190.987118] ? setup_fault_attr+0x200/0x200 [ 190.991454] ? lock_acquire+0x170/0x3c0 [ 190.995441] __should_failslab+0x115/0x180 [ 190.999682] should_failslab+0x5/0x10 [ 191.003503] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 191.008615] __kmalloc_node+0x38/0x70 [ 191.012427] kvmalloc_node+0x61/0xf0 [ 191.016156] __list_lru_init+0x4c6/0x7f0 [ 191.020220] ? up_read+0x53/0x110 [ 191.023683] sget_userns+0x7e2/0xcd0 [ 191.027400] ? set_bdev_super+0x110/0x110 [ 191.031555] ? ns_test_super+0x50/0x50 [ 191.035457] ? set_bdev_super+0x110/0x110 [ 191.039613] ? ns_test_super+0x50/0x50 [ 191.043506] sget+0x102/0x140 [ 191.046625] mount_bdev+0xf8/0x3b0 [ 191.050172] ? squashfs_alloc_inode+0x40/0x40 [ 191.054674] mount_fs+0xa3/0x310 [ 191.058048] vfs_kern_mount.part.0+0x68/0x470 [ 191.062560] do_mount+0x115c/0x2f50 [ 191.066195] ? cmp_ex_sort+0xc0/0xc0 [ 191.069914] ? __do_page_fault+0x180/0xd60 [ 191.074161] ? copy_mount_string+0x40/0x40 [ 191.078408] ? memset+0x20/0x40 [ 191.081697] ? copy_mount_options+0x26f/0x380 [ 191.086204] ksys_mount+0xcf/0x130 [ 191.089755] __x64_sys_mount+0xba/0x150 [ 191.093739] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 191.098324] do_syscall_64+0xf9/0x620 [ 191.102142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.107338] RIP: 0033:0x467b1a [ 191.110538] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 191.129454] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 191.137168] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 191.144709] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 [ 191.151983] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 14:40:49 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1100) 14:40:49 executing program 3: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:49 executing program 3: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) getpid() write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:50 executing program 3: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 191.159258] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 191.166534] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 14:40:50 executing program 3: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:50 executing program 4: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:50 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1100) 14:40:50 executing program 2 (fault-call:2 fault-nth:0): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:50 executing program 3: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:50 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x0) 14:40:50 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:50 executing program 0: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:50 executing program 4: r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xe61, 0x6a0240) ptrace$setopts(0x4206, r0, 0xfffffffffffffeff, 0x3a) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x9c, 0x4, 0xd8, 0x0, 0x4, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000001c0), 0xf}, 0x800, 0x1, 0x3, 0x4, 0xffff, 0xac3, 0x8, 0x0, 0x9, 0x0, 0x80}, r2, 0x1, r3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x400000e, 0x4000010, 0xffffffffffffffff, 0xf6bd5000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) read$FUSE(r4, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, r5, {0x2}}, 0x18) 14:40:50 executing program 3: gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:50 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x0) [ 191.512581] FAULT_INJECTION: forcing a failure. [ 191.512581] name failslab, interval 1, probability 0, space 0, times 0 [ 191.529483] FAULT_INJECTION: forcing a failure. [ 191.529483] name failslab, interval 1, probability 0, space 0, times 0 [ 191.559152] CPU: 0 PID: 14012 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 191.567063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.576418] Call Trace: [ 191.579022] dump_stack+0x1fc/0x2ef [ 191.582672] should_fail.cold+0xa/0xf [ 191.586481] ? setup_fault_attr+0x200/0x200 [ 191.590806] ? lock_acquire+0x170/0x3c0 [ 191.594790] __should_failslab+0x115/0x180 [ 191.599035] should_failslab+0x5/0x10 [ 191.602837] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 191.607939] __kmalloc_node+0x38/0x70 [ 191.611743] kvmalloc_node+0x61/0xf0 [ 191.615465] __list_lru_init+0x4c6/0x7f0 [ 191.619526] ? up_read+0x53/0x110 [ 191.622986] sget_userns+0x7e2/0xcd0 [ 191.626698] ? set_bdev_super+0x110/0x110 [ 191.630841] ? ns_test_super+0x50/0x50 [ 191.634719] ? set_bdev_super+0x110/0x110 [ 191.638855] ? ns_test_super+0x50/0x50 [ 191.642745] sget+0x102/0x140 [ 191.645849] mount_bdev+0xf8/0x3b0 [ 191.649385] ? squashfs_alloc_inode+0x40/0x40 [ 191.653874] mount_fs+0xa3/0x310 [ 191.657238] vfs_kern_mount.part.0+0x68/0x470 [ 191.661728] do_mount+0x115c/0x2f50 [ 191.665347] ? cmp_ex_sort+0xc0/0xc0 [ 191.669054] ? __do_page_fault+0x180/0xd60 [ 191.673286] ? copy_mount_string+0x40/0x40 [ 191.677518] ? memset+0x20/0x40 [ 191.680825] ? copy_mount_options+0x26f/0x380 [ 191.685314] ksys_mount+0xcf/0x130 [ 191.688850] __x64_sys_mount+0xba/0x150 [ 191.692905] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 191.697478] do_syscall_64+0xf9/0x620 [ 191.701276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.706890] RIP: 0033:0x467b1a [ 191.710072] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 191.728963] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 191.736674] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 191.743933] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 [ 191.751189] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 14:40:50 executing program 3: gettid() r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 191.758449] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 191.765707] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 [ 191.773003] CPU: 1 PID: 14014 Comm: syz-executor.2 Not tainted 4.19.206-syzkaller #0 [ 191.780944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.790297] Call Trace: [ 191.792892] dump_stack+0x1fc/0x2ef [ 191.796533] should_fail.cold+0xa/0xf [ 191.800358] ? setup_fault_attr+0x200/0x200 [ 191.804692] ? lock_acquire+0x170/0x3c0 [ 191.808679] __should_failslab+0x115/0x180 [ 191.812921] should_failslab+0x5/0x10 [ 191.816734] kmem_cache_alloc+0x277/0x370 [ 191.820894] getname_flags+0xce/0x590 [ 191.824704] __x64_sys_execveat+0xce/0x120 [ 191.828947] do_syscall_64+0xf9/0x620 [ 191.833019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.838221] RIP: 0033:0x4665f9 [ 191.841416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 14:40:50 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x0) [ 191.860319] RSP: 002b:00007fd913952188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 191.868125] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 191.875401] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 191.882762] RBP: 00007fd9139521d0 R08: 0000000000001100 R09: 0000000000000000 [ 191.890036] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 191.897312] R13: 00007ffe8bb3133f R14: 00007fd913952300 R15: 0000000000022000 14:40:50 executing program 2 (fault-call:2 fault-nth:1): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:50 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 191.998105] FAULT_INJECTION: forcing a failure. [ 191.998105] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 192.010113] CPU: 1 PID: 14038 Comm: syz-executor.2 Not tainted 4.19.206-syzkaller #0 [ 192.018000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.027356] Call Trace: [ 192.029961] dump_stack+0x1fc/0x2ef [ 192.033603] should_fail.cold+0xa/0xf [ 192.037414] ? _kstrtoull+0x297/0x540 [ 192.041227] ? setup_fault_attr+0x200/0x200 [ 192.045553] ? _copy_from_user+0xd2/0x130 [ 192.049717] __alloc_pages_nodemask+0x239/0x2890 [ 192.054485] ? check_preemption_disabled+0x41/0x280 [ 192.059514] ? lock_downgrade+0x720/0x720 [ 192.063678] ? __lock_acquire+0x6de/0x3ff0 [ 192.067925] ? proc_fail_nth_write+0x95/0x1d0 [ 192.072443] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 192.077477] ? ksys_write+0x241/0x2a0 [ 192.081305] ? lock_downgrade+0x720/0x720 [ 192.086042] ? vfs_write+0x3d7/0x540 [ 192.089771] cache_grow_begin+0xa4/0x8a0 [ 192.093840] ? setup_fault_attr+0x200/0x200 [ 192.098172] ? lock_acquire+0x170/0x3c0 [ 192.102158] cache_alloc_refill+0x273/0x340 [ 192.106500] kmem_cache_alloc+0x346/0x370 [ 192.110667] getname_flags+0xce/0x590 [ 192.114478] __x64_sys_execveat+0xce/0x120 [ 192.118723] do_syscall_64+0xf9/0x620 [ 192.122539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.127736] RIP: 0033:0x4665f9 14:40:51 executing program 3: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:51 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 192.130940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 192.149934] RSP: 002b:00007fd913952188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 192.157656] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 192.165021] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 192.172301] RBP: 00007fd9139521d0 R08: 0000000000001100 R09: 0000000000000000 [ 192.179576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 192.186862] R13: 00007ffe8bb3133f R14: 00007fd913952300 R15: 0000000000022000 14:40:51 executing program 5 (fault-call:2 fault-nth:0): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 192.258012] FAULT_INJECTION: forcing a failure. [ 192.258012] name failslab, interval 1, probability 0, space 0, times 0 [ 192.271640] FAULT_INJECTION: forcing a failure. [ 192.271640] name failslab, interval 1, probability 0, space 0, times 0 [ 192.297911] CPU: 1 PID: 14055 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 14:40:51 executing program 4 (fault-call:2 fault-nth:0): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 192.305901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.315342] Call Trace: [ 192.317942] dump_stack+0x1fc/0x2ef [ 192.321935] should_fail.cold+0xa/0xf [ 192.325832] ? setup_fault_attr+0x200/0x200 [ 192.330165] ? lock_acquire+0x170/0x3c0 [ 192.334196] __should_failslab+0x115/0x180 [ 192.338534] should_failslab+0x5/0x10 [ 192.342349] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 192.347464] __kmalloc_node+0x38/0x70 [ 192.351274] kvmalloc_node+0x61/0xf0 [ 192.354993] __list_lru_init+0x4c6/0x7f0 [ 192.359061] ? up_read+0x53/0x110 [ 192.362534] sget_userns+0x810/0xcd0 [ 192.366285] ? set_bdev_super+0x110/0x110 [ 192.370446] ? ns_test_super+0x50/0x50 [ 192.374338] ? set_bdev_super+0x110/0x110 [ 192.378490] ? ns_test_super+0x50/0x50 [ 192.382387] sget+0x102/0x140 [ 192.385506] mount_bdev+0xf8/0x3b0 [ 192.387864] FAULT_INJECTION: forcing a failure. [ 192.387864] name failslab, interval 1, probability 0, space 0, times 0 [ 192.389046] ? squashfs_alloc_inode+0x40/0x40 [ 192.404762] mount_fs+0xa3/0x310 [ 192.408143] vfs_kern_mount.part.0+0x68/0x470 [ 192.412651] do_mount+0x115c/0x2f50 [ 192.416294] ? cmp_ex_sort+0xc0/0xc0 [ 192.420010] ? __do_page_fault+0x180/0xd60 [ 192.424249] ? copy_mount_string+0x40/0x40 [ 192.428489] ? memset+0x20/0x40 [ 192.431767] ? copy_mount_options+0x26f/0x380 [ 192.436271] ksys_mount+0xcf/0x130 [ 192.439806] __x64_sys_mount+0xba/0x150 [ 192.443780] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 192.448371] do_syscall_64+0xf9/0x620 [ 192.452180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.457394] RIP: 0033:0x467b1a [ 192.460590] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 192.479488] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 192.488081] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 192.495436] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 [ 192.502710] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 [ 192.509979] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 192.517333] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 [ 192.524676] CPU: 0 PID: 14059 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 192.532565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.541919] Call Trace: [ 192.544505] dump_stack+0x1fc/0x2ef [ 192.548127] should_fail.cold+0xa/0xf [ 192.551921] ? setup_fault_attr+0x200/0x200 [ 192.556234] ? lock_acquire+0x170/0x3c0 [ 192.560294] __should_failslab+0x115/0x180 [ 192.564523] should_failslab+0x5/0x10 [ 192.568313] kmem_cache_alloc+0x277/0x370 [ 192.572452] getname_flags+0xce/0x590 [ 192.576274] __x64_sys_execveat+0xce/0x120 [ 192.580504] do_syscall_64+0xf9/0x620 [ 192.584302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.589481] RIP: 0033:0x4665f9 [ 192.592666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 192.611561] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 192.619262] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 192.626694] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 192.633958] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 192.641220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 192.648483] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 14:40:51 executing program 0 (fault-call:2 fault-nth:0): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:51 executing program 3: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:51 executing program 2 (fault-call:2 fault-nth:2): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 192.655765] CPU: 1 PID: 14065 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0 [ 192.663651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.673008] Call Trace: [ 192.675605] dump_stack+0x1fc/0x2ef [ 192.679243] should_fail.cold+0xa/0xf [ 192.683051] ? setup_fault_attr+0x200/0x200 [ 192.687382] ? lock_acquire+0x170/0x3c0 [ 192.691633] __should_failslab+0x115/0x180 [ 192.695883] should_failslab+0x5/0x10 [ 192.699873] kmem_cache_alloc+0x277/0x370 [ 192.704027] getname_flags+0xce/0x590 14:40:51 executing program 3: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 192.707848] __x64_sys_execveat+0xce/0x120 [ 192.712092] do_syscall_64+0xf9/0x620 [ 192.715901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.721180] RIP: 0033:0x4665f9 [ 192.724375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 192.743271] RSP: 002b:00007f430431b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 192.750975] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 14:40:51 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 192.758246] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 192.765855] RBP: 00007f430431b1d0 R08: 0000000000001100 R09: 0000000000000000 [ 192.773123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 192.780394] R13: 00007ffc4b5b778f R14: 00007f430431b300 R15: 0000000000022000 14:40:51 executing program 5 (fault-call:2 fault-nth:1): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:51 executing program 4 (fault-call:2 fault-nth:1): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 192.844198] FAULT_INJECTION: forcing a failure. [ 192.844198] name failslab, interval 1, probability 0, space 0, times 0 [ 192.873853] FAULT_INJECTION: forcing a failure. [ 192.873853] name failslab, interval 1, probability 0, space 0, times 0 [ 192.888487] FAULT_INJECTION: forcing a failure. [ 192.888487] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 192.900321] CPU: 1 PID: 14081 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 192.908204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.917561] Call Trace: [ 192.920164] dump_stack+0x1fc/0x2ef [ 192.923808] should_fail.cold+0xa/0xf [ 192.926886] FAULT_INJECTION: forcing a failure. [ 192.926886] name failslab, interval 1, probability 0, space 0, times 0 [ 192.927610] ? _kstrtoull+0x297/0x540 [ 192.927633] ? setup_fault_attr+0x200/0x200 [ 192.947030] ? _copy_from_user+0xd2/0x130 [ 192.951197] __alloc_pages_nodemask+0x239/0x2890 [ 192.955982] ? check_preemption_disabled+0x41/0x280 [ 192.961009] ? lock_downgrade+0x720/0x720 [ 192.965177] ? __lock_acquire+0x6de/0x3ff0 [ 192.969427] ? proc_fail_nth_write+0x95/0x1d0 [ 192.973931] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 192.978784] ? ksys_write+0x241/0x2a0 [ 192.982597] ? lock_downgrade+0x720/0x720 [ 192.986744] ? vfs_write+0x3d7/0x540 [ 192.990465] cache_grow_begin+0xa4/0x8a0 [ 192.994533] ? setup_fault_attr+0x200/0x200 [ 192.998856] ? lock_acquire+0x170/0x3c0 [ 193.002928] cache_alloc_refill+0x273/0x340 [ 193.007432] kmem_cache_alloc+0x346/0x370 [ 193.011588] getname_flags+0xce/0x590 [ 193.015414] __x64_sys_execveat+0xce/0x120 [ 193.019657] do_syscall_64+0xf9/0x620 [ 193.023545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.028728] RIP: 0033:0x4665f9 [ 193.031919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 193.050821] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 193.058532] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 193.065803] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 193.073075] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 193.080341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 193.087613] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 [ 193.094928] CPU: 0 PID: 14083 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 [ 193.102821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.112175] Call Trace: [ 193.114801] dump_stack+0x1fc/0x2ef [ 193.118444] should_fail.cold+0xa/0xf [ 193.122256] ? setup_fault_attr+0x200/0x200 [ 193.123723] FAULT_INJECTION: forcing a failure. [ 193.123723] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 193.126577] ? lock_acquire+0x170/0x3c0 [ 193.126599] __should_failslab+0x115/0x180 [ 193.146567] should_failslab+0x5/0x10 [ 193.150372] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 193.155467] __kmalloc_node+0x38/0x70 [ 193.159263] kvmalloc_node+0x61/0xf0 [ 193.163060] __list_lru_init+0x4c6/0x7f0 [ 193.167112] ? up_read+0x53/0x110 [ 193.170561] sget_userns+0x810/0xcd0 [ 193.174267] ? set_bdev_super+0x110/0x110 [ 193.178451] ? ns_test_super+0x50/0x50 [ 193.182332] ? set_bdev_super+0x110/0x110 [ 193.186484] ? ns_test_super+0x50/0x50 [ 193.190401] sget+0x102/0x140 [ 193.193529] mount_bdev+0xf8/0x3b0 [ 193.197071] ? squashfs_alloc_inode+0x40/0x40 [ 193.201561] mount_fs+0xa3/0x310 [ 193.204931] vfs_kern_mount.part.0+0x68/0x470 [ 193.209423] do_mount+0x115c/0x2f50 [ 193.213061] ? cmp_ex_sort+0xc0/0xc0 [ 193.216768] ? __do_page_fault+0x180/0xd60 [ 193.220996] ? copy_mount_string+0x40/0x40 [ 193.225227] ? memset+0x20/0x40 [ 193.228520] ? copy_mount_options+0x26f/0x380 [ 193.233010] ksys_mount+0xcf/0x130 [ 193.236546] __x64_sys_mount+0xba/0x150 [ 193.240946] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 193.245520] do_syscall_64+0xf9/0x620 [ 193.249322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.254502] RIP: 0033:0x467b1a [ 193.257698] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 193.276585] RSP: 002b:00007fe03889dfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 193.284282] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 193.291552] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe03889e000 [ 193.298844] RBP: 00007fe03889e040 R08: 00007fe03889e040 R09: 0000000020000000 [ 193.306107] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 193.313371] R13: 0000000020000100 R14: 00007fe03889e000 R15: 0000000020000040 [ 193.320659] CPU: 1 PID: 14092 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0 [ 193.328810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.338176] Call Trace: [ 193.340775] dump_stack+0x1fc/0x2ef [ 193.344409] should_fail.cold+0xa/0xf [ 193.348215] ? _kstrtoull+0x297/0x540 [ 193.352022] ? setup_fault_attr+0x200/0x200 [ 193.356349] ? _copy_from_user+0xd2/0x130 [ 193.360514] __alloc_pages_nodemask+0x239/0x2890 [ 193.365278] ? check_preemption_disabled+0x41/0x280 [ 193.370301] ? lock_downgrade+0x720/0x720 [ 193.374458] ? __lock_acquire+0x6de/0x3ff0 [ 193.378716] ? proc_fail_nth_write+0x95/0x1d0 [ 193.383221] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 193.388082] ? ksys_write+0x241/0x2a0 [ 193.391891] ? lock_downgrade+0x720/0x720 [ 193.396053] ? vfs_write+0x3d7/0x540 [ 193.399781] cache_grow_begin+0xa4/0x8a0 [ 193.403847] ? setup_fault_attr+0x200/0x200 [ 193.408173] ? lock_acquire+0x170/0x3c0 [ 193.412150] cache_alloc_refill+0x273/0x340 [ 193.416475] kmem_cache_alloc+0x346/0x370 [ 193.420633] getname_flags+0xce/0x590 [ 193.424440] __x64_sys_execveat+0xce/0x120 [ 193.428677] do_syscall_64+0xf9/0x620 [ 193.432488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.437678] RIP: 0033:0x4665f9 [ 193.440875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 193.460911] RSP: 002b:00007f430431b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 193.468628] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 193.476765] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 193.484379] RBP: 00007f430431b1d0 R08: 0000000000001100 R09: 0000000000000000 [ 193.491643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 193.498906] R13: 00007ffc4b5b778f R14: 00007f430431b300 R15: 0000000000022000 [ 193.506284] CPU: 0 PID: 14077 Comm: syz-executor.2 Not tainted 4.19.206-syzkaller #0 [ 193.514172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.523521] Call Trace: [ 193.526110] dump_stack+0x1fc/0x2ef [ 193.529743] should_fail.cold+0xa/0xf [ 193.533546] ? setup_fault_attr+0x200/0x200 [ 193.537954] ? lock_acquire+0x170/0x3c0 [ 193.541928] __should_failslab+0x115/0x180 [ 193.546180] should_failslab+0x5/0x10 [ 193.549973] kmem_cache_alloc+0x277/0x370 [ 193.554123] dup_fd+0x85/0xbf0 [ 193.557309] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 193.562168] unshare_files+0x16c/0x260 [ 193.566049] ? __ia32_sys_unshare+0x40/0x40 [ 193.570364] ? cache_alloc_refill+0x2f8/0x340 [ 193.574852] __do_execve_file+0x28d/0x2360 [ 193.579603] ? lock_downgrade+0x720/0x720 [ 193.583746] ? open_exec+0x70/0x70 [ 193.587283] ? do_raw_spin_unlock+0x171/0x230 [ 193.591773] ? check_preemption_disabled+0x41/0x280 [ 193.596783] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 193.601977] ? __phys_addr+0x9a/0x110 [ 193.606032] ? __check_object_size+0x17b/0x3e0 [ 193.610615] do_execveat+0x3d/0x50 [ 193.614158] __x64_sys_execveat+0xe1/0x120 [ 193.618583] do_syscall_64+0xf9/0x620 [ 193.622381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.627572] RIP: 0033:0x4665f9 [ 193.630757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 193.649649] RSP: 002b:00007fd913952188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 193.657346] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 193.664636] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 193.671897] RBP: 00007fd9139521d0 R08: 0000000000001100 R09: 0000000000000000 [ 193.679160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 193.686417] R13: 00007ffe8bb3133f R14: 00007fd913952300 R15: 0000000000022000 14:40:52 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 193.693697] CPU: 1 PID: 14073 Comm: syz-executor.0 Not tainted 4.19.206-syzkaller #0 [ 193.701671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.711025] Call Trace: [ 193.713634] dump_stack+0x1fc/0x2ef [ 193.717277] should_fail.cold+0xa/0xf [ 193.721084] ? setup_fault_attr+0x200/0x200 [ 193.725498] ? lock_acquire+0x170/0x3c0 [ 193.729483] __should_failslab+0x115/0x180 [ 193.733723] should_failslab+0x5/0x10 [ 193.737526] kmem_cache_alloc+0x277/0x370 [ 193.741678] getname_flags+0xce/0x590 [ 193.745490] __x64_sys_execveat+0xce/0x120 [ 193.749734] do_syscall_64+0xf9/0x620 [ 193.753544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.758729] RIP: 0033:0x4665f9 [ 193.761926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 193.780825] RSP: 002b:00007fa1ab2c4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 193.788543] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 14:40:52 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:52 executing program 5 (fault-call:2 fault-nth:2): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 193.795816] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 193.803087] RBP: 00007fa1ab2c41d0 R08: 0000000000001100 R09: 0000000000000000 [ 193.810347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 193.820209] R13: 00007ffff404cddf R14: 00007fa1ab2c4300 R15: 0000000000022000 14:40:52 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:52 executing program 4 (fault-call:2 fault-nth:2): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:52 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:52 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:52 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1102) [ 193.974237] FAULT_INJECTION: forcing a failure. [ 193.974237] name failslab, interval 1, probability 0, space 0, times 0 [ 193.992349] FAULT_INJECTION: forcing a failure. [ 193.992349] name failslab, interval 1, probability 0, space 0, times 0 [ 194.020828] CPU: 1 PID: 14112 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 194.028850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.038206] Call Trace: [ 194.040804] dump_stack+0x1fc/0x2ef [ 194.044447] should_fail.cold+0xa/0xf [ 194.044990] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 194.048264] ? setup_fault_attr+0x200/0x200 [ 194.048284] ? lock_acquire+0x170/0x3c0 [ 194.048303] __should_failslab+0x115/0x180 [ 194.069943] should_failslab+0x5/0x10 [ 194.073837] kmem_cache_alloc+0x277/0x370 [ 194.078077] dup_fd+0x85/0xbf0 [ 194.081273] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 194.086211] unshare_files+0x16c/0x260 [ 194.090105] ? __ia32_sys_unshare+0x40/0x40 [ 194.094430] ? cache_alloc_refill+0x2f8/0x340 [ 194.098940] __do_execve_file+0x28d/0x2360 [ 194.103170] ? lock_downgrade+0x720/0x720 [ 194.107314] ? open_exec+0x70/0x70 [ 194.111546] ? do_raw_spin_unlock+0x171/0x230 [ 194.116040] ? check_preemption_disabled+0x41/0x280 [ 194.121055] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 194.126395] ? __phys_addr+0x9a/0x110 [ 194.130201] ? __check_object_size+0x17b/0x3e0 [ 194.134787] do_execveat+0x3d/0x50 [ 194.138327] __x64_sys_execveat+0xe1/0x120 [ 194.142556] do_syscall_64+0xf9/0x620 [ 194.146352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.151886] RIP: 0033:0x4665f9 [ 194.155075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 194.174406] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 194.182123] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 194.189502] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 194.196764] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 194.204023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 194.211376] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 14:40:53 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800034e579127a7cd1a8d6695a922e2c0c5beb13370c2600983cbf22e4177caeffb4782d5b621bcb5f18c8fa342e8cbca872cfa1d"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:53 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1102) 14:40:53 executing program 5 (fault-call:2 fault-nth:3): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 194.218683] CPU: 0 PID: 14117 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0 [ 194.226580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.235939] Call Trace: [ 194.238544] dump_stack+0x1fc/0x2ef [ 194.242185] should_fail.cold+0xa/0xf [ 194.245996] ? setup_fault_attr+0x200/0x200 [ 194.250326] ? lock_acquire+0x170/0x3c0 [ 194.254318] __should_failslab+0x115/0x180 [ 194.258565] should_failslab+0x5/0x10 [ 194.262374] kmem_cache_alloc+0x277/0x370 [ 194.266528] dup_fd+0x85/0xbf0 [ 194.269735] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 194.274680] unshare_files+0x16c/0x260 [ 194.278576] ? __ia32_sys_unshare+0x40/0x40 [ 194.282902] ? cache_alloc_refill+0x2f8/0x340 [ 194.287558] __do_execve_file+0x28d/0x2360 [ 194.291775] ? lock_downgrade+0x720/0x720 [ 194.295910] ? open_exec+0x70/0x70 [ 194.299434] ? do_raw_spin_unlock+0x171/0x230 [ 194.303976] ? check_preemption_disabled+0x41/0x280 [ 194.308982] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 194.314154] ? __phys_addr+0x9a/0x110 [ 194.317966] ? __check_object_size+0x17b/0x3e0 [ 194.322546] do_execveat+0x3d/0x50 [ 194.326076] __x64_sys_execveat+0xe1/0x120 [ 194.330298] do_syscall_64+0xf9/0x620 [ 194.334085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.339260] RIP: 0033:0x4665f9 [ 194.342440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 194.361422] RSP: 002b:00007f430431b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 14:40:53 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1103) [ 194.369116] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 194.376369] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 194.383624] RBP: 00007f430431b1d0 R08: 0000000000001100 R09: 0000000000000000 [ 194.390876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 194.398131] R13: 00007ffc4b5b778f R14: 00007f430431b300 R15: 0000000000022000 14:40:53 executing program 4 (fault-call:2 fault-nth:3): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:53 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:53 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1103) [ 194.484248] FAULT_INJECTION: forcing a failure. [ 194.484248] name failslab, interval 1, probability 0, space 0, times 0 14:40:53 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1104) [ 194.550898] FAULT_INJECTION: forcing a failure. [ 194.550898] name failslab, interval 1, probability 0, space 0, times 0 [ 194.566138] CPU: 0 PID: 14137 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 194.574068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.583430] Call Trace: [ 194.586028] dump_stack+0x1fc/0x2ef [ 194.589673] should_fail.cold+0xa/0xf [ 194.593482] ? setup_fault_attr+0x200/0x200 [ 194.597815] ? lock_acquire+0x170/0x3c0 [ 194.601808] __should_failslab+0x115/0x180 [ 194.606049] should_failslab+0x5/0x10 [ 194.609854] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 194.614978] __kmalloc_node+0x38/0x70 [ 194.618788] kvmalloc_node+0x61/0xf0 [ 194.622511] alloc_fdtable+0xcd/0x280 [ 194.626317] dup_fd+0x6a2/0xbf0 [ 194.629622] unshare_files+0x16c/0x260 [ 194.633514] ? __ia32_sys_unshare+0x40/0x40 [ 194.637841] ? lock_downgrade+0x720/0x720 [ 194.641996] __do_execve_file+0x28d/0x2360 [ 194.646235] ? should_fail+0x142/0x7b0 [ 194.650121] ? open_exec+0x70/0x70 [ 194.653669] ? check_preemption_disabled+0x41/0x280 [ 194.658702] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 194.663906] ? __phys_addr+0x9a/0x110 [ 194.667711] ? __check_object_size+0x17b/0x3e0 [ 194.672309] do_execveat+0x3d/0x50 [ 194.675876] __x64_sys_execveat+0xe1/0x120 [ 194.680122] do_syscall_64+0xf9/0x620 [ 194.684141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.689331] RIP: 0033:0x4665f9 [ 194.692526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 194.711454] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 194.719164] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 194.726435] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 194.733705] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 194.741156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 194.748453] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 [ 194.755737] CPU: 1 PID: 14145 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0 [ 194.763630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.772986] Call Trace: [ 194.775587] dump_stack+0x1fc/0x2ef [ 194.779226] should_fail.cold+0xa/0xf [ 194.783067] ? setup_fault_attr+0x200/0x200 [ 194.787397] ? lock_acquire+0x170/0x3c0 [ 194.787989] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 194.791466] __should_failslab+0x115/0x180 [ 194.791484] should_failslab+0x5/0x10 [ 194.791498] kmem_cache_alloc_trace+0x284/0x380 [ 194.791515] alloc_fdtable+0x7e/0x280 [ 194.791529] dup_fd+0x6a2/0xbf0 [ 194.791554] unshare_files+0x16c/0x260 [ 194.791571] ? __ia32_sys_unshare+0x40/0x40 [ 194.808312] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 194.810994] ? cache_alloc_refill+0x2f8/0x340 [ 194.811014] __do_execve_file+0x28d/0x2360 [ 194.811028] ? lock_downgrade+0x720/0x720 [ 194.811044] ? open_exec+0x70/0x70 [ 194.811056] ? do_raw_spin_unlock+0x171/0x230 [ 194.811072] ? check_preemption_disabled+0x41/0x280 [ 194.811086] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 194.811102] ? __phys_addr+0x9a/0x110 [ 194.868040] ? __check_object_size+0x17b/0x3e0 [ 194.872645] do_execveat+0x3d/0x50 [ 194.876194] __x64_sys_execveat+0xe1/0x120 [ 194.880437] do_syscall_64+0xf9/0x620 [ 194.884244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.889430] RIP: 0033:0x4665f9 14:40:53 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1104) 14:40:53 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1105) 14:40:53 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1105) [ 194.892623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 194.911524] RSP: 002b:00007f430431b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 194.919228] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 194.926484] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 194.933740] RBP: 00007f430431b1d0 R08: 0000000000001100 R09: 0000000000000000 [ 194.941174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:40:53 executing program 5 (fault-call:2 fault-nth:4): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 194.948433] R13: 00007ffc4b5b778f R14: 00007f430431b300 R15: 0000000000022000 14:40:53 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, 0x0, 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 194.977748] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 194.984940] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 195.005209] FAULT_INJECTION: forcing a failure. [ 195.005209] name failslab, interval 1, probability 0, space 0, times 0 14:40:53 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1106) [ 195.033629] CPU: 1 PID: 14169 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 195.041537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.050981] Call Trace: [ 195.053579] dump_stack+0x1fc/0x2ef [ 195.057301] should_fail.cold+0xa/0xf [ 195.061115] ? setup_fault_attr+0x200/0x200 [ 195.065441] ? lock_acquire+0x170/0x3c0 [ 195.069430] __should_failslab+0x115/0x180 [ 195.073675] should_failslab+0x5/0x10 [ 195.077484] kmem_cache_alloc_node_trace+0x244/0x3b0 14:40:53 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, 0x0, 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:53 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1106) [ 195.082598] __kmalloc_node+0x38/0x70 [ 195.086425] kvmalloc_node+0x61/0xf0 [ 195.090150] alloc_fdtable+0x139/0x280 [ 195.094052] dup_fd+0x6a2/0xbf0 [ 195.097353] unshare_files+0x16c/0x260 [ 195.101258] ? __ia32_sys_unshare+0x40/0x40 [ 195.105587] ? lock_downgrade+0x720/0x720 [ 195.109740] __do_execve_file+0x28d/0x2360 [ 195.113986] ? should_fail+0x142/0x7b0 [ 195.118002] ? open_exec+0x70/0x70 [ 195.121532] ? check_preemption_disabled+0x41/0x280 [ 195.126535] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 195.131722] ? __phys_addr+0x9a/0x110 [ 195.135631] ? __check_object_size+0x17b/0x3e0 [ 195.140218] do_execveat+0x3d/0x50 [ 195.143873] __x64_sys_execveat+0xe1/0x120 [ 195.148114] do_syscall_64+0xf9/0x620 [ 195.151948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.157135] RIP: 0033:0x4665f9 [ 195.160322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 14:40:54 executing program 4 (fault-call:2 fault-nth:4): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:54 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 195.179305] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 195.187011] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 195.194445] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 195.201711] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 195.208964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.216236] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 14:40:54 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, 0x0, 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:54 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1107) 14:40:54 executing program 5 (fault-call:2 fault-nth:5): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 195.310935] FAULT_INJECTION: forcing a failure. [ 195.310935] name failslab, interval 1, probability 0, space 0, times 0 [ 195.330756] CPU: 1 PID: 14191 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0 [ 195.338662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.348019] Call Trace: [ 195.350621] dump_stack+0x1fc/0x2ef [ 195.354263] should_fail.cold+0xa/0xf 14:40:54 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:54 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1107) [ 195.358074] ? setup_fault_attr+0x200/0x200 [ 195.362403] ? lock_acquire+0x170/0x3c0 [ 195.366401] __should_failslab+0x115/0x180 [ 195.370649] should_failslab+0x5/0x10 [ 195.374460] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 195.379575] __kmalloc_node+0x38/0x70 [ 195.383394] kvmalloc_node+0x61/0xf0 [ 195.387117] alloc_fdtable+0xcd/0x280 [ 195.390930] dup_fd+0x6a2/0xbf0 [ 195.394239] unshare_files+0x16c/0x260 [ 195.398128] ? __ia32_sys_unshare+0x40/0x40 [ 195.402456] ? cache_alloc_refill+0x2f8/0x340 [ 195.406959] __do_execve_file+0x28d/0x2360 [ 195.411201] ? lock_downgrade+0x720/0x720 [ 195.415373] ? open_exec+0x70/0x70 [ 195.418921] ? do_raw_spin_unlock+0x171/0x230 [ 195.423429] ? check_preemption_disabled+0x41/0x280 [ 195.428459] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 195.433653] ? __phys_addr+0x9a/0x110 [ 195.437474] ? __check_object_size+0x17b/0x3e0 [ 195.442073] do_execveat+0x3d/0x50 [ 195.445624] __x64_sys_execveat+0xe1/0x120 [ 195.449893] do_syscall_64+0xf9/0x620 [ 195.453703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.458989] RIP: 0033:0x4665f9 [ 195.462189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 195.462647] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 195.481351] RSP: 002b:00007f430431b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 195.481365] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 195.481371] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 195.481378] RBP: 00007f430431b1d0 R08: 0000000000001100 R09: 0000000000000000 [ 195.481387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.481395] R13: 00007ffc4b5b778f R14: 00007f430431b300 R15: 0000000000022000 [ 195.514260] FAULT_INJECTION: forcing a failure. [ 195.514260] name failslab, interval 1, probability 0, space 0, times 0 [ 195.546937] ieee802154 phy0 wpan0: encryption failed: -22 [ 195.552566] ieee802154 phy1 wpan1: encryption failed: -22 14:40:54 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1108) 14:40:54 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:54 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1108) [ 195.608647] CPU: 1 PID: 14207 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 195.616565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.626011] Call Trace: [ 195.628611] dump_stack+0x1fc/0x2ef [ 195.632257] should_fail.cold+0xa/0xf [ 195.636072] ? setup_fault_attr+0x200/0x200 [ 195.640491] ? lock_acquire+0x170/0x3c0 [ 195.644483] __should_failslab+0x115/0x180 [ 195.648727] should_failslab+0x5/0x10 [ 195.652533] kmem_cache_alloc_trace+0x284/0x380 [ 195.657751] __do_execve_file+0x33b/0x2360 [ 195.662000] ? should_fail+0x142/0x7b0 [ 195.665898] ? open_exec+0x70/0x70 [ 195.669445] ? check_preemption_disabled+0x41/0x280 [ 195.674470] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 195.679669] ? __phys_addr+0x9a/0x110 [ 195.683479] ? __check_object_size+0x17b/0x3e0 [ 195.688077] do_execveat+0x3d/0x50 [ 195.691631] __x64_sys_execveat+0xe1/0x120 [ 195.695879] do_syscall_64+0xf9/0x620 [ 195.699692] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.704881] RIP: 0033:0x4665f9 [ 195.708078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 195.726986] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 195.734701] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 195.736374] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 195.741972] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 14:40:54 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:54 executing program 5 (fault-call:2 fault-nth:6): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:54 executing program 4 (fault-call:2 fault-nth:5): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 195.741982] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 195.741991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.742000] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 [ 195.836580] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 195.849236] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 195.883858] FAULT_INJECTION: forcing a failure. [ 195.883858] name failslab, interval 1, probability 0, space 0, times 0 [ 195.904037] CPU: 1 PID: 14234 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 195.911949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.921316] Call Trace: [ 195.923922] dump_stack+0x1fc/0x2ef [ 195.927717] should_fail.cold+0xa/0xf [ 195.931513] ? setup_fault_attr+0x200/0x200 [ 195.935828] ? lock_acquire+0x170/0x3c0 [ 195.939803] __should_failslab+0x115/0x180 [ 195.944035] should_failslab+0x5/0x10 [ 195.947826] kmem_cache_alloc_trace+0x284/0x380 [ 195.952488] __do_execve_file+0x33b/0x2360 [ 195.956712] ? lock_downgrade+0x720/0x720 [ 195.960855] ? open_exec+0x70/0x70 [ 195.964402] ? check_preemption_disabled+0x41/0x280 [ 195.969412] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 195.974675] ? __phys_addr+0x9a/0x110 [ 195.978468] ? __check_object_size+0x17b/0x3e0 [ 195.983055] do_execveat+0x3d/0x50 [ 195.986604] __x64_sys_execveat+0xe1/0x120 [ 195.990896] do_syscall_64+0xf9/0x620 [ 195.994717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.999911] RIP: 0033:0x4665f9 [ 196.003100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 196.021989] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 196.029702] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 196.036964] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 196.044219] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 196.051473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 196.058728] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 [ 196.075706] FAULT_INJECTION: forcing a failure. [ 196.075706] name failslab, interval 1, probability 0, space 0, times 0 [ 196.110251] CPU: 1 PID: 14237 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0 [ 196.118160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.127519] Call Trace: [ 196.130122] dump_stack+0x1fc/0x2ef [ 196.133769] should_fail.cold+0xa/0xf [ 196.137582] ? setup_fault_attr+0x200/0x200 [ 196.141912] ? lock_acquire+0x170/0x3c0 [ 196.145910] __should_failslab+0x115/0x180 [ 196.150157] should_failslab+0x5/0x10 [ 196.153971] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 196.159089] __kmalloc_node+0x38/0x70 [ 196.162910] kvmalloc_node+0x61/0xf0 [ 196.166634] alloc_fdtable+0x139/0x280 [ 196.170533] dup_fd+0x6a2/0xbf0 [ 196.173831] unshare_files+0x16c/0x260 [ 196.177731] ? __ia32_sys_unshare+0x40/0x40 [ 196.182068] ? cache_alloc_refill+0x2f8/0x340 [ 196.186575] __do_execve_file+0x28d/0x2360 [ 196.190820] ? lock_downgrade+0x720/0x720 [ 196.194982] ? open_exec+0x70/0x70 [ 196.198526] ? do_raw_spin_unlock+0x171/0x230 [ 196.203026] ? check_preemption_disabled+0x41/0x280 [ 196.208051] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 196.213247] ? __phys_addr+0x9a/0x110 [ 196.217057] ? __check_object_size+0x17b/0x3e0 [ 196.221656] do_execveat+0x3d/0x50 [ 196.225193] __x64_sys_execveat+0xe1/0x120 [ 196.229413] do_syscall_64+0xf9/0x620 [ 196.233201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.238395] RIP: 0033:0x4665f9 [ 196.241586] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 14:40:55 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:55 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1118) 14:40:55 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1118) 14:40:55 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:55 executing program 5 (fault-call:2 fault-nth:7): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 196.260490] RSP: 002b:00007f430431b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 196.268211] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 196.275472] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 196.282731] RBP: 00007f430431b1d0 R08: 0000000000001100 R09: 0000000000000000 [ 196.289998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 196.297264] R13: 00007ffc4b5b778f R14: 00007f430431b300 R15: 0000000000022000 [ 196.342573] FAULT_INJECTION: forcing a failure. [ 196.342573] name failslab, interval 1, probability 0, space 0, times 0 [ 196.364178] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 196.375733] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 196.384010] CPU: 1 PID: 14246 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 14:40:55 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x112f) [ 196.392344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.401699] Call Trace: [ 196.404298] dump_stack+0x1fc/0x2ef [ 196.407941] should_fail.cold+0xa/0xf [ 196.411771] ? setup_fault_attr+0x200/0x200 [ 196.416103] ? lock_acquire+0x170/0x3c0 [ 196.420090] __should_failslab+0x115/0x180 [ 196.424342] should_failslab+0x5/0x10 [ 196.428152] kmem_cache_alloc+0x277/0x370 [ 196.432316] prepare_creds+0x39/0x510 [ 196.436134] prepare_exec_creds+0xd/0xf0 14:40:55 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 196.440224] __do_execve_file+0x3a9/0x2360 [ 196.444469] ? lock_downgrade+0x720/0x720 [ 196.448628] ? open_exec+0x70/0x70 [ 196.452179] ? check_preemption_disabled+0x41/0x280 [ 196.457203] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 196.462397] ? __phys_addr+0x9a/0x110 [ 196.466208] ? __check_object_size+0x17b/0x3e0 [ 196.470806] do_execveat+0x3d/0x50 [ 196.474357] __x64_sys_execveat+0xe1/0x120 [ 196.478602] do_syscall_64+0xf9/0x620 [ 196.482418] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.487612] RIP: 0033:0x4665f9 14:40:55 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x112f) [ 196.490812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 196.509802] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 196.517517] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 196.524792] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 196.532072] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 14:40:55 executing program 4 (fault-call:2 fault-nth:6): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 196.539351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 196.546632] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 14:40:55 executing program 5 (fault-call:2 fault-nth:8): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:55 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:55 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x113c) 14:40:55 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:55 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x113c) [ 196.630851] FAULT_INJECTION: forcing a failure. [ 196.630851] name failslab, interval 1, probability 0, space 0, times 0 [ 196.654104] CPU: 1 PID: 14273 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0 [ 196.662015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.671371] Call Trace: [ 196.673976] dump_stack+0x1fc/0x2ef [ 196.677619] should_fail.cold+0xa/0xf [ 196.681436] ? setup_fault_attr+0x200/0x200 [ 196.685768] ? lock_acquire+0x170/0x3c0 [ 196.689759] __should_failslab+0x115/0x180 [ 196.694001] should_failslab+0x5/0x10 [ 196.697832] kmem_cache_alloc_trace+0x284/0x380 [ 196.702513] __do_execve_file+0x33b/0x2360 [ 196.706753] ? lock_downgrade+0x720/0x720 [ 196.710912] ? open_exec+0x70/0x70 [ 196.714459] ? check_preemption_disabled+0x41/0x280 [ 196.719480] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 196.724757] ? __phys_addr+0x9a/0x110 14:40:55 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1148) [ 196.728570] ? __check_object_size+0x17b/0x3e0 [ 196.733166] do_execveat+0x3d/0x50 [ 196.736729] __x64_sys_execveat+0xe1/0x120 [ 196.740975] do_syscall_64+0xf9/0x620 [ 196.744788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.749977] RIP: 0033:0x4665f9 [ 196.753165] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 196.772092] RSP: 002b:00007f430431b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 196.779811] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 196.781839] FAULT_INJECTION: forcing a failure. [ 196.781839] name failslab, interval 1, probability 0, space 0, times 0 [ 196.787083] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 196.787092] RBP: 00007f430431b1d0 R08: 0000000000001100 R09: 0000000000000000 [ 196.787101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 196.787111] R13: 00007ffc4b5b778f R14: 00007f430431b300 R15: 0000000000022000 14:40:55 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x114c) 14:40:55 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1148) [ 196.835270] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 196.851083] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 196.868777] CPU: 1 PID: 14289 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 14:40:55 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1168) [ 196.876679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.886039] Call Trace: [ 196.888635] dump_stack+0x1fc/0x2ef [ 196.892282] should_fail.cold+0xa/0xf [ 196.896090] ? setup_fault_attr+0x200/0x200 [ 196.900424] ? lock_acquire+0x170/0x3c0 [ 196.904414] __should_failslab+0x115/0x180 [ 196.908655] should_failslab+0x5/0x10 [ 196.912547] kmem_cache_alloc+0x277/0x370 [ 196.916699] __alloc_file+0x21/0x330 [ 196.920418] alloc_empty_file+0x6d/0x170 [ 196.924487] path_openat+0xe9/0x2df0 [ 196.928207] ? is_bpf_text_address+0xfc/0x1b0 14:40:55 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000000000000000001000deeb14b60104000000000000fc283800"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 196.932720] ? kernel_text_address+0xbd/0xf0 [ 196.937139] ? __kernel_text_address+0x9/0x30 [ 196.941644] ? unwind_get_return_address+0x51/0x90 [ 196.946586] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.951955] ? __kernel_text_address+0x9/0x30 [ 196.956457] ? path_lookupat+0x8d0/0x8d0 [ 196.960529] ? kasan_kmalloc+0x139/0x160 [ 196.964593] do_filp_open+0x18c/0x3f0 [ 196.968394] ? may_open_dev+0xf0/0xf0 [ 196.972294] ? __lock_acquire+0x6de/0x3ff0 [ 196.976553] ? lock_acquire+0x170/0x3c0 [ 196.980529] ? __do_execve_file+0x38c/0x2360 14:40:55 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x114c) [ 196.984944] ? mark_held_locks+0xf0/0xf0 [ 196.989007] ? __mutex_lock+0x365/0x1200 [ 196.993066] ? should_fail+0x142/0x7b0 [ 196.996950] ? fs_reclaim_release+0xd0/0x110 [ 197.001466] ? apparmor_cred_prepare+0xe8/0x610 [ 197.006123] do_open_execat+0x11d/0x5b0 [ 197.010094] ? __do_execve_file+0x7c5/0x2360 [ 197.014513] ? __se_sys_uselib+0x400/0x400 [ 197.018839] ? lock_acquire+0x170/0x3c0 [ 197.022824] ? __do_execve_file+0x4d4/0x2360 [ 197.027262] ? check_preemption_disabled+0x41/0x280 [ 197.032284] __do_execve_file+0x1a8b/0x2360 [ 197.036602] ? open_exec+0x70/0x70 [ 197.040130] ? check_preemption_disabled+0x41/0x280 [ 197.045129] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 197.050307] ? __phys_addr+0x9a/0x110 [ 197.054117] ? __check_object_size+0x17b/0x3e0 [ 197.058709] do_execveat+0x3d/0x50 [ 197.062238] __x64_sys_execveat+0xe1/0x120 [ 197.066456] do_syscall_64+0xf9/0x620 [ 197.070256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.075444] RIP: 0033:0x4665f9 [ 197.078623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 197.097772] RSP: 002b:00007f6d34d7e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 197.105486] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665f9 [ 197.112756] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: ffffffffffffffff [ 197.120025] RBP: 00007f6d34d7e1d0 R08: 0000000000001100 R09: 0000000000000000 [ 197.127304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:40:55 executing program 4 (fault-call:2 fault-nth:7): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:55 executing program 5 (fault-call:2 fault-nth:9): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 197.134582] R13: 00007fff068886df R14: 00007f6d34d7e300 R15: 0000000000022000 [ 197.185604] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 197.193146] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 197.243700] FAULT_INJECTION: forcing a failure. [ 197.243700] name failslab, interval 1, probability 0, space 0, times 0 [ 197.260513] FAULT_INJECTION: forcing a failure. [ 197.260513] name failslab, interval 1, probability 0, space 0, times 0 14:40:56 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:56 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x116c) 14:40:56 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 197.287549] CPU: 1 PID: 14317 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 197.295544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.304900] Call Trace: [ 197.307497] dump_stack+0x1fc/0x2ef [ 197.311135] should_fail.cold+0xa/0xf [ 197.314946] ? setup_fault_attr+0x200/0x200 [ 197.319271] ? lock_acquire+0x170/0x3c0 [ 197.323260] __should_failslab+0x115/0x180 [ 197.327505] should_failslab+0x5/0x10 [ 197.331311] __kmalloc_track_caller+0x2a6/0x3c0 [ 197.335985] ? kasprintf+0xbb/0xf0 [ 197.339534] kvasprintf+0xb5/0x150 [ 197.343083] ? bust_spinlocks+0xe0/0xe0 [ 197.347084] kasprintf+0xbb/0xf0 [ 197.350458] ? kvasprintf_const+0x190/0x190 [ 197.354821] ? sched_exec+0x160/0x1e0 [ 197.359417] ? get_iowait_load+0x130/0x130 [ 197.363656] ? lock_acquire+0x170/0x3c0 [ 197.367639] __do_execve_file+0x925/0x2360 [ 197.371884] ? open_exec+0x70/0x70 [ 197.375435] ? check_preemption_disabled+0x41/0x280 [ 197.377752] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 197.380451] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 197.380467] ? __phys_addr+0x9a/0x110 [ 197.380486] ? __check_object_size+0x17b/0x3e0 [ 197.380508] do_execveat+0x3d/0x50 [ 197.380527] __x64_sys_execveat+0xe1/0x120 [ 197.380543] do_syscall_64+0xf9/0x620 [ 197.380563] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.380579] RIP: 0033:0x4665f9 [ 197.396842] squashfs: SQUASHFS error: unable to read squashfs_super_block 14:40:56 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1174) [ 197.400938] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 197.400947] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 197.400962] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 197.400971] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 197.400979] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 197.400987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 197.400995] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 [ 197.505523] CPU: 0 PID: 14319 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0 [ 197.513433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.522795] Call Trace: [ 197.525395] dump_stack+0x1fc/0x2ef [ 197.529037] should_fail.cold+0xa/0xf [ 197.532848] ? setup_fault_attr+0x200/0x200 [ 197.537192] ? lock_acquire+0x170/0x3c0 [ 197.541187] __should_failslab+0x115/0x180 [ 197.545435] should_failslab+0x5/0x10 [ 197.549250] kmem_cache_alloc+0x277/0x370 [ 197.553410] prepare_creds+0x39/0x510 [ 197.557225] prepare_exec_creds+0xd/0xf0 [ 197.561298] __do_execve_file+0x3a9/0x2360 [ 197.565540] ? lock_downgrade+0x720/0x720 [ 197.569703] ? open_exec+0x70/0x70 [ 197.573256] ? check_preemption_disabled+0x41/0x280 [ 197.578279] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 197.583475] ? __phys_addr+0x9a/0x110 [ 197.587283] ? __check_object_size+0x17b/0x3e0 [ 197.591882] do_execveat+0x3d/0x50 [ 197.595430] __x64_sys_execveat+0xe1/0x120 [ 197.599674] do_syscall_64+0xf9/0x620 14:40:56 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x117a) [ 197.603484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.608676] RIP: 0033:0x4665f9 [ 197.611872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 197.630777] RSP: 002b:00007f430431b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 197.638493] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 197.645771] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 14:40:56 executing program 5 (fault-call:2 fault-nth:10): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:56 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1168) [ 197.653041] RBP: 00007f430431b1d0 R08: 0000000000001100 R09: 0000000000000000 [ 197.660295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.667550] R13: 00007ffc4b5b778f R14: 00007f430431b300 R15: 0000000000022000 14:40:56 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:56 executing program 4 (fault-call:2 fault-nth:8): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 197.715674] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 197.732694] squashfs: SQUASHFS error: unable to read squashfs_super_block 14:40:56 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x116c) 14:40:56 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r1, 0x0, 0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r4, &(0x7f0000000140)={0x2000}) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) dup3(r2, r5, 0x0) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f0000000100)) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:56 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 197.772103] FAULT_INJECTION: forcing a failure. [ 197.772103] name failslab, interval 1, probability 0, space 0, times 0 [ 197.800875] FAULT_INJECTION: forcing a failure. [ 197.800875] name failslab, interval 1, probability 0, space 0, times 0 [ 197.840110] CPU: 1 PID: 14358 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 197.848020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.857378] Call Trace: [ 197.859981] dump_stack+0x1fc/0x2ef [ 197.863618] should_fail.cold+0xa/0xf [ 197.867434] ? setup_fault_attr+0x200/0x200 [ 197.871762] ? lock_acquire+0x170/0x3c0 [ 197.875750] __should_failslab+0x115/0x180 [ 197.880001] should_failslab+0x5/0x10 [ 197.883807] __kmalloc_track_caller+0x2a6/0x3c0 [ 197.887691] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 197.888472] ? kasprintf+0xbb/0xf0 [ 197.888493] kvasprintf+0xb5/0x150 [ 197.888509] ? bust_spinlocks+0xe0/0xe0 [ 197.888531] kasprintf+0xbb/0xf0 [ 197.909647] ? kvasprintf_const+0x190/0x190 [ 197.913981] ? sched_exec+0x19c/0x1e0 [ 197.914141] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 197.917785] ? get_iowait_load+0x130/0x130 [ 197.917802] ? lock_acquire+0x170/0x3c0 [ 197.917817] ? __do_execve_file+0x4d4/0x2360 [ 197.917840] __do_execve_file+0x925/0x2360 [ 197.941553] ? open_exec+0x70/0x70 [ 197.945108] ? check_preemption_disabled+0x41/0x280 [ 197.950181] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 197.955376] ? __phys_addr+0x9a/0x110 [ 197.959190] ? __check_object_size+0x17b/0x3e0 [ 197.963782] do_execveat+0x3d/0x50 [ 197.967503] __x64_sys_execveat+0xe1/0x120 [ 197.971747] do_syscall_64+0xf9/0x620 [ 197.975551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.980737] RIP: 0033:0x4665f9 [ 197.983930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 198.003128] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 198.010923] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 198.018185] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 198.025651] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 198.034219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.041478] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 [ 198.048759] CPU: 0 PID: 14360 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0 [ 198.056650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.066009] Call Trace: [ 198.068610] dump_stack+0x1fc/0x2ef [ 198.072250] should_fail.cold+0xa/0xf [ 198.076058] ? setup_fault_attr+0x200/0x200 [ 198.080388] ? lock_acquire+0x170/0x3c0 [ 198.084384] __should_failslab+0x115/0x180 14:40:56 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1174) [ 198.088632] should_failslab+0x5/0x10 [ 198.092459] kmem_cache_alloc_trace+0x284/0x380 [ 198.097151] apparmor_file_alloc_security+0x394/0xad0 [ 198.102358] ? apparmor_file_receive+0x160/0x160 [ 198.107123] ? __alloc_file+0x21/0x330 [ 198.111023] security_file_alloc+0x40/0x90 [ 198.115274] __alloc_file+0xc9/0x330 [ 198.118994] alloc_empty_file+0x6d/0x170 [ 198.123074] path_openat+0xe9/0x2df0 [ 198.126799] ? is_bpf_text_address+0xfc/0x1b0 [ 198.131300] ? kernel_text_address+0xbd/0xf0 [ 198.135712] ? __kernel_text_address+0x9/0x30 [ 198.140201] ? unwind_get_return_address+0x51/0x90 [ 198.145130] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.150491] ? __kernel_text_address+0x9/0x30 [ 198.154980] ? path_lookupat+0x8d0/0x8d0 [ 198.159041] ? kasan_kmalloc+0x139/0x160 [ 198.163098] do_filp_open+0x18c/0x3f0 [ 198.166887] ? may_open_dev+0xf0/0xf0 [ 198.170682] ? __lock_acquire+0x6de/0x3ff0 [ 198.174909] ? lock_acquire+0x170/0x3c0 [ 198.178874] ? __do_execve_file+0x38c/0x2360 [ 198.183276] ? mark_held_locks+0xf0/0xf0 [ 198.187326] ? __mutex_lock+0x365/0x1200 [ 198.191379] ? should_fail+0x142/0x7b0 [ 198.195255] ? fs_reclaim_release+0xd0/0x110 [ 198.199657] ? apparmor_cred_prepare+0xe8/0x610 [ 198.204319] do_open_execat+0x11d/0x5b0 [ 198.208282] ? __do_execve_file+0x7c5/0x2360 [ 198.212681] ? __se_sys_uselib+0x400/0x400 [ 198.216910] ? lock_acquire+0x170/0x3c0 [ 198.220879] ? __do_execve_file+0x4d4/0x2360 [ 198.225365] ? check_preemption_disabled+0x41/0x280 [ 198.230375] __do_execve_file+0x1a8b/0x2360 [ 198.234688] ? open_exec+0x70/0x70 [ 198.238233] ? check_preemption_disabled+0x41/0x280 [ 198.243240] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 198.248418] ? __phys_addr+0x9a/0x110 [ 198.252226] ? __check_object_size+0x17b/0x3e0 [ 198.256890] do_execveat+0x3d/0x50 [ 198.260423] __x64_sys_execveat+0xe1/0x120 [ 198.264745] do_syscall_64+0xf9/0x620 [ 198.268540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.273716] RIP: 0033:0x4665f9 14:40:57 executing program 5 (fault-call:2 fault-nth:11): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 198.276899] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 198.295911] RSP: 002b:00007f430431b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 198.303615] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 198.310884] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 198.318146] RBP: 00007f430431b1d0 R08: 0000000000001100 R09: 0000000000000000 [ 198.325406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 198.332665] R13: 00007ffc4b5b778f R14: 00007f430431b300 R15: 0000000000022000 14:40:57 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 198.405779] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 198.413369] FAULT_INJECTION: forcing a failure. [ 198.413369] name failslab, interval 1, probability 0, space 0, times 0 [ 198.430648] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 198.436944] CPU: 1 PID: 14391 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 198.445481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.454845] Call Trace: [ 198.457445] dump_stack+0x1fc/0x2ef [ 198.461099] should_fail.cold+0xa/0xf [ 198.464917] ? setup_fault_attr+0x200/0x200 [ 198.469249] ? lock_acquire+0x170/0x3c0 [ 198.473328] __should_failslab+0x115/0x180 [ 198.477585] should_failslab+0x5/0x10 [ 198.481396] kmem_cache_alloc+0x277/0x370 [ 198.485561] mm_alloc+0x19/0xc0 [ 198.488943] __do_execve_file+0xaad/0x2360 [ 198.493280] ? open_exec+0x70/0x70 [ 198.496832] ? check_preemption_disabled+0x41/0x280 [ 198.501858] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 198.507064] ? __phys_addr+0x9a/0x110 [ 198.510886] ? __check_object_size+0x17b/0x3e0 [ 198.515532] do_execveat+0x3d/0x50 [ 198.519106] __x64_sys_execveat+0xe1/0x120 [ 198.523359] do_syscall_64+0xf9/0x620 [ 198.527180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.532378] RIP: 0033:0x4665f9 [ 198.535595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 14:40:57 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:57 executing program 4 (fault-call:2 fault-nth:9): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:57 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x117a) [ 198.554646] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 198.562361] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 198.569641] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 198.576918] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 198.584195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.591475] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 14:40:57 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="e6d5c06b"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:57 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:57 executing program 5 (fault-call:2 fault-nth:12): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 198.634990] FAULT_INJECTION: forcing a failure. [ 198.634990] name failslab, interval 1, probability 0, space 0, times 0 [ 198.668077] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 198.702573] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 198.722809] CPU: 0 PID: 14406 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0 [ 198.730721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.740082] Call Trace: [ 198.742460] FAULT_INJECTION: forcing a failure. [ 198.742460] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 198.742684] dump_stack+0x1fc/0x2ef [ 198.758184] should_fail.cold+0xa/0xf [ 198.762003] ? setup_fault_attr+0x200/0x200 [ 198.766341] ? lock_acquire+0x170/0x3c0 [ 198.770343] __should_failslab+0x115/0x180 [ 198.774588] should_failslab+0x5/0x10 [ 198.778392] kmem_cache_alloc_trace+0x284/0x380 [ 198.783079] apparmor_file_alloc_security+0x394/0xad0 [ 198.788286] ? apparmor_file_receive+0x160/0x160 [ 198.793055] ? __alloc_file+0x21/0x330 [ 198.796959] security_file_alloc+0x40/0x90 14:40:57 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="6aa300d0"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 198.801211] __alloc_file+0xc9/0x330 [ 198.804939] alloc_empty_file+0x6d/0x170 [ 198.809014] path_openat+0xe9/0x2df0 [ 198.812735] ? is_bpf_text_address+0xfc/0x1b0 [ 198.817243] ? kernel_text_address+0xbd/0xf0 [ 198.821664] ? __kernel_text_address+0x9/0x30 [ 198.826161] ? unwind_get_return_address+0x51/0x90 [ 198.831101] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.836474] ? __kernel_text_address+0x9/0x30 [ 198.841074] ? path_lookupat+0x8d0/0x8d0 [ 198.845155] ? kasan_kmalloc+0x139/0x160 [ 198.849226] do_filp_open+0x18c/0x3f0 [ 198.853036] ? may_open_dev+0xf0/0xf0 [ 198.856848] ? __lock_acquire+0x6de/0x3ff0 [ 198.861188] ? lock_acquire+0x170/0x3c0 [ 198.865169] ? __do_execve_file+0x38c/0x2360 [ 198.869591] ? mark_held_locks+0xf0/0xf0 [ 198.873667] ? __mutex_lock+0x365/0x1200 [ 198.877734] ? should_fail+0x142/0x7b0 [ 198.881623] ? fs_reclaim_release+0xd0/0x110 [ 198.886035] ? apparmor_cred_prepare+0xe8/0x610 [ 198.890710] do_open_execat+0x11d/0x5b0 [ 198.894691] ? __do_execve_file+0x7c5/0x2360 [ 198.899103] ? __se_sys_uselib+0x400/0x400 14:40:57 executing program 0: r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r{\xeb`\\P\xcde\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\xbb\xae\x1b\x90\xf8\xb2\xa0H\x84\xfc\x98\x19\xe51\xea\x0f\xb3Q\x95C\xa6\xc0\x94\xa8Jj\xf3\xb4\x06\xcf\xd9E\xe2\xb9o3J)\x10\xa9\xa0a\x02)\x9a\x06\xd3C\xc4\x9f\xca\x97h\xea\xd6?jB\x94\xadn\xf7\xefZ,\xfc\xeb\x8fy\x8ac\xff\xcc`\xc1:\nl-w\x13\nX\xe5N`\xf9\x98\x8b1e\xdd\xd3\xaf\x05pF9J\x83){\xc4T\xdd\x04\xd0\xe8\x11\xad\xd45\x1e\x1e\xa3\xec\xe2}M*d\x8e8YHU=\xfe\xf0\xe1)\x952\xa9\xa1\xd8>-!