x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f207") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x8004000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8013001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r3 = fcntl$dupfd(r1, 0x406, r0) ptrace$pokeuser(0x6, r2, 0x8a, 0x9) ioprio_get$pid(0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80000001, 0xa, [0x6, 0x3, 0x200, 0x9, 0x6, 0x5, 0xfffffffffffff825, 0x7, 0x280000000, 0x8822]}, &(0x7f0000000080)=0x1c) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, &(0x7f00000000c0)=0x84) 06:38:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac013001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1507.951511] FAULT_INJECTION: forcing a failure. [ 1507.951511] name failslab, interval 1, probability 0, space 0, times 0 [ 1507.979044] CPU: 0 PID: 6946 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1507.985920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1507.995293] Call Trace: [ 1507.997898] dump_stack+0x172/0x1f0 [ 1508.001543] should_fail.cold+0xa/0x15 [ 1508.005453] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1508.010594] ? ___might_sleep+0x163/0x280 [ 1508.014758] __should_failslab+0x121/0x190 [ 1508.019000] should_failslab+0x9/0x14 [ 1508.022800] kmem_cache_alloc_node_trace+0x270/0x720 [ 1508.027908] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1508.032677] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1508.037264] ? retint_kernel+0x2d/0x2d [ 1508.041168] __kmalloc_node+0x3d/0x70 [ 1508.044984] sbitmap_init_node+0x29e/0x510 [ 1508.049230] sbitmap_queue_init_node+0x40/0x710 [ 1508.053918] blk_mq_init_tags+0x119/0x2c0 [ 1508.058080] blk_mq_alloc_rq_map+0x88/0x200 [ 1508.062410] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1508.066921] ? kasan_kmalloc+0x9/0x10 [ 1508.070734] blk_mq_alloc_tag_set+0x78a/0xd40 [ 1508.078198] loop_add+0x286/0x8d0 [ 1508.081653] ? idr_find+0x47/0x60 [ 1508.085113] loop_control_ioctl+0x165/0x360 [ 1508.089448] ? loop_add+0x8d0/0x8d0 [ 1508.093111] ? loop_add+0x8d0/0x8d0 [ 1508.096748] do_vfs_ioctl+0xd6e/0x1390 [ 1508.100648] ? ioctl_preallocate+0x210/0x210 [ 1508.105063] ? __fget+0x367/0x540 [ 1508.108527] ? ksys_dup3+0x3e0/0x3e0 [ 1508.112252] ? tomoyo_file_ioctl+0x23/0x30 [ 1508.116488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1508.122026] ? security_file_ioctl+0x93/0xc0 [ 1508.126448] ksys_ioctl+0xab/0xd0 [ 1508.129932] __x64_sys_ioctl+0x73/0xb0 [ 1508.133851] do_syscall_64+0x103/0x610 [ 1508.137747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1508.142947] RIP: 0033:0x457f29 [ 1508.146153] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1508.165072] RSP: 002b:00007f83f2457c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1508.172784] RAX: ffffffffffffffda RBX: 00007f83f2457c90 RCX: 0000000000457f29 [ 1508.180060] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1508.187330] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1508.194606] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24586d4 06:38:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0014001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4014001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1508.201887] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 [ 1508.215172] blk-mq: reduced tag depth (128 -> 64) 06:38:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x8005000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:33 executing program 0 (fault-call:18 fault-nth:5): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8014001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f207") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac014001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x2, 0x2000) 06:38:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0015001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x810000c000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f207") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1508.861989] FAULT_INJECTION: forcing a failure. [ 1508.861989] name failslab, interval 1, probability 0, space 0, times 0 [ 1508.903556] CPU: 1 PID: 7011 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1508.910739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1508.920100] Call Trace: [ 1508.922707] dump_stack+0x172/0x1f0 [ 1508.926372] should_fail.cold+0xa/0x15 [ 1508.930310] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1508.935411] ? ___might_sleep+0x163/0x280 [ 1508.939590] __should_failslab+0x121/0x190 [ 1508.943822] should_failslab+0x9/0x14 [ 1508.947617] kmem_cache_alloc_node_trace+0x270/0x720 [ 1508.952721] ? prandom_u32+0x10/0xb0 [ 1508.956434] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1508.961435] ? find_next_bit+0x107/0x130 [ 1508.965489] sbitmap_queue_init_node+0x29e/0x710 [ 1508.970239] blk_mq_init_tags+0x119/0x2c0 [ 1508.974377] blk_mq_alloc_rq_map+0x88/0x200 [ 1508.978718] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1508.983246] blk_mq_alloc_tag_set+0x78a/0xd40 [ 1508.987776] loop_add+0x286/0x8d0 [ 1508.991229] ? idr_find+0x47/0x60 [ 1508.994671] loop_control_ioctl+0x165/0x360 [ 1508.998989] ? loop_add+0x8d0/0x8d0 [ 1509.002612] ? loop_add+0x8d0/0x8d0 [ 1509.006229] do_vfs_ioctl+0xd6e/0x1390 [ 1509.010118] ? ioctl_preallocate+0x210/0x210 [ 1509.014528] ? __fget+0x367/0x540 [ 1509.017995] ? ksys_dup3+0x3e0/0x3e0 [ 1509.021712] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1509.027252] ? tomoyo_file_ioctl+0x23/0x30 [ 1509.031488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1509.037020] ? security_file_ioctl+0x93/0xc0 [ 1509.041417] ksys_ioctl+0xab/0xd0 [ 1509.044865] __x64_sys_ioctl+0x73/0xb0 [ 1509.048743] do_syscall_64+0x103/0x610 [ 1509.052640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1509.057842] RIP: 0033:0x457f29 [ 1509.061069] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1509.079985] RSP: 002b:00007f83f2457c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1509.087702] RAX: ffffffffffffffda RBX: 00007f83f2457c90 RCX: 0000000000457f29 [ 1509.094970] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1509.102239] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1509.109495] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24586d4 [ 1509.116755] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 [ 1509.139441] blk-mq: reduced tag depth (128 -> 64) 06:38:34 executing program 0 (fault-call:18 fault-nth:6): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x2, 0x0) 06:38:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4015001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x820000c000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, 0x0, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8015001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$poke(0x4, r1, &(0x7f0000000000), 0x4) ioprio_get$pid(0x0, 0x0) 06:38:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1509.497527] FAULT_INJECTION: forcing a failure. [ 1509.497527] name failslab, interval 1, probability 0, space 0, times 0 [ 1509.540905] CPU: 1 PID: 7053 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1509.547781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1509.557138] Call Trace: [ 1509.559785] dump_stack+0x172/0x1f0 [ 1509.563440] should_fail.cold+0xa/0x15 [ 1509.567367] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1509.572507] ? ___might_sleep+0x163/0x280 [ 1509.576698] __should_failslab+0x121/0x190 [ 1509.580959] should_failslab+0x9/0x14 [ 1509.584772] kmem_cache_alloc_node_trace+0x270/0x720 [ 1509.589893] ? sbitmap_queue_init_node+0x1fa/0x710 [ 1509.594863] sbitmap_queue_init_node+0x29e/0x710 [ 1509.599659] blk_mq_init_tags+0x17b/0x2c0 [ 1509.603818] blk_mq_alloc_rq_map+0x88/0x200 [ 1509.608152] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1509.612681] ? kasan_kmalloc+0x9/0x10 [ 1509.616512] blk_mq_alloc_tag_set+0x78a/0xd40 [ 1509.621044] loop_add+0x286/0x8d0 [ 1509.624504] ? idr_find+0x47/0x60 [ 