|w\xc2\x99,C?\"_\xf9N\xf8\x96d\xea\xef\x90,\\x\xc8A&\xf4]bI\xfb\xeb\xcd \x13\x89\xcfY\x0eSh+\xb5+j\xf6V\x98\r\x9c\xea\xc2b\xd4\xbe\xca\x1aQ\xbee\xd2\x1dZ?T\v\xf8\x89\xff\xd9\x8bqy\xb7\x9bgc\xc9\xfdy\xe7#\xa6\x99\x1b\x96', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 198.903350] ? lock_acquire+0x170/0x3c0 [ 198.907326] ? __do_execve_file+0x4d4/0x2360 [ 198.911754] ? check_preemption_disabled+0x41/0x280 [ 198.916874] __do_execve_file+0x1a8b/0x2360 [ 198.921203] ? open_exec+0x70/0x70 [ 198.924747] ? check_preemption_disabled+0x41/0x280 [ 198.929860] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 198.935059] ? __phys_addr+0x9a/0x110 [ 198.938871] ? __check_object_size+0x17b/0x3e0 [ 198.943470] do_execveat+0x3d/0x50 [ 198.947022] __x64_sys_execveat+0xe1/0x120 [ 198.951271] do_syscall_64+0xf9/0x620 [ 198.955080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.960270] RIP: 0033:0x4665f9 [ 198.963467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 198.982556] RSP: 002b:00007f430431b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 198.990459] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 198.997737] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 199.005013] RBP: 00007f430431b1d0 R08: 0000000000001100 R09: 0000000000000000 [ 199.012287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 199.019561] R13: 00007ffc4b5b778f R14: 00007f430431b300 R15: 0000000000022000 [ 199.033733] CPU: 1 PID: 14420 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 199.041634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.050990] Call Trace: [ 199.053590] dump_stack+0x1fc/0x2ef [ 199.057229] should_fail.cold+0xa/0xf [ 199.061044] ? lock_acquire+0x170/0x3c0 [ 199.065035] ? setup_fault_attr+0x200/0x200 [ 199.069378] __alloc_pages_nodemask+0x239/0x2890 [ 199.074138] ? unwind_get_return_address+0x51/0x90 [ 199.079082] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.084452] ? __save_stack_trace+0xaf/0x190 [ 199.088887] ? kasan_kmalloc+0x139/0x160 [ 199.092958] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 199.097806] ? kmem_cache_alloc+0x122/0x370 14:40:57 executing program 4 (fault-call:2 fault-nth:10): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 199.102134] ? mm_alloc+0x19/0xc0 [ 199.106201] ? __do_execve_file+0xaad/0x2360 [ 199.110619] ? do_execveat+0x3d/0x50 [ 199.114335] ? __x64_sys_execveat+0xe1/0x120 [ 199.118746] ? do_syscall_64+0xf9/0x620 [ 199.122812] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.128169] ? mark_held_locks+0xf0/0xf0 [ 199.132227] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 199.137244] ? __kmalloc_track_caller+0x389/0x3c0 [ 199.142073] ? kasprintf+0xbb/0xf0 [ 199.145607] ? kvasprintf+0xe9/0x150 [ 199.149318] alloc_pages_current+0x193/0x2a0 [ 199.153787] __get_free_pages+0x8/0x40 [ 199.157667] pgd_alloc+0x7e/0x3e0 [ 199.161128] ? pgd_page_get_mm+0x40/0x40 [ 199.165255] ? __lockdep_init_map+0x100/0x5a0 [ 199.169760] mm_init+0x59f/0x9c0 [ 199.173145] mm_alloc+0xa2/0xc0 [ 199.176443] __do_execve_file+0xaad/0x2360 [ 199.180693] ? open_exec+0x70/0x70 [ 199.184247] ? check_preemption_disabled+0x41/0x280 [ 199.189257] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 199.194433] ? __phys_addr+0x9a/0x110 [ 199.198223] ? __check_object_size+0x17b/0x3e0 [ 199.202799] do_execveat+0x3d/0x50 [ 199.206327] __x64_sys_execveat+0xe1/0x120 [ 199.210565] do_syscall_64+0xf9/0x620 [ 199.214364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.219536] RIP: 0033:0x4665f9 [ 199.222732] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 199.241620] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 14:40:58 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) vmsplice(r1, &(0x7f0000000340)=[{&(0x7f0000000100)="e1f700d6c5acfbeaecea4a478dde2ca420d8d7549a828665d63edcfff641cc4617f9fd52b79614b9f9bc7013b1ac10d5e6b221f4c6b8a694f1e9a1107fd540310fced33dbebb28323e1b5fa035a164459360350cd917794264c24e7b5fde081ba4a776a3445192e5f155b99b1594dd105af80023ae1f3530ac692908521fde10", 0x80}, {&(0x7f0000000180)="7e509df5f4ffe4ade40f5a463d860287983afe4cfd11167ad4336985b9e78c319d6012bdaa745b68c42af714f410e0abcce5535dbffd3ea7aa5b25a668b5fb7e81735d5a466a6a6b59fdee52baf78f00b19c5cb3ebe979df9d0fa181c87a7707723f4c77da3fb5c2185f5d70cb71c28e17e55b75b53fb315e5d7b6a50d711f447654080c8f5a41fd69cf7ff0248c5305d0365b4c356e54911bb7d0a85b8d095b0721488a4dc7fea880b1ba8e0c9ee887136dda3c6fb4ccf65e246c5b2b66de65c23d4ab43faed71b8b203226d575b68e67e508251be745eb38e6185ad479de8a46b679797b6bfec921bf237e", 0xec}, {&(0x7f0000000000)="924de3af932693604da9f541", 0xc}, {&(0x7f0000000280)="d48263237a7ff76bb6d5567f652936f5990be516dcce5ad1d293b354559490c0b07d4ced17031de623c34f09518829a6ca097ec8c5a1f604bdb1a6c31ad83d8a438a4da423817f3c750041d79e65c9c8af497717d74849d697c6e4213e14471859d9fb9d697cc674b9d2eef177cc36f4e56e5d0b4de9629ca18981e279ae2f3043e0e95639676e3e3e8ca157516d4074d5e842ef3b2cb32976d87a747315b624", 0xa0}], 0x4, 0x0) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:58 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 199.249317] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 199.256576] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 199.263848] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 199.271116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 199.278494] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 14:40:58 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e000039a59442c40a09000000"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 199.333482] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 199.375019] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 199.418251] FAULT_INJECTION: forcing a failure. [ 199.418251] name failslab, interval 1, probability 0, space 0, times 0 [ 199.435556] CPU: 1 PID: 14454 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0 [ 199.443471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.452916] Call Trace: [ 199.455532] dump_stack+0x1fc/0x2ef [ 199.459206] should_fail.cold+0xa/0xf [ 199.463019] ? setup_fault_attr+0x200/0x200 [ 199.467345] ? lock_acquire+0x170/0x3c0 [ 199.471581] __should_failslab+0x115/0x180 [ 199.475899] should_failslab+0x5/0x10 [ 199.479698] __kmalloc_track_caller+0x2a6/0x3c0 [ 199.484386] ? kasprintf+0xbb/0xf0 [ 199.487918] kvasprintf+0xb5/0x150 [ 199.491460] ? bust_spinlocks+0xe0/0xe0 [ 199.495433] kasprintf+0xbb/0xf0 [ 199.498791] ? kvasprintf_const+0x190/0x190 [ 199.503106] ? sched_exec+0x19c/0x1e0 [ 199.506907] ? get_iowait_load+0x130/0x130 [ 199.511136] ? lock_acquire+0x170/0x3c0 [ 199.515105] ? __do_execve_file+0x4d4/0x2360 [ 199.519506] __do_execve_file+0x925/0x2360 [ 199.523736] ? open_exec+0x70/0x70 [ 199.527269] ? check_preemption_disabled+0x41/0x280 [ 199.532290] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 199.537470] ? __phys_addr+0x9a/0x110 [ 199.541266] ? __check_object_size+0x17b/0x3e0 [ 199.545845] do_execveat+0x3d/0x50 [ 199.549383] __x64_sys_execveat+0xe1/0x120 [ 199.553611] do_syscall_64+0xf9/0x620 [ 199.557415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.562594] RIP: 0033:0x4665f9 [ 199.565777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 199.584673] RSP: 002b:00007f430431b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 199.592369] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 199.599713] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 199.607056] RBP: 00007f430431b1d0 R08: 0000000000001100 R09: 0000000000000000 [ 199.614412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 199.621673] R13: 00007ffc4b5b778f R14: 00007f430431b300 R15: 0000000000022000 14:40:58 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:58 executing program 5 (fault-call:2 fault-nth:13): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:58 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="96d12cc709d496ce33d3563411c325c5459d4f4d7f454c90"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:58 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:58 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="80000000e2036c8f8be52003fda2296326bf0880231f07eefdec1f854a7779132b28499a02d11d4f5df7549af797b307cc768d5314e1f31105328d781713bd7aac513224c93cdf4fba0600bf638b6a96ccb05f49e4f7698de20373fe560617777cc1c9491bc90e71e00cc7552cc0973905c8d6caa13e0e0d753173c854b89b28f0f6bd5764665967df349f232d116d2dd01c6d4ecf5aab924cbd59c73aa12b3326"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f00000001c0)={0x1, [0x0]}) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000000)) 14:40:58 executing program 4 (fault-call:2 fault-nth:11): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 199.723535] FAULT_INJECTION: forcing a failure. [ 199.723535] name failslab, interval 1, probability 0, space 0, times 0 [ 199.750936] FAULT_INJECTION: forcing a failure. [ 199.750936] name failslab, interval 1, probability 0, space 0, times 0 [ 199.752578] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 199.769363] CPU: 1 PID: 14468 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 199.777256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.786611] Call Trace: [ 199.788985] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 199.789204] dump_stack+0x1fc/0x2ef [ 199.799737] should_fail.cold+0xa/0xf [ 199.803592] ? setup_fault_attr+0x200/0x200 [ 199.807926] ? lock_acquire+0x170/0x3c0 [ 199.811916] __should_failslab+0x115/0x180 [ 199.816163] should_failslab+0x5/0x10 [ 199.819966] kmem_cache_alloc+0x277/0x370 [ 199.824161] vm_area_alloc+0x1c/0x110 [ 199.827964] __do_execve_file+0xc3e/0x2360 [ 199.832209] ? open_exec+0x70/0x70 [ 199.835792] ? check_preemption_disabled+0x41/0x280 [ 199.840819] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 199.846010] ? __phys_addr+0x9a/0x110 [ 199.849808] ? __check_object_size+0x17b/0x3e0 [ 199.854397] do_execveat+0x3d/0x50 [ 199.857958] __x64_sys_execveat+0xe1/0x120 [ 199.862283] do_syscall_64+0xf9/0x620 [ 199.866264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.871445] RIP: 0033:0x4665f9 [ 199.874636] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 199.893548] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 199.901251] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 199.908522] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 199.915794] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 199.923059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 199.930324] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 [ 199.937609] CPU: 0 PID: 14474 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0 [ 199.945502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.954860] Call Trace: [ 199.957473] dump_stack+0x1fc/0x2ef [ 199.961113] should_fail.cold+0xa/0xf [ 199.964934] ? setup_fault_attr+0x200/0x200 [ 199.969266] ? lock_acquire+0x170/0x3c0 [ 199.973257] __should_failslab+0x115/0x180 [ 199.977502] should_failslab+0x5/0x10 [ 199.981310] kmem_cache_alloc+0x277/0x370 [ 199.985466] mm_alloc+0x19/0xc0 [ 199.988753] __do_execve_file+0xaad/0x2360 [ 199.993034] ? open_exec+0x70/0x70 [ 199.996589] ? check_preemption_disabled+0x41/0x280 [ 200.001621] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 200.006840] ? __phys_addr+0x9a/0x110 [ 200.010648] ? __check_object_size+0x17b/0x3e0 [ 200.015241] do_execveat+0x3d/0x50 [ 200.018782] __x64_sys_execveat+0xe1/0x120 [ 200.023021] do_syscall_64+0xf9/0x620 [ 200.026817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.032005] RIP: 0033:0x4665f9 [ 200.035193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 200.054196] RSP: 002b:00007f430431b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 200.061907] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 14:40:58 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000100)={0x0, "ed0ecd556c8468b5e9bab193bd7f18ff"}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001100)={0x0, "6ca7498189d79ce36347190077de4e3f"}) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f0000002100)={0x14, 0x2, {0x3, @usage, 0x0, 0x4, 0x401, 0x48c77560, 0x800, 0x3, 0x60, @struct={0x7fffffff, 0x20}, 0xff, 0x401, [0x2, 0x4, 0x6, 0x401, 0x1, 0x400]}, {0x0, @usage=0x2a86, r2, 0x4, 0xa36e, 0x9, 0x6, 0x7, 0x29, @usage=0x9, 0xfffff64e, 0x8, [0x99e, 0x8, 0x400, 0x72e, 0xad, 0x3ff]}, {0x9, @usage=0x4, r3, 0x8, 0x6, 0x1244, 0xfffffffffffff73b, 0x80000000, 0x1, @struct={0x4, 0x9c1}, 0xc529, 0x80000001, [0x3ff, 0xffff, 0x3b1a, 0x80000000, 0x4, 0x200]}, {0x80, 0x438, 0x7ff}}) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:58 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 200.069165] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 200.076436] RBP: 00007f430431b1d0 R08: 0000000000001100 R09: 0000000000000000 [ 200.083706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 200.090968] R13: 00007ffc4b5b778f R14: 00007f430431b300 R15: 0000000000022000 14:40:58 executing program 4 (fault-call:2 fault-nth:12): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:59 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r0], 0x3c) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3000001, 0x1010, r0, 0x465e6000) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 200.140382] SQUASHFS error: squashfs_read_data failed to read block 0x0 14:40:59 executing program 5 (fault-call:2 fault-nth:14): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 200.191096] squashfs: SQUASHFS error: unable to read squashfs_super_block 14:40:59 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 200.233697] FAULT_INJECTION: forcing a failure. [ 200.233697] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 200.247137] CPU: 1 PID: 14504 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 200.255125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.264490] Call Trace: [ 200.267156] dump_stack+0x1fc/0x2ef [ 200.270804] should_fail.cold+0xa/0xf [ 200.274620] ? lock_acquire+0x170/0x3c0 [ 200.274899] FAULT_INJECTION: forcing a failure. [ 200.274899] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 200.278611] ? setup_fault_attr+0x200/0x200 [ 200.278636] __alloc_pages_nodemask+0x239/0x2890 [ 200.278659] ? mark_held_locks+0xf0/0xf0 [ 200.303577] ? lock_downgrade+0x720/0x720 [ 200.307735] ? check_preemption_disabled+0x41/0x280 [ 200.312760] ? check_preemption_disabled+0x41/0x280 [ 200.317783] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 200.322618] ? current_time+0x6f/0x1c0 [ 200.326510] ? __lock_acquire+0x6de/0x3ff0 [ 200.330758] alloc_pages_current+0x193/0x2a0 [ 200.335168] get_zeroed_page+0x10/0x40 [ 200.339513] __pud_alloc+0x33/0x240 [ 200.343157] __handle_mm_fault+0x1352/0x41c0 [ 200.347566] ? vm_insert_page+0x9c0/0x9c0 [ 200.351715] ? atime_needs_update+0x5f0/0x5f0 [ 200.356228] ? check_preemption_disabled+0x41/0x280 [ 200.361258] handle_mm_fault+0x436/0xb10 [ 200.365328] __get_user_pages+0x6f0/0x1710 [ 200.369575] ? follow_page_mask+0x1d00/0x1d00 [ 200.374083] ? __se_sys_copy_file_range+0x410/0x410 [ 200.379107] ? fsnotify+0x84e/0xe10 [ 200.382753] get_user_pages_remote+0x220/0x460 [ 200.387347] copy_strings.isra.0+0x460/0x9c0 [ 200.391766] ? search_binary_handler+0xa0/0xa0 [ 200.396351] ? prepare_binprm+0x657/0x890 [ 200.400505] ? lock_downgrade+0x720/0x720 [ 200.404653] ? install_exec_creds+0x170/0x170 [ 200.409153] copy_strings_kernel+0x9e/0x110 [ 200.413486] __do_execve_file+0xfe6/0x2360 [ 200.417729] ? open_exec+0x70/0x70 [ 200.421266] ? check_preemption_disabled+0x41/0x280 [ 200.426275] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 200.431461] ? __phys_addr+0x9a/0x110 [ 200.435264] ? __check_object_size+0x17b/0x3e0 [ 200.439851] do_execveat+0x3d/0x50 [ 200.443393] __x64_sys_execveat+0xe1/0x120 [ 200.447625] do_syscall_64+0xf9/0x620 [ 200.451431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.456620] RIP: 0033:0x4665f9 [ 200.459830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 200.478815] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 200.486615] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 200.493878] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 200.501148] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 200.508410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 200.515674] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 [ 200.522960] CPU: 0 PID: 14507 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0 [ 200.530848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.540193] Call Trace: [ 200.542777] dump_stack+0x1fc/0x2ef [ 200.546398] should_fail.cold+0xa/0xf [ 200.550190] ? lock_acquire+0x170/0x3c0 [ 200.554158] ? setup_fault_attr+0x200/0x200 [ 200.558476] __alloc_pages_nodemask+0x239/0x2890 [ 200.563222] ? unwind_get_return_address+0x51/0x90 [ 200.568141] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.573494] ? __save_stack_trace+0xaf/0x190 [ 200.577918] ? kasan_kmalloc+0x139/0x160 [ 200.582028] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 200.586859] ? kmem_cache_alloc+0x122/0x370 [ 200.591168] ? mm_alloc+0x19/0xc0 [ 200.594622] ? __do_execve_file+0xaad/0x2360 [ 200.599031] ? do_execveat+0x3d/0x50 [ 200.602741] ? __x64_sys_execveat+0xe1/0x120 [ 200.607147] ? do_syscall_64+0xf9/0x620 [ 200.611117] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.616484] ? mark_held_locks+0xf0/0xf0 [ 200.620538] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 200.625578] ? __kmalloc_track_caller+0x389/0x3c0 [ 200.630409] ? kasprintf+0xbb/0xf0 [ 200.634029] ? kvasprintf+0xe9/0x150 [ 200.637762] alloc_pages_current+0x193/0x2a0 [ 200.642165] __get_free_pages+0x8/0x40 [ 200.646062] pgd_alloc+0x7e/0x3e0 [ 200.649507] ? pgd_page_get_mm+0x40/0x40 [ 200.653565] ? __lockdep_init_map+0x100/0x5a0 [ 200.658169] mm_init+0x59f/0x9c0 [ 200.661530] mm_alloc+0xa2/0xc0 [ 200.664799] __do_execve_file+0xaad/0x2360 [ 200.669029] ? open_exec+0x70/0x70 [ 200.672562] ? check_preemption_disabled+0x41/0x280 [ 200.677581] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 200.682773] ? __phys_addr+0x9a/0x110 [ 200.686585] ? __check_object_size+0x17b/0x3e0 [ 200.691164] do_execveat+0x3d/0x50 [ 200.694711] __x64_sys_execveat+0xe1/0x120 [ 200.699039] do_syscall_64+0xf9/0x620 [ 200.702835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.708010] RIP: 0033:0x4665f9 [ 200.711192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 200.730180] RSP: 002b:00007f430431b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 200.737962] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 200.745220] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 200.752480] RBP: 00007f430431b1d0 R08: 0000000000001100 R09: 0000000000000000 [ 200.759760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 200.767018] R13: 00007ffc4b5b778f R14: 00007f430431b300 R15: 0000000000022000 14:40:59 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:40:59 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c66"], 0x3c) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xc, 0x1010, r1, 0xa4f75000) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000005a0010002c07000000dbdf000008000300", @ANYRES32, @ANYBLOB="0800010000000000000000"], 0x24}, 0x1, 0x0, 0x0, 0xc804}, 0x0) 14:40:59 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) sendfile(r0, r1, &(0x7f0000000640)=0x182, 0x3) write$binfmt_misc(r1, &(0x7f0000000580)={'syz0', "4ca8f48ff240923dd71bb53fccc4d9f1ffb3e0ebd05a64902304492ab2fe380e23cadad9d3c01947bfa30ade09d376de79c9ee272778657679999851a12a6c8a5ea2de6aa8a6f2bd7d6848da8e73b9e6445e7d398ab0eff83409b2cbf84817bc2dfd5c77e7ce691a08b194bd719dbef92e99e18309835056a93e149c080a46c088297e98daa62b10ba79b6191f2a247c7774d1c14b098f6226a5b36ba417628926a28c81da89f1e3497353a27bce38"}, 0xb3) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x80000000]}, 0x8, 0x800) r3 = syz_mount_image$hfsplus(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x7, 0x5, &(0x7f0000000480)=[{&(0x7f0000000200)="c807973bf6ddca06cb0c9632a429eca1b6aed9174562ce6244a7a1968e88f251775e048c22b69c9602d5ff7e2ef4f006b70533b49af2fc7aed8ff3f08f431343af3286ea028ae70e83052f884dc0952ccace6794b167c022cd03b7721d1c29cbd11a1a5aded6eabd18c3379d865261dce979865743fd329fd1d384c74f56dcf3f7ab5bba5c03a1d1114ef45ef390", 0x8e}, {&(0x7f00000002c0)="716ae1e2e70acc43343b062849efe95d9235cbc95156a1b6626e71390201d980fbeb688d85f7bfd6ff62b76f7eb8e76f0f85a3a52db29f85435ad8db71ac0b4b65b7383b4b7b86406adc7634b09c98c76bd27580ba7c6239d38d87924f4724aff4b8db254baedc84799bdc77f4badee27ad783", 0x73, 0xfe5}, {&(0x7f0000000340)="b14f26606e55811598ba23275b5eaa236db69a95a708baaf5d77ffbc950e4ae2930853586355b4d8daf233cd305b29bf34966e220f3cbb32d68019f9ae249e768f2f563ad25ee97da87f07ee3b92b92692b9e7dd881d375a702bed9959fb6004014dad94b0283990f5d5e9d21bbbe59324b00e641b4383edea86dbe47745de8c760fb0431d253c0110e2493eddd78b28cc0188b8c16f02732741546db996d59e5533c80de085df1ea6aafb9bfd54e3c2c5b462", 0xb3, 0x6d2}, {&(0x7f0000000400)="d8f49c4d3b73cbf6bb51629498210a88e1", 0x11, 0x4}, {&(0x7f0000000440)="4219b0343f96ba23bfa079c9127e9fdbc60be7703f1d10a186f00ac9776739ee4940db66f0e8ea3e6cf735e582cc45947fb515d9b7179214544acad516", 0x3d, 0x8000000000000000}], 0x140a6, &(0x7f0000000500)={[], [{@measure}]}) sendfile(r2, r3, &(0x7f0000000540)=0x6, 0x101) execveat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 14:40:59 executing program 5 (fault-call:2 fault-nth:15): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:59 executing program 4 (fault-call:2 fault-nth:13): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:40:59 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c460200000004a40003003e"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 200.934631] FAULT_INJECTION: forcing a failure. [ 200.934631] name failslab, interval 1, probability 0, space 0, times 0 [ 200.935619] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 200.974471] CPU: 1 PID: 14529 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 14:40:59 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f654c46bf4e7af89dab272c15ce94bac942ffc65b28d80913ec06e7fd6883ca4ffefb0c636a1b77f09d0e154029b8fa9f3690dbf69f272787982fdf7eb53342ccc176147a23aaf054f7a10337fcbdb83b97c0d11f9f8cb653e06f296db5368185772a9b12adeb2b54124b688d12f7ff4ce91299f79dc565b1196dd604d1a1609d51fafcbf5f6046f61ad3499dcaaca57cb6fbe2a6b066acd847c4defdb8a0512c9d1a613863744b6a85af21edcc7badb523"], 0x3c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_CPUID(r4, 0xaea3, 0x0) r5 = dup3(r1, r3, 0x0) dup2(r5, r4) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000100)={0x0, {}, 0x0, {}, 0xbd, 0x6, 0x18, 0xc, "48a6fb8bda93b63488bd828f424cff09d2af3f9533a69ddd449df8d2e41045d298f4868a480ca28690d46818967a6bf607fa28b6bf21741e20e91146cbe80190", "ceea6980442aa9e0f574952bde3559a4d132ca5ca6e8dc493a6d72edf56834f1", [0x5, 0x9]}) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 200.982464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.991821] Call Trace: [ 200.993201] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 200.994419] dump_stack+0x1fc/0x2ef [ 200.994440] should_fail.cold+0xa/0xf [ 200.994458] ? setup_fault_attr+0x200/0x200 [ 201.007240] FAULT_INJECTION: forcing a failure. [ 201.007240] name failslab, interval 1, probability 0, space 0, times 0 [ 201.008777] ? lock_acquire+0x170/0x3c0 [ 201.008798] __should_failslab+0x115/0x180 [ 201.008817] should_failslab+0x5/0x10 [ 201.036523] kmem_cache_alloc+0x277/0x370 [ 201.040673] __pmd_alloc+0xbb/0x440 [ 201.044299] __handle_mm_fault+0x1760/0x41c0 [ 201.048705] ? vm_insert_page+0x9c0/0x9c0 [ 201.052846] ? atime_needs_update+0x5f0/0x5f0 [ 201.057447] ? check_preemption_disabled+0x41/0x280 [ 201.062474] handle_mm_fault+0x436/0xb10 [ 201.066541] __get_user_pages+0x6f0/0x1710 [ 201.070782] ? follow_page_mask+0x1d00/0x1d00 [ 201.075286] ? __se_sys_copy_file_range+0x410/0x410 [ 201.080300] ? fsnotify+0x84e/0xe10 [ 201.083934] get_user_pages_remote+0x220/0x460 [ 201.088528] copy_strings.isra.0+0x460/0x9c0 [ 201.092937] ? search_binary_handler+0xa0/0xa0 [ 201.097541] ? prepare_binprm+0x657/0x890 [ 201.101686] ? lock_downgrade+0x720/0x720 [ 201.105831] ? install_exec_creds+0x170/0x170 [ 201.110332] copy_strings_kernel+0x9e/0x110 [ 201.114657] __do_execve_file+0xfe6/0x2360 [ 201.118908] ? open_exec+0x70/0x70 [ 201.122454] ? check_preemption_disabled+0x41/0x280 [ 201.127556] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 201.132745] ? __phys_addr+0x9a/0x110 [ 201.136569] ? __check_object_size+0x17b/0x3e0 [ 201.141156] do_execveat+0x3d/0x50 [ 201.144695] __x64_sys_execveat+0xe1/0x120 [ 201.148925] do_syscall_64+0xf9/0x620 [ 201.152732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.157917] RIP: 0033:0x4665f9 [ 201.161107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 201.180000] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 201.187703] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 201.194971] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 201.202326] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 201.209695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.216962] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 [ 201.224245] CPU: 0 PID: 14536 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0 14:41:00 executing program 5 (fault-call:2 fault-nth:16): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 201.232130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.241484] Call Trace: [ 201.244083] dump_stack+0x1fc/0x2ef [ 201.247724] should_fail.cold+0xa/0xf [ 201.251539] ? setup_fault_attr+0x200/0x200 [ 201.255867] ? lock_acquire+0x170/0x3c0 [ 201.259854] __should_failslab+0x115/0x180 [ 201.264100] should_failslab+0x5/0x10 [ 201.267903] kmem_cache_alloc+0x277/0x370 [ 201.272052] vm_area_alloc+0x1c/0x110 [ 201.275845] __do_execve_file+0xc3e/0x2360 [ 201.280066] ? open_exec+0x70/0x70 [ 201.283592] ? check_preemption_disabled+0x41/0x280 [ 201.288593] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 201.293770] ? __phys_addr+0x9a/0x110 [ 201.297563] ? __check_object_size+0x17b/0x3e0 [ 201.302151] do_execveat+0x3d/0x50 [ 201.305682] __x64_sys_execveat+0xe1/0x120 [ 201.309905] do_syscall_64+0xf9/0x620 [ 201.313693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.318866] RIP: 0033:0x4665f9 [ 201.322043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 201.340955] RSP: 002b:00007f430431b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 201.348664] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 201.355922] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 201.363178] RBP: 00007f430431b1d0 R08: 0000000000001100 R09: 0000000000000000 [ 201.370432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.377695] R13: 00007ffc4b5b778f R14: 00007f430431b300 R15: 0000000000022000 14:41:00 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:00 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:41:00 executing program 4 (fault-call:2 fault-nth:14): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 201.470923] FAULT_INJECTION: forcing a failure. [ 201.470923] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 201.479381] FAULT_INJECTION: forcing a failure. [ 201.479381] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 201.487318] CPU: 1 PID: 14548 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 201.502653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.512003] Call Trace: [ 201.514599] dump_stack+0x1fc/0x2ef [ 201.518234] should_fail.cold+0xa/0xf [ 201.522033] ? lock_acquire+0x170/0x3c0 [ 201.526014] ? setup_fault_attr+0x200/0x200 [ 201.530339] __alloc_pages_nodemask+0x239/0x2890 [ 201.535094] ? unwind_get_return_address+0x51/0x90 [ 201.540020] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.545399] ? __save_stack_trace+0xaf/0x190 [ 201.549812] ? kasan_kmalloc+0x139/0x160 [ 201.553869] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 201.558705] ? __lock_acquire+0x6de/0x3ff0 [ 201.562940] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.568331] ? mark_held_locks+0xf0/0xf0 [ 201.572393] ? mark_held_locks+0xf0/0xf0 [ 201.576450] ? mark_held_locks+0xf0/0xf0 [ 201.580515] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 201.585363] ? current_time+0x6f/0x1c0 [ 201.589261] alloc_pages_current+0x193/0x2a0 [ 201.593683] pte_alloc_one+0x16/0x190 [ 201.597490] __pte_alloc+0x21/0x340 [ 201.601121] do_anonymous_page+0xff4/0x1be0 [ 201.605445] ? lock_acquire+0x170/0x3c0 [ 201.609591] ? __pmd_alloc+0x147/0x440 [ 201.613479] ? __pte_alloc+0x340/0x340 [ 201.617362] ? do_raw_spin_unlock+0x171/0x230 [ 201.621860] ? _raw_spin_unlock+0x29/0x40 [ 201.626005] __handle_mm_fault+0x227a/0x41c0 [ 201.630410] ? vm_insert_page+0x9c0/0x9c0 [ 201.634545] ? atime_needs_update+0x5f0/0x5f0 [ 201.639045] ? check_preemption_disabled+0x41/0x280 [ 201.644061] handle_mm_fault+0x436/0xb10 [ 201.648117] __get_user_pages+0x6f0/0x1710 [ 201.652389] ? follow_page_mask+0x1d00/0x1d00 [ 201.656876] ? __se_sys_copy_file_range+0x410/0x410 [ 201.661895] ? fsnotify+0x84e/0xe10 [ 201.665534] get_user_pages_remote+0x220/0x460 [ 201.670139] copy_strings.isra.0+0x460/0x9c0 [ 201.674741] ? search_binary_handler+0xa0/0xa0 [ 201.679672] ? prepare_binprm+0x657/0x890 [ 201.683826] ? lock_downgrade+0x720/0x720 [ 201.687981] ? install_exec_creds+0x170/0x170 [ 201.692489] copy_strings_kernel+0x9e/0x110 [ 201.696816] __do_execve_file+0xfe6/0x2360 [ 201.701065] ? open_exec+0x70/0x70 [ 201.704615] ? check_preemption_disabled+0x41/0x280 [ 201.709638] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 201.714833] ? __phys_addr+0x9a/0x110 [ 201.718642] ? __check_object_size+0x17b/0x3e0 [ 201.723239] do_execveat+0x3d/0x50 [ 201.726788] __x64_sys_execveat+0xe1/0x120 [ 201.731039] do_syscall_64+0xf9/0x620 [ 201.734850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.740043] RIP: 0033:0x4665f9 [ 201.743247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 201.762336] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 14:41:00 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f00000000364c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=[&(0x7f00000001c0)='%2)\x00'], &(0x7f0000000340)=[&(0x7f0000000280)='freezer.state\x00'], 0x800) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80428, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x6) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000140)='freezer.state\x00', 0x0, 0x0) [ 201.770048] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 201.777318] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 201.784614] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 201.791887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.799151] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 [ 201.818625] CPU: 1 PID: 14552 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0 [ 201.826528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.835885] Call Trace: [ 201.838489] dump_stack+0x1fc/0x2ef [ 201.842156] should_fail.cold+0xa/0xf [ 201.845965] ? lock_acquire+0x170/0x3c0 [ 201.849950] ? setup_fault_attr+0x200/0x200 [ 201.854293] __alloc_pages_nodemask+0x239/0x2890 [ 201.859054] ? __lock_acquire+0x6de/0x3ff0 [ 201.863301] ? lock_downgrade+0x720/0x720 [ 201.867461] ? check_preemption_disabled+0x41/0x280 [ 201.872486] ? mark_held_locks+0xf0/0xf0 [ 201.876557] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 201.881406] ? current_time+0x6f/0x1c0 [ 201.885318] ? __pud_alloc+0xd6/0x240 [ 201.889129] ? lock_downgrade+0x720/0x720 [ 201.894159] ? lock_acquire+0x170/0x3c0 [ 201.898151] alloc_pages_current+0x193/0x2a0 [ 201.902586] __pmd_alloc+0x37/0x440 [ 201.906225] __handle_mm_fault+0x1760/0x41c0 [ 201.910653] ? vm_insert_page+0x9c0/0x9c0 [ 201.914808] ? atime_needs_update+0x5f0/0x5f0 14:41:00 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 201.919325] ? check_preemption_disabled+0x41/0x280 [ 201.924414] handle_mm_fault+0x436/0xb10 [ 201.928498] __get_user_pages+0x6f0/0x1710 [ 201.932753] ? follow_page_mask+0x1d00/0x1d00 [ 201.937258] ? __se_sys_copy_file_range+0x410/0x410 [ 201.942288] ? fsnotify+0x84e/0xe10 [ 201.946061] get_user_pages_remote+0x220/0x460 [ 201.950657] copy_strings.isra.0+0x460/0x9c0 [ 201.955077] ? search_binary_handler+0xa0/0xa0 [ 201.959725] ? prepare_binprm+0x657/0x890 [ 201.963880] ? lock_downgrade+0x720/0x720 [ 201.968033] ? install_exec_creds+0x170/0x170 [ 201.972546] copy_strings_kernel+0x9e/0x110 [ 201.976887] __do_execve_file+0xfe6/0x2360 [ 201.981132] ? open_exec+0x70/0x70 [ 201.984683] ? check_preemption_disabled+0x41/0x280 [ 201.989704] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 201.994896] ? __phys_addr+0x9a/0x110 [ 201.998705] ? __check_object_size+0x17b/0x3e0 [ 202.003297] do_execveat+0x3d/0x50 [ 202.006851] __x64_sys_execveat+0xe1/0x120 [ 202.011098] do_syscall_64+0xf9/0x620 [ 202.014914] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.020118] RIP: 0033:0x4665f9 [ 202.023314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 202.042221] RSP: 002b:00007f430431b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 202.049963] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 202.057238] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 202.064946] RBP: 00007f430431b1d0 R08: 0000000000001100 R09: 0000000000000000 14:41:00 executing program 5 (fault-call:2 fault-nth:17): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 202.072227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 202.073475] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 202.079598] R13: 00007ffc4b5b778f R14: 00007f430431b300 R15: 0000000000022000 [ 202.114305] FAULT_INJECTION: forcing a failure. [ 202.114305] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 202.144991] CPU: 1 PID: 14581 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 202.152894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.162247] Call Trace: [ 202.164846] dump_stack+0x1fc/0x2ef [ 202.168491] should_fail.cold+0xa/0xf [ 202.172301] ? lock_acquire+0x170/0x3c0 [ 202.176288] ? setup_fault_attr+0x200/0x200 [ 202.180628] __alloc_pages_nodemask+0x239/0x2890 [ 202.185483] ? unwind_get_return_address+0x51/0x90 [ 202.190435] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.195805] ? __save_stack_trace+0xaf/0x190 [ 202.200239] ? kasan_kmalloc+0x139/0x160 [ 202.204307] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 202.209158] ? __lock_acquire+0x6de/0x3ff0 [ 202.213413] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.218788] ? mark_held_locks+0xf0/0xf0 [ 202.222860] ? mark_held_locks+0xf0/0xf0 [ 202.226932] ? mark_held_locks+0xf0/0xf0 [ 202.231529] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 202.235513] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 202.236375] ? current_time+0x6f/0x1c0 [ 202.236398] alloc_pages_current+0x193/0x2a0 [ 202.236421] pte_alloc_one+0x16/0x190 [ 202.255570] __pte_alloc+0x21/0x340 [ 202.259201] do_anonymous_page+0xff4/0x1be0 [ 202.263522] ? lock_acquire+0x170/0x3c0 [ 202.267486] ? __pmd_alloc+0x147/0x440 [ 202.271369] ? __pte_alloc+0x340/0x340 [ 202.275253] ? do_raw_spin_unlock+0x171/0x230 [ 202.279752] ? _raw_spin_unlock+0x29/0x40 [ 202.283894] __handle_mm_fault+0x227a/0x41c0 [ 202.288304] ? vm_insert_page+0x9c0/0x9c0 [ 202.292448] ? atime_needs_update+0x5f0/0x5f0 [ 202.296940] ? check_preemption_disabled+0x41/0x280 [ 202.301960] handle_mm_fault+0x436/0xb10 [ 202.306012] __get_user_pages+0x6f0/0x1710 [ 202.310246] ? follow_page_mask+0x1d00/0x1d00 [ 202.314736] ? __se_sys_copy_file_range+0x410/0x410 [ 202.319741] ? fsnotify+0x84e/0xe10 [ 202.323369] get_user_pages_remote+0x220/0x460 [ 202.327947] copy_strings.isra.0+0x460/0x9c0 [ 202.332356] ? search_binary_handler+0xa0/0xa0 [ 202.336925] ? prepare_binprm+0x657/0x890 [ 202.341147] ? lock_downgrade+0x720/0x720 [ 202.345283] ? install_exec_creds+0x170/0x170 [ 202.349772] copy_strings_kernel+0x9e/0x110 [ 202.354092] __do_execve_file+0xfe6/0x2360 [ 202.358359] ? open_exec+0x70/0x70 [ 202.361890] ? check_preemption_disabled+0x41/0x280 [ 202.366906] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 202.372079] ? __phys_addr+0x9a/0x110 [ 202.375870] ? __check_object_size+0x17b/0x3e0 [ 202.380619] do_execveat+0x3d/0x50 [ 202.384168] __x64_sys_execveat+0xe1/0x120 [ 202.388397] do_syscall_64+0xf9/0x620 [ 202.392189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.397381] RIP: 0033:0x4665f9 14:41:01 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 202.400565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 202.419451] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 202.427151] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 202.434415] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 202.441692] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 202.448946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 202.456459] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 14:41:01 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:01 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c4602000000"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 202.525927] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 202.554270] squashfs: SQUASHFS error: unable to read squashfs_super_block 14:41:01 executing program 5 (fault-call:2 fault-nth:18): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:01 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x1) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) bind$can_raw(0xffffffffffffffff, &(0x7f0000000000), 0x10) 14:41:01 executing program 0: syz_80211_inject_frame(&(0x7f0000000000)=@broadcast, &(0x7f0000000040)=@data_frame={@no_qos=@type00={{0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1}, {0x7ff8}, @broadcast, @device_b, @random="70957ecaa4a7", {0x0, 0x81}}, @a_msdu=[{@device_b, @device_a, 0x42, "1a9f9ffc9319ed670309eb27321f820eb2fdb25b00e8c67887a26d371dbb281046d7139f6541b00a05ff388bf66ae95b855f023eb4d13343389eeb08be661f7fb5cb"}]}, 0x68) syz_80211_inject_frame(&(0x7f00000000c0)=@device_b, &(0x7f0000000340)=@data_frame={@qos_ht={{{@type11={{0x0, 0x2, 0xf, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1}, {0x8}, @device_a, @device_b, @device_b, {0x6, 0x1}, @device_b}, {0xc, 0x1, 0x1, 0x0, 0x5}}, {@type11={{0x0, 0x2, 0x9, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1}, {0x6}, @broadcast, @device_a, @random="c31e43f6c2af", {0x4}}, {0x3, 0x1, 0x3, 0x1, 0x3}}}, @ver_80211n={0x0, 0x40, 0x0, 0x2, 0x0, 0x2, 0x1, 0x0, 0x1}}, @random="afe401d7f9fb014e8ca1019065b1368a82809541679c5044692bdd0697f86fbfeab296d0d6c6cb5be21a96681aadd26a51da34a1c2f16782a2717044e2965bad079931292f4a967051e131c1f6778c944103defa7c0e25e5e74c634af8b4613f09f05f2c89f7db1339553be112a4fb449d70a85d21e023bb97a0c771730fadaecd840faab0aed2db830bd5c37a46b678cd4a89b83af44c8db0e5e7f2fe84e94290755ccc2d5074e67482d3aa1055cb72a3095d3253df5fad2d9a6b6c269cefc65bac872852d1807712754af620fabeb32ae76bd77128d2f5133347a6515932d05369876bf26a917b761a3658f8d73605d61f2bc2af234b"}, 0x13b) r0 = memfd_create(&(0x7f00000001c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\"\x9f3\xbbs\xafR\"\x0f\x1c\x90r\xc2\x10\xcb\xe0\xa4a\x04\xd7A3\x02\xef\x81u\xbe\f\x9d\x85\xeehywWv_\x1a<\n\xd9}\x98\xa2\xf6\x10\xfe\xf6\x84\x97\x00\f\x01 \x17\xa2\xed\x0f\xc6\x15\xa3^@\xfd\x88\x01\xf5)\x7fl\xbe$w\x0f\xf2\xa5~\xf0\x01\xc3k\x8c\xb8\xf1\x89\xcd\xdd*\x8cX;\x1fQ\xd9\x95! }\x06\xc1\xcb ;\xf40Y\xe7\\\xed|IS\xff\x8b\xf2\xbf\x1462\xe6\xbb\xbe\xe8r\xb2\xa3\x02\x8bM\xc8\x0e2\x03V\x85+\xa8\x18\xb6\xc5y\x9b\xc7\xa3\xebYI\xfd\xd4u\xc1\x82\x92F4\x17u\xc7m\xbaxd\xe6\xba\'\xb7H\x85/y\xc0\x8f\b\x80\x1d\x1dgz\'\xa4\xef\xbb\xca\xe7\xd4\xf7\t\x9a+\xf2\xf2\xcai', 0x2) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) close(r0) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) syz_80211_inject_frame(&(0x7f0000000140)=@device_b, &(0x7f0000000480)=@data_frame={@qos_no_ht={{@type01={{0x0, 0x2, 0xf, 0x0, 0x1, 0x1, 0x1, 0x1}, {0x1}, @device_b, @random="8e607b9eaf35", @broadcast, {0x1, 0x3f}}, {0x7, 0x1, 0x2, 0x0, 0x81}}, {@type11={{0x0, 0x2, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1}, {0x4}, @device_a, @broadcast, @initial, {0x5, 0x1}, @device_b}, {0x1, 0x1, 0x3, 0x1, 0x5}}}, @a_msdu=[{@broadcast, @broadcast, 0x3c, "d1b59dc733722e9e1486c994716eb6d46a9a80b39ee1260797192da97b4dcadb2d620859359434afa8836cc802f58d3c7491347d305e5f119ced5837"}]}, 0x86) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x9, 0x30, r0, 0xb28a5000) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x64001, 0xc4) 14:41:01 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1102) 14:41:01 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1402, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:41:01 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 202.705654] FAULT_INJECTION: forcing a failure. [ 202.705654] name failslab, interval 1, probability 0, space 0, times 0 [ 202.732341] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 202.748749] CPU: 0 PID: 14613 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 202.749051] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 202.756734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.756741] Call Trace: [ 202.756764] dump_stack+0x1fc/0x2ef [ 202.756785] should_fail.cold+0xa/0xf [ 202.756804] ? setup_fault_attr+0x200/0x200 [ 202.756828] ? lock_acquire+0x170/0x3c0 [ 202.756852] __should_failslab+0x115/0x180 [ 202.756870] should_failslab+0x5/0x10 [ 202.756885] kmem_cache_alloc+0x277/0x370 [ 202.756903] ptlock_alloc+0x1d/0x70 [ 202.756919] pte_alloc_one+0x68/0x190 [ 202.756932] __pte_alloc+0x21/0x340 [ 202.756949] do_anonymous_page+0xff4/0x1be0 [ 202.821109] ? lock_acquire+0x170/0x3c0 [ 202.825093] ? __pmd_alloc+0x147/0x440 [ 202.828989] ? __pte_alloc+0x340/0x340 [ 202.832885] ? do_raw_spin_unlock+0x171/0x230 [ 202.837389] ? _raw_spin_unlock+0x29/0x40 [ 202.837462] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 202.841546] __handle_mm_fault+0x227a/0x41c0 [ 202.841567] ? vm_insert_page+0x9c0/0x9c0 [ 202.841579] ? atime_needs_update+0x5f0/0x5f0 [ 202.841607] ? check_preemption_disabled+0x41/0x280 [ 202.868752] handle_mm_fault+0x436/0xb10 [ 202.872842] __get_user_pages+0x6f0/0x1710 [ 202.877089] ? follow_page_mask+0x1d00/0x1d00 [ 202.881588] ? __se_sys_copy_file_range+0x410/0x410 [ 202.884356] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 202.886614] ? fsnotify+0x84e/0xe10 [ 202.886639] get_user_pages_remote+0x220/0x460 [ 202.886660] copy_strings.isra.0+0x460/0x9c0 [ 202.908266] ? search_binary_handler+0xa0/0xa0 [ 202.912921] ? prepare_binprm+0x657/0x890 [ 202.917050] ? lock_downgrade+0x720/0x720 [ 202.921178] ? install_exec_creds+0x170/0x170 [ 202.925656] copy_strings_kernel+0x9e/0x110 [ 202.930050] __do_execve_file+0xfe6/0x2360 [ 202.934271] ? open_exec+0x70/0x70 [ 202.937811] ? check_preemption_disabled+0x41/0x280 [ 202.942813] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 202.947985] ? __phys_addr+0x9a/0x110 [ 202.951769] ? __check_object_size+0x17b/0x3e0 [ 202.956332] do_execveat+0x3d/0x50 [ 202.959857] __x64_sys_execveat+0xe1/0x120 [ 202.964075] do_syscall_64+0xf9/0x620 [ 202.967859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.973033] RIP: 0033:0x4665f9 [ 202.976229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 202.995108] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 14:41:01 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x141800) setuid(0xffffffffffffffff) ftruncate(r1, 0x100000000) symlinkat(&(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') 14:41:01 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1103) 14:41:01 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 203.002879] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 203.010140] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 203.017399] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 203.024647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 203.031897] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 14:41:01 executing program 5 (fault-call:2 fault-nth:19): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:01 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) r1 = syz_open_dev$radio(&(0x7f0000000540), 0x2, 0x2) sendfile(r1, r0, 0x0, 0x7f) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 203.101966] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:41:02 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:02 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1104) [ 203.182398] FAULT_INJECTION: forcing a failure. [ 203.182398] name failslab, interval 1, probability 0, space 0, times 0 [ 203.199521] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 203.207848] CPU: 0 PID: 14652 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 203.216441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.222502] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 203.226227] Call Trace: [ 203.226252] dump_stack+0x1fc/0x2ef [ 203.226279] should_fail.cold+0xa/0xf [ 203.241686] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 203.245434] ? setup_fault_attr+0x200/0x200 [ 203.245450] ? lock_acquire+0x170/0x3c0 [ 203.245470] __should_failslab+0x115/0x180 [ 203.266985] should_failslab+0x5/0x10 [ 203.270891] kmem_cache_alloc+0x277/0x370 [ 203.275059] __anon_vma_prepare+0x5d/0x560 14:41:02 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x25) [ 203.279302] ? _raw_spin_unlock+0x29/0x40 [ 203.283464] do_anonymous_page+0x14db/0x1be0 [ 203.287887] ? lock_acquire+0x170/0x3c0 [ 203.291869] ? __pmd_alloc+0x147/0x440 [ 203.295774] ? __pte_alloc+0x340/0x340 [ 203.299666] ? do_raw_spin_unlock+0x171/0x230 [ 203.304167] ? _raw_spin_unlock+0x29/0x40 [ 203.308325] __handle_mm_fault+0x227a/0x41c0 [ 203.312752] ? mark_held_locks+0xa6/0xf0 [ 203.316828] ? vm_insert_page+0x9c0/0x9c0 [ 203.321003] ? check_preemption_disabled+0x41/0x280 [ 203.326045] handle_mm_fault+0x436/0xb10 [ 203.330206] __get_user_pages+0x6f0/0x1710 [ 203.334458] ? follow_page_mask+0x1d00/0x1d00 [ 203.338964] ? __se_sys_copy_file_range+0x410/0x410 [ 203.343987] ? fsnotify+0x84e/0xe10 [ 203.347634] get_user_pages_remote+0x220/0x460 [ 203.352235] copy_strings.isra.0+0x460/0x9c0 [ 203.356661] ? search_binary_handler+0xa0/0xa0 [ 203.361257] ? prepare_binprm+0x657/0x890 [ 203.365412] ? lock_downgrade+0x720/0x720 [ 203.369571] ? install_exec_creds+0x170/0x170 [ 203.374252] copy_strings_kernel+0x9e/0x110 [ 203.378845] __do_execve_file+0xfe6/0x2360 14:41:02 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x300000d, 0x20010, r0, 0x1b7ba000) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 203.383088] ? open_exec+0x70/0x70 [ 203.386645] ? check_preemption_disabled+0x41/0x280 [ 203.391667] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 203.396855] ? __phys_addr+0x9a/0x110 [ 203.400664] ? __check_object_size+0x17b/0x3e0 [ 203.405258] do_execveat+0x3d/0x50 [ 203.408818] __x64_sys_execveat+0xe1/0x120 [ 203.413063] do_syscall_64+0xf9/0x620 [ 203.416965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.422160] RIP: 0033:0x4665f9 14:41:02 executing program 0: sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x40, 0x2, 0x9, 0x0, 0x0, 0x0, {0x5, 0x0, 0x5}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x80000000}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x5}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1e}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x5}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x3f}]}, 0x40}, 0x1, 0x0, 0x0, 0x2800c001}, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x600000, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000005c0)={&(0x7f0000000500), 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x14, 0x2, 0x1, 0x801, 0x0, 0x0, {0x5, 0x0, 0x6}}, 0x14}, 0x1, 0x0, 0x0, 0x4080}, 0x4000001) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB='\x00ELF'], 0x3c) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)=@delsa={0x1e8, 0x11, 0x100, 0x70bd26, 0x25dfdbfb, {@in6=@empty, 0x4d2, 0x2, 0x2b}, [@replay_thresh={0x8, 0xb, 0x8}, @sec_ctx={0xd4, 0x8, {0xd0, 0x8, 0x1, 0x6, 0xc8, "a363b705ad092260604e8921e8f6beb671e471f91753032d6125ef8544af1526fc138a916875879482ec8a0f09f9fcab4d744fcda6fcac81cc90c428fec52b1e9da220facdc3424ab05f3fdf82ab5138efbdd8b2799c0f1e647f6503128a793dd21cce998e9cfd0759b2500e9a3be5465771233788030b80a87c1c3f9918d91dd39501e23f4fe4407f78d2d16be14411a8f417e1ba6b308d40834abe08e6d31cf64c0bb53757ad00ae0713a0a1c28aef5b5fff89c524a2e7b68414d139791d711ca1b9b956354300"}}, @algo_aead={0xe2, 0x12, {{'aegis128l-aesni\x00'}, 0x4b0, 0x40, "1e98e187e68a3fb19f6ec0dcb374801f3a25c5577a5baacf939882b9d350ad79712a0d34ce665a4fc1272291e7a75b61777425c6a5e72483af04d0cad61d16c3bb6d917e28be2b4ce1a85d0209d512a0665771d534b5ce5a27480d826f731ec70d9dd743a427cab68dee64ab17e65f04eb3036bc7db3e71f510252e6bb2b92fb5eab8a1b33a17e67d6ef0b83ca3dc2383cee4a51ade5"}}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x800}, 0x2084) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) [ 203.425356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 203.444264] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 203.451980] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 203.459279] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 203.466735] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 203.474014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:41:02 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1403, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 203.481285] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 14:41:02 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c4602"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:02 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:02 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1105) [ 203.576721] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:41:02 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:02 executing program 5 (fault-call:2 fault-nth:20): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:02 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e6c0470186fd757f2abb22efd52c31a891ee398a967cdeb7b822aa04fadadc2f4aeaebb5090f277b3d2d51d3643b64e0e565cd4f3faf58eb96a45079e7012dca2873fa065e9bf3733a49f0610151a6139e807d0585261fe9177fe8f5add3540bd5920f0599025dfb8c707334e0534"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:02 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1404, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:41:02 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1106) 14:41:02 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100), 0x40000, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESHEX=r0], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 203.777229] FAULT_INJECTION: forcing a failure. [ 203.777229] name failslab, interval 1, probability 0, space 0, times 0 [ 203.794857] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 203.834723] CPU: 1 PID: 14718 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 203.842634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.852076] Call Trace: [ 203.854674] dump_stack+0x1fc/0x2ef [ 203.858316] should_fail.cold+0xa/0xf [ 203.862129] ? setup_fault_attr+0x200/0x200 [ 203.866484] ? lock_acquire+0x170/0x3c0 [ 203.870474] __should_failslab+0x115/0x180 [ 203.874809] should_failslab+0x5/0x10 [ 203.878611] kmem_cache_alloc+0x277/0x370 14:41:02 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975e99d51b1cec6ddaa76e184300"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_CPUID(r4, 0xaea3, 0x0) r5 = dup3(r1, r3, 0x0) dup2(r5, r4) write(r5, &(0x7f0000000100)="45f3257a706de69a81e5484f4bc5f3ab6c1cfae7dbc1e1a8a78583ef9bf636054c9e88f86e608a1547a8f74e640a17620e30192816d2efa2295fccbd26f8a13e2e5286f88e9c90b3c02ca1d9c1b5cd63ffa69a2aab", 0x55) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x3, 0x10}, &(0x7f0000000080)=0xc) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES64=0x0], 0x9c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 203.882771] __anon_vma_prepare+0x2d3/0x560 [ 203.887098] ? _raw_spin_unlock+0x29/0x40 [ 203.891261] do_anonymous_page+0x14db/0x1be0 [ 203.895682] ? lock_acquire+0x170/0x3c0 [ 203.899661] ? __pmd_alloc+0x147/0x440 [ 203.903555] ? __pte_alloc+0x340/0x340 [ 203.907453] ? do_raw_spin_unlock+0x171/0x230 [ 203.911954] ? _raw_spin_unlock+0x29/0x40 [ 203.916111] __handle_mm_fault+0x227a/0x41c0 [ 203.920571] ? vm_insert_page+0x9c0/0x9c0 [ 203.924744] ? atime_needs_update+0x5f0/0x5f0 [ 203.929389] ? check_preemption_disabled+0x41/0x280 [ 203.934402] handle_mm_fault+0x436/0xb10 [ 203.938459] __get_user_pages+0x6f0/0x1710 [ 203.942697] ? follow_page_mask+0x1d00/0x1d00 [ 203.947197] ? __se_sys_copy_file_range+0x410/0x410 [ 203.952220] ? fsnotify+0x84e/0xe10 [ 203.955835] get_user_pages_remote+0x220/0x460 [ 203.960422] copy_strings.isra.0+0x460/0x9c0 [ 203.964818] ? search_binary_handler+0xa0/0xa0 [ 203.969388] ? prepare_binprm+0x657/0x890 [ 203.973533] ? lock_downgrade+0x720/0x720 [ 203.977661] ? install_exec_creds+0x170/0x170 [ 203.982138] copy_strings_kernel+0x9e/0x110 [ 203.986440] __do_execve_file+0xfe6/0x2360 [ 203.990659] ? open_exec+0x70/0x70 [ 203.994450] ? check_preemption_disabled+0x41/0x280 [ 203.999457] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 204.004638] ? __phys_addr+0x9a/0x110 [ 204.008421] ? __check_object_size+0x17b/0x3e0 [ 204.012997] do_execveat+0x3d/0x50 [ 204.016524] __x64_sys_execveat+0xe1/0x120 [ 204.020741] do_syscall_64+0xf9/0x620 [ 204.024527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.029696] RIP: 0033:0x4665f9 [ 204.032875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 204.051967] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 204.059678] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 204.066968] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 204.074224] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 14:41:02 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1107) 14:41:02 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 204.081486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 204.088772] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 14:41:02 executing program 5 (fault-call:2 fault-nth:21): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 204.135585] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:41:03 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) memfd_create(&(0x7f0000000100)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x2) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f4581f3"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:03 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f45"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 204.204290] FAULT_INJECTION: forcing a failure. [ 204.204290] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:41:03 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1405, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) [ 204.250492] CPU: 1 PID: 14748 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 204.258399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.267755] Call Trace: [ 204.270372] dump_stack+0x1fc/0x2ef [ 204.274009] should_fail.cold+0xa/0xf [ 204.277817] ? lock_acquire+0x170/0x3c0 [ 204.281826] ? setup_fault_attr+0x200/0x200 [ 204.286164] __alloc_pages_nodemask+0x239/0x2890 [ 204.290927] ? __x64_sys_execveat+0xe1/0x120 [ 204.295342] ? do_syscall_64+0xf9/0x620 [ 204.299464] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.304842] ? mark_held_locks+0xf0/0xf0 [ 204.309004] ? mark_held_locks+0xf0/0xf0 [ 204.309238] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 204.313070] ? __lock_acquire+0x6de/0x3ff0 [ 204.313088] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 204.313102] ? should_fail+0x142/0x7b0 [ 204.313114] ? fs_reclaim_release+0xd0/0x110 [ 204.313135] ? __anon_vma_prepare+0x2a6/0x560 [ 204.313152] ? lock_downgrade+0x720/0x720 14:41:03 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1108) [ 204.313170] ? lock_downgrade+0x720/0x720 [ 204.313185] ? __anon_vma_prepare+0xc2/0x560 [ 204.313204] alloc_pages_vma+0xf2/0x780 [ 204.313223] do_anonymous_page+0x7c2/0x1be0 [ 204.365712] ? __pmd_alloc+0x147/0x440 [ 204.369697] ? __pte_alloc+0x340/0x340 [ 204.373593] ? do_raw_spin_unlock+0x171/0x230 [ 204.378097] ? _raw_spin_unlock+0x29/0x40 [ 204.382265] __handle_mm_fault+0x227a/0x41c0 [ 204.386865] ? vm_insert_page+0x9c0/0x9c0 [ 204.391028] ? atime_needs_update+0x5f0/0x5f0 [ 204.395568] ? check_preemption_disabled+0x41/0x280 14:41:03 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 204.400598] handle_mm_fault+0x436/0xb10 [ 204.404666] __get_user_pages+0x6f0/0x1710 [ 204.408909] ? follow_page_mask+0x1d00/0x1d00 [ 204.413409] ? __se_sys_copy_file_range+0x410/0x410 [ 204.418435] ? fsnotify+0x84e/0xe10 [ 204.422080] get_user_pages_remote+0x220/0x460 [ 204.426687] copy_strings.isra.0+0x460/0x9c0 [ 204.431248] ? search_binary_handler+0xa0/0xa0 [ 204.435840] ? prepare_binprm+0x657/0x890 [ 204.439994] ? lock_downgrade+0x720/0x720 [ 204.444150] ? install_exec_creds+0x170/0x170 [ 204.448657] copy_strings_kernel+0x9e/0x110 [ 204.452985] __do_execve_file+0xfe6/0x2360 [ 204.457221] ? open_exec+0x70/0x70 [ 204.460767] ? check_preemption_disabled+0x41/0x280 [ 204.465882] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 204.471194] ? __phys_addr+0x9a/0x110 [ 204.474991] ? __check_object_size+0x17b/0x3e0 [ 204.479558] do_execveat+0x3d/0x50 [ 204.483088] __x64_sys_execveat+0xe1/0x120 [ 204.487308] do_syscall_64+0xf9/0x620 [ 204.491116] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.496296] RIP: 0033:0x4665f9 [ 204.499521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 204.518406] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 204.526138] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 204.533494] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 204.540758] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 14:41:03 executing program 0: memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x222180, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x46) recvmmsg$unix(r0, &(0x7f0000003d80)=[{{&(0x7f0000000100), 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)=""/126, 0x7e}], 0x1, &(0x7f0000000240)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88}}, {{&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000001900)=[{&(0x7f0000000380)=""/142, 0x8e}, {&(0x7f0000000440)=""/193, 0xc1}, {&(0x7f0000000540)=""/109, 0x6d}, {&(0x7f00000005c0)=""/84, 0x54}, {&(0x7f0000000640)=""/156, 0x9c}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/207, 0xcf}, {&(0x7f0000001800)=""/217, 0xd9}], 0x8, &(0x7f0000001980)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f00000019c0), 0x6e, &(0x7f0000002f00)=[{&(0x7f0000001a40)=""/80, 0x50}, {&(0x7f0000001ac0)=""/95, 0x5f}, {&(0x7f0000001b40)=""/67, 0x43}, {&(0x7f0000001bc0)=""/114, 0x72}, {&(0x7f0000001c40)=""/51, 0x33}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000002c80)=""/180, 0xb4}, {&(0x7f0000002d40)=""/216, 0xd8}, {&(0x7f0000002e40)=""/129, 0x81}], 0x9, &(0x7f0000002fc0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f0000003080)=@abs, 0x6e, &(0x7f0000003200)=[{&(0x7f0000003100)=""/206, 0xce}], 0x1}}, {{&(0x7f0000003240), 0x6e, &(0x7f0000003500)=[{&(0x7f00000032c0)=""/142, 0x8e}, {&(0x7f0000003380)=""/69, 0x45}, {&(0x7f0000003400)=""/232, 0xe8}], 0x3, &(0x7f0000003540)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x50}}, {{&(0x7f00000035c0), 0x6e, &(0x7f0000003800)=[{&(0x7f0000003640)=""/148, 0x94}, {&(0x7f0000003700)=""/6, 0x6}, {&(0x7f0000003740)=""/135, 0x87}], 0x3, &(0x7f0000003840)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003880), 0x6e, &(0x7f0000003c00)=[{&(0x7f0000003900)=""/140, 0x8c}, {&(0x7f00000039c0)=""/201, 0xc9}, {&(0x7f0000003ac0)=""/68, 0x44}, {&(0x7f0000003b40)=""/119, 0x77}, {&(0x7f0000003bc0)=""/5, 0x5}], 0x5, &(0x7f0000003c80)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0xf8}}], 0x7, 0x40000000, &(0x7f0000003f40)={0x0, 0x989680}) memfd_create(&(0x7f0000004240)='+#),*(\x00', 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = syz_mount_image$gfs2meta(&(0x7f0000003f80), &(0x7f0000003fc0)='./file0\x00', 0x9, 0x6, &(0x7f0000006300)=[{&(0x7f0000004300)="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", 0x1000, 0xfffffffffffff800}, {&(0x7f0000004000)="51625f7aa734a93e561836a54fb0f155f4fee9abfaef81c2f2db774d8913d370d842e38d7e7bf7fe641fab995f9dd6cc2487598e23973b9a0fc1634256e0268538992a149dfdea9f68ab82b9e3ec02765ef1be1f9a4636e6ee0a03cb6bedfbe818adc23198ad6839bfa26123b90da8036e40a7b2fd912ba470479e649b791843dab7696674b4991dc42b389f60039e7361c4dc6ba966b7cd6bf5d73a23b431bc6022dafafdb424111c1e9ee4fc97939576d447856a99c8cd9245ab28ea25d49c6be8476614075febbc51920ac4f7917483fb4faeb3cdf4c4", 0xd8, 0x2d}, {&(0x7f0000004100)="11e8ba61b03d539156b50f72637af55f897d87f9fe8abf11e6703c3648fcb00fa80034cee6d62adb5b9d93cd9a28fe15585731c38234c044d7dc32567cd6accc872f56e8a55dde60853d1f1e341e1e2778803a7f6ac35c0ed499b122a43f8460e151c8b86ea2dcce6ca58f8bc95e4740926baf16f77410198ada218a29a71049f28613e003bd024defe44170", 0x8c, 0x72a}, {&(0x7f0000005300)="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", 0x1000, 0xd53f}, {&(0x7f00000041c0)="c93e1312392362a65129b0d1c3c75f492bdfeef3a5", 0x15, 0x7ff}, {&(0x7f0000004200)="4fc9e370bd9174e47cc364ba8a", 0xd, 0xae}], 0x860090, &(0x7f00000063c0)={[{'\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)'}, {'\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)'}], [{@uid_eq={'uid', 0x3d, r1}}, {@uid_lt={'uid<', r2}}, {@seclabel}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@pcr={'pcr', 0x3d, 0xd}}, {@appraise}, {@dont_hash}]}) execveat(r4, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x400) [ 204.548049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 204.555299] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 14:41:03 executing program 5 (fault-call:2 fault-nth:22): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:03 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0x3c) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) r1 = syz_mount_image$gfs2meta(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x200, 0x5, &(0x7f0000002340)=[{&(0x7f0000000180)="271fa81001a4295fff6ce974902c0684b9290dd9acfaa4c7b13ec836c74263351640304e4f5ae8d851b5da57dcec9f33c0362cdee149a2fb6919a0cf8f3dbdb859de3bf27217a8b8f2aa3cb5e847", 0x4e, 0x100000000}, {&(0x7f0000000200)="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", 0x1000, 0xfffffffffffffffd}, {&(0x7f0000001200)="02f01a3753751f0a7c6b9799bc6aa81ed84dd0f05a2562a3bde99fcab7dfaa1034d7fc6551e070b40ae7dc66494498634cd0120bc70cc47a1afafdf99ea0fd11ea15733d163ff3e042c2ee46b5b44930778aec68718e0892c5e765d5ddf74ef800f852dc1d0a1213c78ef42fa244226ce43931e8a89126974bf8d13a32c983779eb6d046820fc44c97fdcb9d12582a74291140a2df57981714696fe0b5068de38bd4412c45e38bd18cabb0fa2c447f021e19aee62ee23e5c80520b8ef5e5e11a1c2ba47ff960c01990cf2edc3bdd2d639b801c19e2", 0xd5, 0x7}, {&(0x7f0000001300)="9e80b01a6bcb75d403ecc547d1c82b965b62922775a1d1b61cec53b2fd2d0c3ea13a673e98999e924f4b2481f141", 0x2e, 0xffffffff80000000}, {&(0x7f0000001340)="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", 0x1000, 0x3}], 0x8, &(0x7f0000002c80)={[{'\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)'}, {'7]&'}, {'\'\\&!^\\)6.+:(^*'}, {'-/.'}, {'\\'}, {'\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)'}, {'\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009x\t+\xa5q\x17W\xbd\xe8\xd1\xa0\x8a\xce\x13\x1c\xb7\xf1\xccm\xcel\xa8g\x0f\xa3c\xf5\xca\xf9\xf3\x91\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06B\xd5J\x81\x86\xf1z\xd3\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\xabW\xac\rP\xf42\xb7\xc8\xaajnw\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97)\\\x96\xf0\x9b\xd9\xeb\x8b\xbf\x12\xf7\xd6\xb3\xff\x01\x00\x00gQz\xc0\xd6\x9fE\x1a\xed\x882\xef\xa3\xdb\xb3@\xdeH\xbd\xdf_f\x96\xd0O\xbb\x91h|\x9eq\xba\xaai\x13\x15=Rx\xd0)A^\xfd\x05\x9a\xff\xdcxk\x84f`\xa0\xdfU:%\xe8\xce|\x16\be\xcb\xb1\x8a\b\xf6\xe6\xf5\xf6;\xe1\xa4H\a\x00\x00\x00 \x98x\xf1\xfa6Rhw\xbb\x89f6t\x89\x80\xf1gl\xde/\f\xbe\xae|&\xe2\xfe\x1f\xc1\xc8J\xaa\x81\xf3\xf8\xe7\xea\x03\xcbg\x00\x00\x00(\x8ft<\xb4\xdb\x0f\x1a)F\x13\x7f\xf1\x8c\xafV\xa0VO\x04\xaaKL\xcc\xa3\x9dK\x92\x19\xc4\r@\xb2(\bE\xbc\x05\fP\xbb\x15T\xca>f$(3\xe1\xd8d\xaam\xdbZj-'}, {'\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)'}, {'\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)'}], [{@subj_role={'subj_role', 0x3d, '\'@'}}, {@smackfshat}, {@fsname}]}) mknodat$null(r1, &(0x7f00000027c0)='./file0\x00', 0x400, 0x103) [ 204.659343] FAULT_INJECTION: forcing a failure. [ 204.659343] name failslab, interval 1, probability 0, space 0, times 0 [ 204.673475] CPU: 0 PID: 14788 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 204.681379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.690738] Call Trace: [ 204.693331] dump_stack+0x1fc/0x2ef [ 204.696962] should_fail.cold+0xa/0xf [ 204.700847] ? setup_fault_attr+0x200/0x200 [ 204.705199] ? lock_acquire+0x170/0x3c0 [ 204.709183] __should_failslab+0x115/0x180 [ 204.711598] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 204.713419] should_failslab+0x5/0x10 [ 204.726286] kmem_cache_alloc_trace+0x284/0x380 [ 204.730964] load_elf_binary+0xdd/0x5050 [ 204.735052] ? lock_downgrade+0x720/0x720 [ 204.739183] ? lock_acquire+0x170/0x3c0 [ 204.743145] ? load_misc_binary+0xa3/0x1030 [ 204.747488] ? aa_capable+0xb80/0xb80 [ 204.751295] ? do_raw_read_unlock+0x3b/0x70 [ 204.755600] ? _raw_read_unlock+0x29/0x40 [ 204.759744] ? search_binary_handler.part.0+0xb8/0x4e0 [ 204.765034] ? elf_core_dump+0x4c10/0x4c10 [ 204.769258] ? lock_downgrade+0x720/0x720 [ 204.773386] ? lock_acquire+0x170/0x3c0 [ 204.777396] ? search_binary_handler.part.0+0x108/0x4e0 [ 204.782752] ? ima_file_mmap+0x130/0x130 [ 204.786804] search_binary_handler.part.0+0xf9/0x4e0 [ 204.791898] __do_execve_file+0x1357/0x2360 [ 204.796199] ? open_exec+0x70/0x70 [ 204.799741] ? check_preemption_disabled+0x41/0x280 [ 204.804745] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 204.809925] ? __phys_addr+0x9a/0x110 [ 204.813714] ? __check_object_size+0x17b/0x3e0 [ 204.818296] do_execveat+0x3d/0x50 [ 204.821830] __x64_sys_execveat+0xe1/0x120 [ 204.826057] do_syscall_64+0xf9/0x620 [ 204.829854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.835035] RIP: 0033:0x4665f9 [ 204.838207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 14:41:03 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:03 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1118) 14:41:03 executing program 5 (fault-call:2 fault-nth:23): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 204.857273] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 204.864967] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 204.872220] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 204.879471] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 204.886740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 204.893991] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 14:41:03 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1406, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:41:03 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 204.996563] FAULT_INJECTION: forcing a failure. [ 204.996563] name failslab, interval 1, probability 0, space 0, times 0 [ 205.008607] CPU: 1 PID: 14801 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 205.016607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.025967] Call Trace: [ 205.028558] dump_stack+0x1fc/0x2ef [ 205.032187] should_fail.cold+0xa/0xf [ 205.036002] ? setup_fault_attr+0x200/0x200 [ 205.040330] ? lock_acquire+0x170/0x3c0 [ 205.044304] __should_failslab+0x115/0x180 [ 205.048523] should_failslab+0x5/0x10 [ 205.052324] kmem_cache_alloc_trace+0x284/0x380 [ 205.056986] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 205.061556] load_elf_binary+0xdd/0x5910 [ 205.065788] ? lock_acquire+0x170/0x3c0 [ 205.069760] ? load_misc_binary+0xa3/0x1030 [ 205.074080] ? aa_capable+0xb80/0xb80 [ 205.077872] ? do_raw_read_unlock+0x3b/0x70 [ 205.082183] ? _raw_read_unlock+0x29/0x40 [ 205.086324] ? search_binary_handler.part.0+0xb8/0x4e0 [ 205.091605] ? elf_map.isra.0+0x210/0x210 [ 205.095756] ? lock_downgrade+0x720/0x720 [ 205.099948] ? lock_acquire+0x170/0x3c0 [ 205.104100] ? search_binary_handler.part.0+0x108/0x4e0 [ 205.109456] ? ima_file_mmap+0x130/0x130 [ 205.113518] search_binary_handler.part.0+0xf9/0x4e0 [ 205.118812] __do_execve_file+0x1357/0x2360 [ 205.123147] ? open_exec+0x70/0x70 [ 205.126697] ? check_preemption_disabled+0x41/0x280 [ 205.131730] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 205.137615] ? __phys_addr+0x9a/0x110 [ 205.141443] ? __check_object_size+0x17b/0x3e0 [ 205.146017] do_execveat+0x3d/0x50 [ 205.149547] __x64_sys_execveat+0xe1/0x120 [ 205.153773] do_syscall_64+0xf9/0x620 [ 205.157578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.162751] RIP: 0033:0x4665f9 [ 205.165924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 205.184821] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 14:41:04 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x112f) [ 205.192550] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 205.199827] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 205.207435] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 205.214688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 205.221962] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 14:41:04 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_CPUID(r5, 0xaea3, 0x0) r6 = dup3(r2, r4, 0x0) dup2(r6, r5) tee(r1, r6, 0x7, 0x1) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:04 executing program 5 (fault-call:2 fault-nth:24): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:04 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x113c) 14:41:04 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:04 executing program 2: r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x94282, 0x100) r1 = socket$inet6(0xa, 0x3, 0x30) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={@empty, 0x0, r3}) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x4c8800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vxcan0\x00', 0x0}) sendmsg$nl_xfrm(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@report={0x74, 0x20, 0x400, 0x70bd2a, 0x25dfdbfd, {0x32, {@in=@empty, @in6=@empty, 0x4e24, 0x0, 0x4e21, 0x0, 0x2, 0x0, 0xc0, 0x6, r5, 0xee01}}, [@mark={0xc, 0x15, {0x350759, 0x9}}, @XFRMA_IF_ID={0x8, 0x1f, r3}, @coaddr={0x14, 0xe, @in=@empty}]}, 0x74}, 0x1, 0x0, 0x0, 0x10}, 0x20044005) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380), 0x100, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @remote, @private}, &(0x7f0000004180)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000004200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000041c0)={&(0x7f0000001480)=ANY=[@ANYBLOB="d81200002c00000228bd7000fddbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0600fcff0b001000f1ff070008000100753332008c1202000800010000000e00080001000700e0ff1400080076657468305f746f5f626f6e64000000080001000c0007003c120700701018000b0001006d697272656400004400028020000200060000000180000001000000060000000008000001000000", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="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"], 0x12d8}, 0x1, 0x0, 0x0, 0x48000}, 0x8081) r7 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r7, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r7, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0xaea3, 0x0) r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r8, 0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(r8, 0x0, 0x61, &(0x7f0000000400)={'filter\x00', 0x1000, "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"}, &(0x7f0000001440)=0x1024) 14:41:04 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1148) [ 205.366178] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:41:04 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 205.406991] FAULT_INJECTION: forcing a failure. [ 205.406991] name failslab, interval 1, probability 0, space 0, times 0 [ 205.435747] CPU: 1 PID: 14840 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 205.443663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.453029] Call Trace: [ 205.455627] dump_stack+0x1fc/0x2ef [ 205.459276] should_fail.cold+0xa/0xf [ 205.463121] ? setup_fault_attr+0x200/0x200 [ 205.467797] ? lock_acquire+0x170/0x3c0 [ 205.467817] __should_failslab+0x115/0x180 [ 205.476011] should_failslab+0x5/0x10 [ 205.479820] kmem_cache_alloc_trace+0x284/0x380 [ 205.484596] __request_module+0x31e/0xb80 [ 205.488751] ? search_binary_handler.part.0+0x2cc/0x4e0 [ 205.494130] ? free_modprobe_argv+0x90/0x90 [ 205.498468] ? lock_acquire+0x170/0x3c0 [ 205.502452] ? load_misc_binary+0xa3/0x1030 14:41:04 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x114c) [ 205.506778] ? aa_capable+0xb80/0xb80 [ 205.510585] ? do_raw_read_unlock+0x3b/0x70 [ 205.514923] ? _raw_read_unlock+0x29/0x40 [ 205.519173] ? search_binary_handler.part.0+0x227/0x4e0 [ 205.524553] ? lock_downgrade+0x720/0x720 [ 205.528708] ? lock_acquire+0x170/0x3c0 [ 205.532688] ? search_binary_handler.part.0+0x108/0x4e0 [ 205.533521] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 205.538063] search_binary_handler.part.0+0x2cc/0x4e0 [ 205.538085] __do_execve_file+0x1357/0x2360 [ 205.538108] ? open_exec+0x70/0x70 [ 205.560222] ? check_preemption_disabled+0x41/0x280 [ 205.565249] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 205.570452] ? __phys_addr+0x9a/0x110 [ 205.574263] ? __check_object_size+0x17b/0x3e0 [ 205.578863] do_execveat+0x3d/0x50 [ 205.582416] __x64_sys_execveat+0xe1/0x120 [ 205.586662] do_syscall_64+0xf9/0x620 [ 205.590473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.595664] RIP: 0033:0x4665f9 14:41:04 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 205.598859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 205.617827] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 205.625635] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 205.632910] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 205.640269] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 205.647550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 205.654832] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 14:41:04 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1407, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:41:04 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1168) 14:41:04 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) write$binfmt_misc(r0, &(0x7f0000000100)={'syz0', "4db9d9d6ee4abe37551b82d2fe5858719f60949f53b8067a8b93e280a61fb04bc9c8e375d64489f10ccd9fe5454a3ae7f28e6e62e184e80bbf4b621478aa432bf4b547e48d689fec12"}, 0x4d) 14:41:04 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_CPUID(r3, 0xaea3, 0x0) r4 = dup3(r1, r2, 0x80000) dup2(r4, r3) ioctl$LOOP_SET_FD(r4, 0x4c00, r0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46bb96084cd9ddc1e175a0dd1e60a300b72769183cdd66e7c61359e7c9a220188df4bdc868deacbfdcab84d0a0813f24087c3da4064a5743403e41676e222abf4d0c4cbeb34859ca9af53964a152ba363bebf3b343c115ecc9585878781330e8e0b66b81ba876a1e02d488d077128c505959a785ea16106d0165f162a073937bb396ab410a7ea3386276212f3ad364048c306bb5df05c40aa29afdbbd44c3dbb3adfe03a5f439c6ac6cf7677510f777a2134291042df644ecce33d76e20f"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pread64(r2, &(0x7f0000000ac0)=""/113, 0x71, 0x101) execveat(r5, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='\'*\x00', &(0x7f0000000280)='@[\\$\x00', &(0x7f00000002c0)='}\x00'], &(0x7f0000000a80)=[&(0x7f0000000340)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', &(0x7f0000000400)='/dev/kvm\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='/dev/kvm\x00', &(0x7f00000004c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', &(0x7f0000000980)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', &(0x7f0000000a40)='/dev/kvm\x00'], 0x800) 14:41:04 executing program 5 (fault-call:2 fault-nth:25): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:04 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(0xffffffffffffffff, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 205.815327] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 205.844703] FAULT_INJECTION: forcing a failure. [ 205.844703] name failslab, interval 1, probability 0, space 0, times 0 14:41:04 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1100) [ 205.868805] CPU: 1 PID: 14883 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 205.876827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.886371] Call Trace: [ 205.888969] dump_stack+0x1fc/0x2ef [ 205.892611] should_fail.cold+0xa/0xf [ 205.896426] ? setup_fault_attr+0x200/0x200 [ 205.900755] ? lock_acquire+0x170/0x3c0 [ 205.904738] __should_failslab+0x115/0x180 [ 205.908970] should_failslab+0x5/0x10 [ 205.912763] __kmalloc_track_caller+0x2a6/0x3c0 [ 205.917440] ? __request_module+0x33c/0xb80 [ 205.921755] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 205.926836] kstrdup+0x36/0x70 [ 205.930020] __request_module+0x33c/0xb80 [ 205.934155] ? search_binary_handler.part.0+0x2cc/0x4e0 [ 205.939508] ? free_modprobe_argv+0x90/0x90 [ 205.943921] ? lock_acquire+0x170/0x3c0 [ 205.947893] ? load_misc_binary+0xa3/0x1030 [ 205.952220] ? aa_capable+0xb80/0xb80 [ 205.956025] ? do_raw_read_unlock+0x3b/0x70 [ 205.960443] ? _raw_read_unlock+0x29/0x40 [ 205.964754] ? search_binary_handler.part.0+0x227/0x4e0 [ 205.970103] ? lock_downgrade+0x720/0x720 [ 205.974247] ? lock_acquire+0x170/0x3c0 [ 205.978262] ? search_binary_handler.part.0+0x108/0x4e0 [ 205.984500] search_binary_handler.part.0+0x2cc/0x4e0 [ 205.989696] __do_execve_file+0x1357/0x2360 [ 205.994024] ? open_exec+0x70/0x70 [ 205.997546] ? check_preemption_disabled+0x41/0x280 [ 206.002574] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 206.007757] ? __phys_addr+0x9a/0x110 [ 206.011566] ? __check_object_size+0x17b/0x3e0 [ 206.016138] do_execveat+0x3d/0x50 [ 206.019687] __x64_sys_execveat+0xe1/0x120 [ 206.023923] do_syscall_64+0xf9/0x620 [ 206.027745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.033002] RIP: 0033:0x4665f9 [ 206.036186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 206.055253] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 14:41:04 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x116c) 14:41:04 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) dup3(r1, r3, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRESDEC=r0, @ANYRES32=r1], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000000)=0xffff) [ 206.062951] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 206.070223] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 206.078094] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 206.085361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 206.092617] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 [ 206.124309] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:41:05 executing program 5 (fault-call:2 fault-nth:26): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:05 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1408, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:41:05 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1100) 14:41:05 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1174) 14:41:05 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) fadvise64(r0, 0x1, 0x4, 0x2) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1100) 14:41:05 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x181040, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_CPUID(r4, 0xaea3, 0x0) r5 = dup3(r1, r3, 0x0) dup2(r5, r4) execveat(r5, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000100)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', &(0x7f00000001c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)'], &(0x7f0000000640)=[&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', &(0x7f0000000380)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', &(0x7f0000000440)='@*:\'&#!{\'%\x00', &(0x7f0000000480)='*(\\\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='%,\x00', &(0x7f0000000540)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', &(0x7f0000000600)='&]&%\x00'], 0x100) 14:41:05 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1100) [ 206.273158] FAULT_INJECTION: forcing a failure. [ 206.273158] name failslab, interval 1, probability 0, space 0, times 0 [ 206.291064] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:41:05 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x117a) [ 206.335704] CPU: 1 PID: 14927 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 206.343608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.353050] Call Trace: [ 206.355654] dump_stack+0x1fc/0x2ef [ 206.359291] should_fail.cold+0xa/0xf [ 206.363095] ? setup_fault_attr+0x200/0x200 [ 206.367425] ? lock_acquire+0x170/0x3c0 [ 206.371396] __should_failslab+0x115/0x180 [ 206.375646] should_failslab+0x5/0x10 [ 206.379435] kmem_cache_alloc_trace+0x284/0x380 [ 206.384101] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 206.389106] ? dec_ucount+0x200/0x200 [ 206.392896] call_usermodehelper_setup+0x84/0x300 [ 206.397728] __request_module+0x42e/0xb80 [ 206.401867] ? search_binary_handler.part.0+0x2cc/0x4e0 [ 206.407220] ? free_modprobe_argv+0x90/0x90 [ 206.411557] ? lock_acquire+0x170/0x3c0 [ 206.415519] ? load_misc_binary+0xa3/0x1030 [ 206.419836] ? aa_capable+0xb80/0xb80 [ 206.423625] ? do_raw_read_unlock+0x3b/0x70 [ 206.427932] ? _raw_read_unlock+0x29/0x40 [ 206.432078] ? search_binary_handler.part.0+0x227/0x4e0 [ 206.437431] ? lock_downgrade+0x720/0x720 [ 206.441659] ? lock_acquire+0x170/0x3c0 [ 206.445620] ? search_binary_handler.part.0+0x108/0x4e0 [ 206.450978] search_binary_handler.part.0+0x2cc/0x4e0 [ 206.456160] __do_execve_file+0x1357/0x2360 [ 206.460474] ? open_exec+0x70/0x70 [ 206.464007] ? check_preemption_disabled+0x41/0x280 [ 206.469009] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 206.474186] ? __phys_addr+0x9a/0x110 [ 206.477979] ? __check_object_size+0x17b/0x3e0 [ 206.482569] do_execveat+0x3d/0x50 [ 206.486107] __x64_sys_execveat+0xe1/0x120 [ 206.490334] do_syscall_64+0xf9/0x620 [ 206.494125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.499319] RIP: 0033:0x4665f9 [ 206.502510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 206.521395] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 206.529116] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 206.536464] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 206.543727] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 [ 206.551000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 206.558260] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 14:41:05 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 206.609296] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 14:41:05 executing program 5 (fault-call:2 fault-nth:27): r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:05 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x0) 14:41:05 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xf7, 0x83, 0x7, 0xfb, 0x0, 0x9, 0x80100, 0x6, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x6, 0x401}, 0x2000, 0xf800000000000000, 0xf11c, 0x0, 0x1, 0x6, 0x5, 0x0, 0x8, 0x0, 0xffffffffffffff12}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYRES16=r0], 0xffffffffffffff7f) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:05 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1409, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:41:05 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)=0x0) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x38, 0x3e9, 0x4, 0x70bd2d, 0x25dfdbff, {0x40, 0x0, 0x0, r0, 0xbe, 0xbc7, 0x81, 0x6, 0x0, 0x200}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x1) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r1, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r1, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:05 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x0) [ 206.797614] FAULT_INJECTION: forcing a failure. [ 206.797614] name failslab, interval 1, probability 0, space 0, times 0 [ 206.824860] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 206.841073] CPU: 0 PID: 14969 Comm: syz-executor.5 Not tainted 4.19.206-syzkaller #0 [ 206.848978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.858334] Call Trace: [ 206.860932] dump_stack+0x1fc/0x2ef [ 206.864572] should_fail.cold+0xa/0xf [ 206.868389] ? setup_fault_attr+0x200/0x200 [ 206.872723] ? lock_acquire+0x170/0x3c0 [ 206.876713] __should_failslab+0x115/0x180 [ 206.880956] should_failslab+0x5/0x10 [ 206.884760] kmem_cache_alloc_trace+0x284/0x380 [ 206.889438] load_elf_binary+0xdd/0x5050 [ 206.893516] ? lock_downgrade+0x720/0x720 [ 206.897667] ? lock_acquire+0x170/0x3c0 [ 206.901646] ? load_misc_binary+0xa3/0x1030 [ 206.906017] ? aa_capable+0xb80/0xb80 [ 206.909829] ? do_raw_read_unlock+0x3b/0x70 [ 206.914157] ? _raw_read_unlock+0x29/0x40 [ 206.918316] ? search_binary_handler.part.0+0xb8/0x4e0 [ 206.923602] ? elf_core_dump+0x4c10/0x4c10 [ 206.927852] ? lock_downgrade+0x720/0x720 [ 206.932445] ? lock_acquire+0x170/0x3c0 [ 206.936433] ? search_binary_handler.part.0+0x108/0x4e0 [ 206.941826] search_binary_handler.part.0+0xf9/0x4e0 [ 206.946946] __do_execve_file+0x1357/0x2360 [ 206.951284] ? open_exec+0x70/0x70 [ 206.954833] ? check_preemption_disabled+0x41/0x280 [ 206.959856] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 206.965051] ? __phys_addr+0x9a/0x110 [ 206.968864] ? __check_object_size+0x17b/0x3e0 [ 206.973470] do_execveat+0x3d/0x50 [ 206.977029] __x64_sys_execveat+0xe1/0x120 [ 206.981271] do_syscall_64+0xf9/0x620 [ 206.985085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.990276] RIP: 0033:0x4665f9 [ 206.993478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 207.012385] RSP: 002b:00007f6d34dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 207.020363] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 207.027639] RDX: 0000000000000000 RSI: 00000000200042c0 RDI: 0000000000000003 [ 207.034918] RBP: 00007f6d34dc01d0 R08: 0000000000001100 R09: 0000000000000000 14:41:05 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000001180)=ANY=[@ANYBLOB="7f45814ab75e2cdda0cb478083cfae4156614c46caaafdb707c0d9e540447d9e634dbf1230ef16be06213671f22a92cdef3f1a1f35d1a6c651f3acc91835e95926e3183409ac0efaff0d78865fe3cc5375b8ccf3dc571bc90831daf4b4b2f4e4e9c8d93ca334299e58aaf296a66225ab85bb1ecad07cd57b9ae4f7a5103f951a9ee1b3f15eee18b209218d20ebe26f9b6a1e20ab3ca7212d4710c16cddeb15344533f8c3445eeb8dcb54afa3b920"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) dup3(r1, r3, 0x0) pwritev(r3, &(0x7f0000000000)=[{&(0x7f0000000100)="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", 0x1000}, {&(0x7f0000001100)="6d508569162a8d34026eb771ca56c944d3d4b905d355bf9af841702378ed34f4f4ce9d8519375413b98f8ef4e97df88818bee1c5f5cbfb6453dce18c758aee65d03e71a264354f3870219abb9b7d8b0279f143d2ceeb0368cc0474630c10b8a6d7ecf607d3bc77f70eabe10511ae0aaa0c126f6ac134a796", 0x78}], 0x2, 0x7, 0x5) [ 207.042205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 207.049745] R13: 00007fff068886df R14: 00007f6d34dc0300 R15: 0000000000022000 14:41:05 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) fallocate(r0, 0x4b, 0xffffffff, 0x5) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000000100)={0x0, 0x8}) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) 14:41:06 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x140a, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717303000000911d675f0040eb0d1901e6caa05e0000db01020004", 0x1d}], 0x0, &(0x7f0000000040)=ANY=[]) 14:41:06 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x0) 14:41:06 executing program 4: prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000004300)=ANY=[@ANYBLOB="7f454c46"], 0x3c) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975e99d51b1cec6ddaa76e184300"}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_CPUID(r5, 0xaea3, 0x0) r6 = dup3(r2, r4, 0x0) dup2(r6, r5) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/class/misc', 0x200, 0x68) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180), 0x303201, 0x0) r7 = syz_open_dev$audion(&(0x7f00000001c0), 0x1, 0x4080) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000001580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000380)={{r1}, r8, 0x14, @inherit={0x60, &(0x7f0000000300)={0x1, 0x3, 0xfffffffffffffc01, 0xfffffffffffffff8, {0x2c, 0x4, 0xbc, 0x7fff, 0x5}, [0x8, 0x100000001, 0x100]}}, @devid}) execveat(r0, &(0x7f00000042c0)='\x00', 0x0, 0x0, 0x1100) [ 207.262606] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 207.356415] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 207.686522] syz-executor.0 (8133) used greatest stack depth: 23336 bytes left [ 209.725698] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 209.735074] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 209.744444] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 209.751309] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 209.761520] device bridge_slave_1 left promiscuous mode [ 209.767245] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.777643] device bridge_slave_0 left promiscuous mode [ 209.783910] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.798335] device veth1_macvtap left promiscuous mode [ 209.805127] device veth0_macvtap left promiscuous mode [ 209.811018] device veth1_vlan left promiscuous mode [ 209.816413] device veth0_vlan left promiscuous mode [ 214.392450] bond1 (unregistering): Released all slaves [ 214.427629] device hsr_slave_1 left promiscuous mode [ 214.434999] device hsr_slave_0 left promiscuous mode [ 214.452394] team0 (unregistering): Port device team_slave_1 removed [ 214.463837] team0 (unregistering): Port device team_slave_0 removed [ 214.474758] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 214.487860] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 214.518269] bond0 (unregistering): Released all slaves [ 214.533554] IPVS: ftp: loaded support on port[0] = 21 [ 214.634588] chnl_net:caif_netlink_parms(): no params data found [ 214.716321] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.725740] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.736227] device bridge_slave_0 entered promiscuous mode [ 214.747156] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.757028] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.768308] device bridge_slave_1 entered promiscuous mode [ 214.803957] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.816201] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.852100] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 214.864908] team0: Port device team_slave_0 added [ 214.873377] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 214.885221] team0: Port device team_slave_1 added [ 214.915999] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 214.925208] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 214.956787] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 214.972025] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 214.978276] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 215.010835] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 215.026180] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 215.036426] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 215.073947] device hsr_slave_0 entered promiscuous mode [ 215.085937] device hsr_slave_1 entered promiscuous mode [ 215.093509] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 215.108347] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 215.245979] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.252506] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.259371] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.265727] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.335577] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.345963] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.364062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.374600] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.381998] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.393512] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 215.405404] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.416931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.431555] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.437915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.466269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.475162] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.481575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.495052] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.512197] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.520156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.528199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.540572] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 215.551411] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 215.557453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.567527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.583583] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 215.594738] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 215.602413] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 215.610387] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 215.625592] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.643203] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 215.654259] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 215.663363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 215.672678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 215.718621] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 215.726173] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 215.734090] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 215.744606] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 215.751641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 215.759329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.767070] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.774770] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.784099] device veth0_vlan entered promiscuous mode [ 215.795346] device veth1_vlan entered promiscuous mode [ 215.802385] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 215.812671] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 215.823910] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 215.834761] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 215.842237] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 215.850483] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 215.857694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 215.866613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 215.876532] device veth0_macvtap entered promiscuous mode [ 215.882904] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 215.892516] device veth1_macvtap entered promiscuous mode [ 215.898660] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 215.907821] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 215.917501] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 215.926649] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 215.936553] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.946116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 215.955953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.965156] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 215.975617] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.986358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 215.996168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.005575] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 216.015403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.025433] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 216.032796] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 216.040131] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 216.047335] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 216.054702] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 216.062717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 216.073241] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 216.083419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.092623] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 216.103239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.112550] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 216.122514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.131836] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 216.141628] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.150840] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 216.160678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.171563] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 216.178455] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 216.186775] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 216.194920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 216.326921] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 216.337808] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 216.367018] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 216.405885] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 216.416107] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 216.423237] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 216.431444] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 216.438479] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 218.707950] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 218.714726] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 218.724112] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 218.731315] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 218.739189] device bridge_slave_1 left promiscuous mode [ 218.744735] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.752339] device bridge_slave_0 left promiscuous mode [ 218.757783] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.767791] device veth1_macvtap left promiscuous mode [ 218.773288] device veth0_macvtap left promiscuous mode [ 218.778729] device veth1_vlan left promiscuous mode [ 218.783765] device veth0_vlan left promiscuous mode [ 221.358165] Bluetooth: hci0: command 0x0409 tx timeout [ 223.144364] device hsr_slave_1 left promiscuous mode [ 223.153352] device hsr_slave_0 left promiscuous mode [ 223.167540] team0 (unregistering): Port device team_slave_1 removed [ 223.179778] team0 (unregistering): Port device team_slave_0 removed [ 223.190187] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 223.201546] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 223.233242] bond0 (unregistering): Released all slaves [ 223.247077] IPVS: ftp: loaded support on port[0] = 21 [ 223.386588] chnl_net:caif_netlink_parms(): no params data found [ 223.437930] Bluetooth: hci0: command 0x041b tx timeout [ 223.492647] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.504524] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.513716] device bridge_slave_0 entered promiscuous mode [ 223.527721] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.535943] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.549592] device bridge_slave_1 entered promiscuous mode [ 223.583727] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 223.594448] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 223.630003] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 223.643188] team0: Port device team_slave_0 added [ 223.650007] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 223.657599] team0: Port device team_slave_1 added [ 223.691991] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 223.702143] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 223.734360] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 223.753540] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 223.760002] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 223.792896] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 223.804881] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 223.818643] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 223.853320] device hsr_slave_0 entered promiscuous mode [ 223.859594] device hsr_slave_1 entered promiscuous mode [ 223.865973] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 223.878989] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 224.007081] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.013497] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.020191] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.026554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.103101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.115731] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 224.133090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.143544] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.153519] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.168440] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 224.174518] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.191381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.204537] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.211056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.244011] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.252631] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.259053] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.273378] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.292629] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 224.300167] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.308180] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.315599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.325571] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 224.337054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 224.362759] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 224.374869] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 224.381777] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 224.391678] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 224.402430] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 224.417874] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 224.427104] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 224.434291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 224.443404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 224.472861] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 224.480685] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 224.487383] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 224.496702] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 224.503357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 224.511586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.519683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.526560] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.535810] device veth0_vlan entered promiscuous mode [ 224.546747] device veth1_vlan entered promiscuous mode [ 224.553156] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 224.562381] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 224.576238] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 224.585939] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 224.593133] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 224.600966] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 224.608465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 224.616099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 224.626365] device veth0_macvtap entered promiscuous mode [ 224.633281] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 224.642092] device veth1_macvtap entered promiscuous mode [ 224.648478] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 224.656980] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 224.666445] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 224.675728] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.685752] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.695219] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.705091] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.714250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.724004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.733150] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.742897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.752077] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.762259] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.772570] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 224.779757] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 224.786648] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 224.794099] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 224.801614] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 224.809723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 224.820019] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.830213] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.839513] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.849329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.858509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.868327] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.877419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.887546] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.897147] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.907050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.917381] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 224.924476] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 224.931299] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 224.939444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 225.068348] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 225.074934] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 225.093366] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 225.097860] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 225.112119] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 225.121568] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 225.132760] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 225.141878] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 227.395987] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 227.403241] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 227.413085] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 227.420645] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 227.429414] device bridge_slave_1 left promiscuous mode [ 227.434874] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.442627] device bridge_slave_0 left promiscuous mode [ 227.450457] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.461121] device veth1_macvtap left promiscuous mode [ 227.466410] device veth0_macvtap left promiscuous mode [ 227.473324] device veth1_vlan left promiscuous mode [ 227.478710] device veth0_vlan left promiscuous mode [ 230.157219] Bluetooth: hci0: command 0x0409 tx timeout [ 231.865284] device hsr_slave_1 left promiscuous mode [ 231.873018] device hsr_slave_0 left promiscuous mode [ 231.890390] team0 (unregistering): Port device team_slave_1 removed [ 231.900439] team0 (unregistering): Port device team_slave_0 removed [ 231.911972] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 231.921752] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 231.954092] bond0 (unregistering): Released all slaves [ 231.971969] IPVS: ftp: loaded support on port[0] = 21 [ 232.084013] chnl_net:caif_netlink_parms(): no params data found [ 232.204115] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.217809] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.225294] device bridge_slave_0 entered promiscuous mode [ 232.236998] Bluetooth: hci0: command 0x041b tx timeout [ 232.241602] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.254289] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.263509] device bridge_slave_1 entered promiscuous mode [ 232.298938] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.314248] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.353668] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 232.362228] team0: Port device team_slave_0 added [ 232.374215] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 232.382574] team0: Port device team_slave_1 added [ 232.417047] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 232.423304] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 232.455022] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 232.473215] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 232.481778] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 232.513288] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 232.525333] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 232.539006] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 232.574421] device hsr_slave_0 entered promiscuous mode [ 232.582287] device hsr_slave_1 entered promiscuous mode [ 232.592093] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 232.601262] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 232.745410] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.751908] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.758736] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.765219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.834265] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.846283] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 232.863434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.874625] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.883527] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.899614] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 232.905699] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.918061] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.925806] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.932248] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.959545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.968501] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.974868] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.983094] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.991451] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.007689] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 233.014839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.022906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.032166] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 233.040838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 233.058728] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 233.066656] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 233.074155] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 233.083098] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 233.095606] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 233.109181] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 233.122170] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 233.134677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 233.152392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 233.186808] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 233.194007] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 233.202399] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 233.213552] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 233.220318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 233.228627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.237865] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 233.244840] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 233.254805] device veth0_vlan entered promiscuous mode [ 233.263969] device veth1_vlan entered promiscuous mode [ 233.270365] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 233.280188] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 233.294097] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 233.304924] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 233.312355] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 233.319996] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 233.327922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.335662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.345513] device veth0_macvtap entered promiscuous mode [ 233.352807] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 233.362095] device veth1_macvtap entered promiscuous mode [ 233.368550] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 233.377646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 233.387397] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 233.395958] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 233.406166] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.415392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 233.425301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.434816] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 233.444614] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.453818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 233.464309] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.473664] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 233.483681] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.493718] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 233.501304] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 233.509022] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 233.516444] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 233.523875] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 233.532070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 233.542156] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 233.552507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.561816] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 233.571618] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.580902] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 233.590708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.599927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 233.609782] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.619214] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 233.629042] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.639250] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 233.646224] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 233.654501] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 233.662533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 233.773023] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 233.792058] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 233.812445] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 233.820496] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 233.828411] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 233.835518] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 233.852358] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 233.862733] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 236.084210] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 236.091269] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 236.101018] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 236.108468] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 236.116051] device bridge_slave_1 left promiscuous mode [ 236.122548] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.130515] device bridge_slave_0 left promiscuous mode [ 236.135978] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.147817] device veth1_macvtap left promiscuous mode [ 236.153105] device veth0_macvtap left promiscuous mode [ 236.159608] device veth1_vlan left promiscuous mode [ 236.164656] device veth0_vlan left promiscuous mode [ 238.876183] Bluetooth: hci0: command 0x0409 tx timeout [ 240.566511] device hsr_slave_1 left promiscuous mode [ 240.574059] device hsr_slave_0 left promiscuous mode [ 240.591828] team0 (unregistering): Port device team_slave_1 removed [ 240.601110] team0 (unregistering): Port device team_slave_0 removed [ 240.611896] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 240.622812] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 240.653590] bond0 (unregistering): Released all slaves [ 240.670159] IPVS: ftp: loaded support on port[0] = 21 [ 240.770023] chnl_net:caif_netlink_parms(): no params data found [ 240.872116] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.884578] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.893484] device bridge_slave_0 entered promiscuous mode [ 240.907829] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.914233] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.928694] device bridge_slave_1 entered promiscuous mode [ 240.955969] Bluetooth: hci0: command 0x041b tx timeout [ 240.964268] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 240.980782] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 241.011825] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 241.023862] team0: Port device team_slave_0 added [ 241.031532] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 241.049372] team0: Port device team_slave_1 added [ 241.081006] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 241.089269] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 241.121361] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 241.134625] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 241.145431] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 241.175957] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 241.192396] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 241.201960] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 241.239329] device hsr_slave_0 entered promiscuous mode [ 241.245602] device hsr_slave_1 entered promiscuous mode [ 241.257342] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 241.264505] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 241.400079] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.406481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.413141] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.419541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.483945] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.498276] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 241.514827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.524709] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.538407] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.549330] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 241.555518] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.567815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.575484] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.581912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.618777] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.627416] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.633771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.649077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.661469] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.671722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.689804] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 241.701635] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 241.708567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 241.716970] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 241.723948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.741935] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 241.750521] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 241.761455] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.769581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.783656] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 241.802061] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 241.811881] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 241.819278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 241.828128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.858555] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 241.867278] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 241.874211] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 241.885123] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 241.893428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 241.901707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.912049] device veth0_vlan entered promiscuous mode [ 241.922360] device veth1_vlan entered promiscuous mode [ 241.929042] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 241.935575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.943605] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.950811] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 241.962524] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 241.973724] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 241.984149] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 241.991125] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 241.998525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 242.006298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 242.015597] device veth0_macvtap entered promiscuous mode [ 242.022096] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 242.032003] device veth1_macvtap entered promiscuous mode [ 242.038494] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 242.047809] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 242.057885] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 242.066834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 242.077218] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.086700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 242.096693] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.105928] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 242.115631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.124948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 242.134839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.144068] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 242.153856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.164574] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 242.172166] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 242.179092] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 242.187871] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 242.194979] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 242.203395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 242.213835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 242.223808] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.233048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 242.243026] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.252257] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 242.262037] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.271328] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 242.281227] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.290407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 242.300226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.311328] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 242.318326] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 242.325345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 242.333384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 242.449678] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 242.462698] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 242.484601] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 242.498747] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 242.511789] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 242.518407] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 242.525532] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 242.534275] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 244.779900] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 244.787138] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 244.795164] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 244.802940] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 244.813404] device bridge_slave_1 left promiscuous mode [ 244.819330] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.827097] device bridge_slave_0 left promiscuous mode [ 244.832563] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.842238] device veth1_macvtap left promiscuous mode [ 244.848106] device veth0_macvtap left promiscuous mode [ 244.853402] device veth1_vlan left promiscuous mode [ 244.859638] device veth0_vlan left promiscuous mode [ 247.595373] Bluetooth: hci0: command 0x0409 tx timeout [ 249.241339] device hsr_slave_1 left promiscuous mode [ 249.250028] device hsr_slave_0 left promiscuous mode [ 249.267061] team0 (unregistering): Port device team_slave_1 removed [ 249.277115] team0 (unregistering): Port device team_slave_0 removed [ 249.288754] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 249.298856] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 249.329499] bond0 (unregistering): Released all slaves [ 249.346392] IPVS: ftp: loaded support on port[0] = 21 [ 249.441401] chnl_net:caif_netlink_parms(): no params data found [ 249.523670] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.530774] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.544705] device bridge_slave_0 entered promiscuous mode [ 249.553012] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.565785] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.573285] device bridge_slave_1 entered promiscuous mode [ 249.603381] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 249.613301] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 249.643119] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.652144] team0: Port device team_slave_0 added [ 249.662294] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.671095] team0: Port device team_slave_1 added [ 249.676190] Bluetooth: hci0: command 0x041b tx timeout [ 249.709432] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 249.719520] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.750271] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 249.762498] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 249.774444] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.804904] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 249.816411] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.824106] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 249.867105] device hsr_slave_0 entered promiscuous mode [ 249.873391] device hsr_slave_1 entered promiscuous mode [ 249.883429] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 249.892997] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 250.038955] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.045357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.052029] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.058439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.122414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.138270] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 250.154509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.163189] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.176746] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.194401] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 250.200919] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.214188] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.223303] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.229722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.247661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.255917] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.262270] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.287916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.296328] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.304067] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.314159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.325725] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 250.331815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 250.341572] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 250.364095] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 250.379569] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 250.393102] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 250.410647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 250.424046] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 250.443096] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 250.454160] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 250.464492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 250.478604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.516723] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 250.524709] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 250.533603] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 250.542732] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 250.549824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 250.561530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.572121] device veth0_vlan entered promiscuous mode [ 250.584522] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.592228] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.605243] device veth1_vlan entered promiscuous mode [ 250.611109] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 250.621465] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 250.633728] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 250.643456] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 250.650747] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 250.658607] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 250.666622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 250.674300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 250.684599] device veth0_macvtap entered promiscuous mode [ 250.691057] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 250.700364] device veth1_macvtap entered promiscuous mode [ 250.706932] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 250.716663] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 250.727037] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 250.736404] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 250.746868] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 250.756052] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 250.766440] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 250.775754] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 250.786229] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 250.795426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 250.805259] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 250.814457] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 250.824237] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 250.834349] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 250.841605] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 250.848611] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 250.856305] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 250.863402] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 250.871487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 250.881476] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 250.892007] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 250.901394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 250.911200] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 250.920355] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 250.930212] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 250.940230] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 250.950323] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 250.959871] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 250.969671] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 250.979937] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 250.986964] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 250.994092] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 251.002103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 251.128190] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 251.136056] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 251.143189] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 251.160054] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 251.171115] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 251.171576] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 251.184348] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 251.192576] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 253.529072] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 253.536151] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 253.543711] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 253.550565] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 253.558420] device bridge_slave_1 left promiscuous mode [ 253.563889] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.571460] device bridge_slave_0 left promiscuous mode [ 253.577807] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.589127] device veth1_macvtap left promiscuous mode [ 253.594455] device veth0_macvtap left promiscuous mode [ 253.599875] device veth1_vlan left promiscuous mode [ 253.605162] device veth0_vlan left promiscuous mode [ 256.234846] Bluetooth: hci0: command 0x0409 tx timeout [ 256.958324] ieee802154 phy0 wpan0: encryption failed: -22 [ 256.963925] ieee802154 phy1 wpan1: encryption failed: -22 [ 258.030506] device hsr_slave_1 left promiscuous mode [ 258.038272] device hsr_slave_0 left promiscuous mode [ 258.053237] team0 (unregistering): Port device team_slave_1 removed [ 258.067211] team0 (unregistering): Port device team_slave_0 removed [ 258.077609] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 258.089219] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 258.119277] bond0 (unregistering): Released all slaves [ 258.136069] IPVS: ftp: loaded support on port[0] = 21 [ 258.232308] chnl_net:caif_netlink_parms(): no params data found [ 258.314509] Bluetooth: hci0: command 0x041b tx timeout [ 258.338159] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.350107] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.358897] device bridge_slave_0 entered promiscuous mode [ 258.372310] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.380279] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.393621] device bridge_slave_1 entered promiscuous mode [ 258.423572] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 258.438754] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 258.467026] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 258.475474] team0: Port device team_slave_0 added [ 258.481251] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 258.490235] team0: Port device team_slave_1 added [ 258.512978] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 258.519649] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 258.551802] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 258.570327] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 258.576897] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 258.603489] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 258.615599] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 258.623202] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 258.650427] device hsr_slave_0 entered promiscuous mode [ 258.657045] device hsr_slave_1 entered promiscuous mode [ 258.663299] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 258.674566] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 258.812026] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.818441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.825142] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.831505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.901814] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.912011] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 258.928625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.942391] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.949682] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.968476] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 258.980260] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.992510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.001140] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.007557] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.022778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.030973] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.037380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.066875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 259.075619] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 259.083119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.091275] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 259.104982] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.115846] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 259.121895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 259.142536] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 259.150904] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 259.158957] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 259.167359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.179738] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 259.196891] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 259.207626] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 259.215051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 259.223041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 259.318709] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 259.326298] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 259.333129] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 259.345075] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 259.351891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 259.359847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.368080] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.377593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.386711] device veth0_vlan entered promiscuous mode [ 259.396872] device veth1_vlan entered promiscuous mode [ 259.402692] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 259.413185] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 259.426627] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 259.435823] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 259.442645] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 259.450808] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 259.458716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 259.466612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 259.476934] device veth0_macvtap entered promiscuous mode [ 259.483359] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 259.493052] device veth1_macvtap entered promiscuous mode [ 259.499498] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 259.509199] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 259.519880] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 259.528619] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.538789] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.547982] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.557773] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.567147] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.577438] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.586617] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.596650] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.605965] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.615849] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.626144] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 259.633084] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 259.641077] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 259.648527] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 259.656131] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 259.663857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 259.674061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 259.684498] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.693716] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 259.704053] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.713292] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 259.723210] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.732393] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 259.742530] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.752249] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 259.762220] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.772550] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 259.779647] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 259.786958] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 259.794915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 259.906570] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 259.912987] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 259.940015] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 259.958572] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 259.965946] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 259.973194] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 259.982890] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 259.993730] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 262.274668] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 262.281406] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 262.289745] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 262.297142] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 262.306490] device bridge_slave_1 left promiscuous mode [ 262.311969] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.319822] device bridge_slave_0 left promiscuous mode [ 262.325606] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.334906] device veth1_macvtap left promiscuous mode [ 262.340196] device veth0_macvtap left promiscuous mode [ 262.345749] device veth1_vlan left promiscuous mode [ 262.350784] device veth0_vlan left promiscuous mode [ 264.953941] Bluetooth: hci0: command 0x0409 tx timeout [ 266.724146] device hsr_slave_1 left promiscuous mode [ 266.731647] device hsr_slave_0 left promiscuous mode [ 266.751564] team0 (unregistering): Port device team_slave_1 removed [ 266.761014] team0 (unregistering): Port device team_slave_0 removed [ 266.771097] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 266.781390] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 266.812766] bond0 (unregistering): Released all slaves [ 266.831516] IPVS: ftp: loaded support on port[0] = 21 [ 266.930581] chnl_net:caif_netlink_parms(): no params data found [ 267.016183] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.022711] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.030923] device bridge_slave_0 entered promiscuous mode [ 267.037191] Bluetooth: hci0: command 0x041b tx timeout [ 267.045451] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.051873] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.059718] device bridge_slave_1 entered promiscuous mode [ 267.088647] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 267.104838] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 267.143025] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 267.151849] team0: Port device team_slave_0 added [ 267.164455] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 267.172150] team0: Port device team_slave_1 added [ 267.207792] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 267.219446] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 267.251821] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 267.269735] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 267.276500] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 267.308588] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 267.320589] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 267.334455] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 267.372109] device hsr_slave_0 entered promiscuous mode [ 267.378292] device hsr_slave_1 entered promiscuous mode [ 267.390005] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 267.398890] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 267.538631] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.545085] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.551757] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.558187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.634483] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.650115] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 267.661545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 267.675610] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.682449] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.696284] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 267.702342] 8021q: adding VLAN 0 to HW filter on device team0 [ 267.714865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.722443] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.728835] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.740385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.749142] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.755554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.775704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 267.783506] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 267.803505] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 267.814421] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 267.825398] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 267.833388] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 267.841907] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 267.856844] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 267.875855] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 267.883320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 267.894881] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 267.904893] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 267.911650] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 267.925262] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 267.944859] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 267.956900] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 267.964467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 267.975547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 268.043675] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 268.052013] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 268.059916] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 268.070668] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 268.077723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 268.086211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.094481] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.101386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.111724] device veth0_vlan entered promiscuous mode [ 268.121494] device veth1_vlan entered promiscuous mode [ 268.127798] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 268.138135] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 268.150557] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 268.160519] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 268.167598] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 268.175331] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 268.182497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 268.190951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 268.200403] device veth0_macvtap entered promiscuous mode [ 268.207540] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 268.216625] device veth1_macvtap entered promiscuous mode [ 268.222829] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 268.231851] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 268.242124] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 268.251704] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 268.261711] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 268.270915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 268.280929] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 268.290111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 268.299910] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 268.309072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 268.318861] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 268.328017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 268.337813] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 268.348150] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 268.355667] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 268.363937] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 268.371197] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 268.378599] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 268.386630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 268.397103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 268.407529] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 268.416747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 268.426782] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 268.436211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 268.446001] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 268.455447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 268.465314] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 268.474697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 268.484493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 268.494615] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 268.501494] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 268.509415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 268.517409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 268.647229] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 268.655279] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 268.662393] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 268.679665] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 268.692647] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 268.692982] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 268.708698] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 268.717713] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 270.947737] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 270.955028] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 270.962599] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 270.969741] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 270.978089] device bridge_slave_1 left promiscuous mode [ 270.983835] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.990962] device bridge_slave_0 left promiscuous mode [ 270.996904] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.007441] device veth1_macvtap left promiscuous mode [ 271.012737] device veth0_macvtap left promiscuous mode [ 271.018228] device veth1_vlan left promiscuous mode [ 271.023846] device veth0_vlan left promiscuous mode [ 273.673419] Bluetooth: hci0: command 0x0409 tx timeout [ 275.390116] device hsr_slave_1 left promiscuous mode [ 275.397844] device hsr_slave_0 left promiscuous mode [ 275.414841] team0 (unregistering): Port device team_slave_1 removed [ 275.427825] team0 (unregistering): Port device team_slave_0 removed [ 275.436965] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 275.449871] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 275.480256] bond0 (unregistering): Released all slaves [ 275.498181] IPVS: ftp: loaded support on port[0] = 21 [ 275.595516] chnl_net:caif_netlink_parms(): no params data found [ 275.695196] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.701774] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.714817] device bridge_slave_0 entered promiscuous mode [ 275.722482] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.734787] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.742240] device bridge_slave_1 entered promiscuous mode [ 275.753288] Bluetooth: hci0: command 0x041b tx timeout [ 275.787246] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 275.797037] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 275.820575] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 275.828632] team0: Port device team_slave_0 added [ 275.834904] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 275.842488] team0: Port device team_slave_1 added [ 275.864438] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 275.870735] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 275.896541] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 275.911141] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 275.917804] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 275.948771] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 275.960228] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 275.975555] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 276.014174] device hsr_slave_0 entered promiscuous mode [ 276.020233] device hsr_slave_1 entered promiscuous mode [ 276.032234] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 276.040300] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 276.164846] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.171228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.177937] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.184361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.235675] 8021q: adding VLAN 0 to HW filter on device bond0 [ 276.251275] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 276.261858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.276075] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.287581] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.302728] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 276.310704] 8021q: adding VLAN 0 to HW filter on device team0 [ 276.322099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.331230] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.337646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.363897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.371596] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.378004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.387823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.397276] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.415907] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 276.425870] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 276.437727] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 276.446409] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 276.455030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.462553] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 276.471293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 276.485322] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 276.494562] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 276.501261] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 276.514505] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 276.531341] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 276.543338] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 276.550394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 276.559697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 276.619923] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 276.643841] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 276.650887] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 276.662522] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 276.675938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 276.684880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.696744] device veth0_vlan entered promiscuous mode [ 276.704229] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 276.711469] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 276.730931] device veth1_vlan entered promiscuous mode [ 276.737983] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 276.754735] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 276.774937] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 276.786888] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 276.794012] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 276.801303] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 276.809446] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 276.818144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 276.828422] device veth0_macvtap entered promiscuous mode [ 276.837208] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 276.845866] device veth1_macvtap entered promiscuous mode [ 276.851914] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 276.862799] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 276.873358] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 276.881901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 276.892240] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.903211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 276.913988] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.923916] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 276.934642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.944583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 276.955336] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.965390] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 276.975686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.986649] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 276.994673] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 277.001592] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 277.009646] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 277.018047] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 277.026907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 277.038120] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 277.048653] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.057842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 277.067598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.077095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 277.086860] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.096028] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 277.106992] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.116601] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 277.126597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.136778] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 277.143812] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 277.150826] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 277.158980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 277.274740] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 277.287695] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 277.306015] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 277.317260] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 277.328109] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 277.338482] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 277.342519] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 277.352036] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 279.592669] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 279.599610] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 279.608056] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 279.615365] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 279.624462] device bridge_slave_1 left promiscuous mode [ 279.629917] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.637670] device bridge_slave_0 left promiscuous mode [ 279.645880] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.655224] device veth1_macvtap left promiscuous mode [ 279.660518] device veth0_macvtap left promiscuous mode [ 279.666996] device veth1_vlan left promiscuous mode [ 279.672058] device veth0_vlan left promiscuous mode [ 282.392595] Bluetooth: hci0: command 0x0409 tx timeout [ 284.048467] device hsr_slave_1 left promiscuous mode [ 284.056040] device hsr_slave_0 left promiscuous mode [ 284.070937] team0 (unregistering): Port device team_slave_1 removed [ 284.082991] team0 (unregistering): Port device team_slave_0 removed [ 284.092069] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 284.104388] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 284.134753] bond0 (unregistering): Released all slaves [ 284.154330] IPVS: ftp: loaded support on port[0] = 21 [ 284.260009] chnl_net:caif_netlink_parms(): no params data found [ 284.373286] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.379891] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.390824] device bridge_slave_0 entered promiscuous mode [ 284.401742] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.410999] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.421511] device bridge_slave_1 entered promiscuous mode [ 284.456947] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 284.469277] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 284.482445] Bluetooth: hci0: command 0x041b tx timeout [ 284.497543] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 284.505878] team0: Port device team_slave_0 added [ 284.511635] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 284.520775] team0: Port device team_slave_1 added [ 284.541981] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 284.548737] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 284.574429] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 284.587679] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 284.594358] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 284.620499] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 284.639143] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 284.648787] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 284.680387] device hsr_slave_0 entered promiscuous mode [ 284.687804] device hsr_slave_1 entered promiscuous mode [ 284.696806] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 284.704951] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 284.840974] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.847486] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.854179] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.860543] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.930039] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.946702] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 284.960147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.971967] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.985779] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.995860] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 285.001980] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.014715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.024295] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.030627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.049113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.057315] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.063751] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.094140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 285.102118] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 285.119152] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 285.130970] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 285.142464] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 285.149940] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 285.159345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.168951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.185338] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 285.194078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 285.204718] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 285.213983] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 285.220715] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 285.235530] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 285.254603] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 285.265944] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 285.273988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 285.281993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 285.337929] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 285.345549] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 285.353562] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 285.364639] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 285.371527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 285.383313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.392880] device veth0_vlan entered promiscuous mode [ 285.401748] device veth1_vlan entered promiscuous mode [ 285.408880] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 285.416045] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.426695] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.433940] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 285.445699] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 285.457773] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 285.467512] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 285.474473] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 285.481652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 285.489595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 285.499499] device veth0_macvtap entered promiscuous mode [ 285.506276] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 285.514948] device veth1_macvtap entered promiscuous mode [ 285.521529] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 285.530594] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 285.540316] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 285.549337] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.559117] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.568496] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.578250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.587431] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.597185] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.606882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.616661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.625908] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.635650] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.646163] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 285.653458] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 285.660527] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 285.667987] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 285.675389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 285.683458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 285.693908] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.704118] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.713318] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.723216] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.732398] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.742407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.751684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.762961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.772194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.781988] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.792232] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 285.799527] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 285.807246] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 285.817402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 285.928158] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 285.943486] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 285.950846] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 285.964059] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 285.978286] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 285.993207] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 285.995040] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 286.007085] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 288.309609] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 288.317077] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 288.325595] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 288.333924] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 288.341535] device bridge_slave_1 left promiscuous mode [ 288.347970] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.356035] device bridge_slave_0 left promiscuous mode [ 288.361508] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.370828] device veth1_macvtap left promiscuous mode [ 288.376294] device veth0_macvtap left promiscuous mode [ 288.381599] device veth1_vlan left promiscuous mode [ 288.386785] device veth0_vlan left promiscuous mode [ 291.032141] Bluetooth: hci0: command 0x0409 tx timeout [ 292.756535] device hsr_slave_1 left promiscuous mode [ 292.766332] device hsr_slave_0 left promiscuous mode [ 292.781727] team0 (unregistering): Port device team_slave_1 removed [ 292.791366] team0 (unregistering): Port device team_slave_0 removed [ 292.804772] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 292.815400] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 292.848259] bond0 (unregistering): Released all slaves [ 292.863938] IPVS: ftp: loaded support on port[0] = 21 [ 292.969683] chnl_net:caif_netlink_parms(): no params data found [ 293.080841] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.093435] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.100926] device bridge_slave_0 entered promiscuous mode [ 293.112162] Bluetooth: hci0: command 0x041b tx timeout [ 293.115713] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.127499] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.137239] device bridge_slave_1 entered promiscuous mode [ 293.170595] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 293.186028] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 293.218267] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 293.229414] team0: Port device team_slave_0 added [ 293.237365] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 293.248772] team0: Port device team_slave_1 added [ 293.272791] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 293.279053] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 293.304959] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 293.317166] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 293.324234] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 293.350079] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 293.361553] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 293.369634] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 293.394989] device hsr_slave_0 entered promiscuous mode [ 293.401269] device hsr_slave_1 entered promiscuous mode [ 293.412635] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 293.419861] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 293.518192] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.524600] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.531257] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.537662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.585414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 293.595020] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 293.606517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.614282] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.621076] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.639065] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 293.646050] 8021q: adding VLAN 0 to HW filter on device team0 [ 293.657271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.666026] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.672433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.694100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.703209] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.709569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.719340] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 293.739849] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 293.750006] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 293.767303] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 293.775293] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 293.784240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 293.792983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.800550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.816370] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 293.823855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 293.839120] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 293.846336] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 293.855624] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 293.872547] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 293.884739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 293.962984] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 293.970295] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 293.979127] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 294.004964] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 294.011595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 294.022432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.036606] device veth0_vlan entered promiscuous mode [ 294.049703] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.057402] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.078730] device veth1_vlan entered promiscuous mode [ 294.088798] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 294.106670] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 294.126279] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 294.136106] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 294.143056] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 294.150274] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 294.157721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 294.165576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 294.176140] device veth0_macvtap entered promiscuous mode [ 294.183644] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 294.193285] device veth1_macvtap entered promiscuous mode [ 294.199347] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 294.210517] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 294.220319] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 294.229152] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 294.239435] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.248828] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 294.258605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.267985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 294.278138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.287337] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 294.297104] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.306389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 294.316358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.326502] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 294.334081] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 294.341317] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 294.349162] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 294.356529] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 294.364499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 294.375585] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 294.385660] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.394849] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 294.404659] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.413854] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 294.423711] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.432883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 294.442659] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.451839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 294.461536] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.472191] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 294.479084] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 294.487129] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 294.495271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 294.604129] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 294.611609] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 294.634715] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 294.648108] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 294.665497] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 294.673982] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 294.681189] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 294.689042] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 297.075847] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 297.082686] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 297.090421] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 297.097349] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 297.105998] device bridge_slave_1 left promiscuous mode [ 297.111454] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.119583] device bridge_slave_0 left promiscuous mode [ 297.125365] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.134387] device veth1_macvtap left promiscuous mode [ 297.139725] device veth0_macvtap left promiscuous mode [ 297.145264] device veth1_vlan left promiscuous mode [ 297.150425] device veth0_vlan left promiscuous mode [ 299.751761] Bluetooth: hci0: command 0x0409 tx timeout [ 301.535776] device hsr_slave_1 left promiscuous mode [ 301.544765] device hsr_slave_0 left promiscuous mode [ 301.558262] team0 (unregistering): Port device team_slave_1 removed [ 301.570946] team0 (unregistering): Port device team_slave_0 removed [ 301.580549] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 301.592331] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 301.622704] bond0 (unregistering): Released all slaves [ 301.638588] IPVS: ftp: loaded support on port[0] = 21 [ 301.727527] chnl_net:caif_netlink_parms(): no params data found [ 301.817455] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.824264] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.832429] Bluetooth: hci0: command 0x041b tx timeout [ 301.837980] device bridge_slave_0 entered promiscuous mode [ 301.845684] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.857761] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.865296] device bridge_slave_1 entered promiscuous mode [ 301.900487] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 301.910407] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 301.947378] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 301.958096] team0: Port device team_slave_0 added [ 301.966592] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 301.977092] team0: Port device team_slave_1 added [ 302.008105] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 302.017114] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 302.048128] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 302.060244] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 302.072338] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 302.101512] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 302.113383] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 302.121047] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 302.146979] device hsr_slave_0 entered promiscuous mode [ 302.154384] device hsr_slave_1 entered promiscuous mode [ 302.160663] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 302.169541] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 302.269426] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.275962] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.282694] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.289061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.366968] 8021q: adding VLAN 0 to HW filter on device bond0 [ 302.380812] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 302.404007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 302.413249] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.420131] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.433743] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 302.439836] 8021q: adding VLAN 0 to HW filter on device team0 [ 302.456701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 302.470273] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.476720] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.508204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.516576] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.522998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.545242] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 302.558484] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 302.581543] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 302.588525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 302.599275] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 302.608037] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 302.614502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 302.633466] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 302.641872] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 302.648651] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 302.664423] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 302.683934] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 302.694688] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 302.702894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 302.711744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 302.811866] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 302.819264] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 302.826672] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 302.837970] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 302.845072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 302.853406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 302.863532] device veth0_vlan entered promiscuous mode [ 302.872163] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 302.879275] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 302.889857] device veth1_vlan entered promiscuous mode [ 302.896350] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 302.906838] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 302.920277] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 302.931040] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 302.938982] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 302.947002] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 302.954842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 302.966611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 302.977625] device veth0_macvtap entered promiscuous mode [ 302.984340] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 302.993451] device veth1_macvtap entered promiscuous mode [ 303.000019] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 303.010132] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 303.020196] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 303.029276] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 303.039106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 303.048588] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 303.058360] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 303.067543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 303.077488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 303.086755] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 303.096514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 303.105686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 303.116148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 303.126395] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 303.133772] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 303.140661] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 303.148420] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 303.155852] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 303.163882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 303.175695] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 303.185900] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 303.195141] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 303.205006] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 303.214242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 303.224009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 303.233479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 303.243529] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 303.252730] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 303.262661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 303.273184] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 303.280168] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 303.287174] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 303.295433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 303.407414] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 303.432490] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 303.451316] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 303.457283] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 303.465386] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 303.480782] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 303.488462] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 303.495858] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 2021/09/03 14:42:42 executor 0 failed 11 times: executor 0: exit status 67 SYZFAIL: mmap of output file failed (errno 13: Permission denied) SYZFAIL: child failed (errno 0: Success) loop exited with status 67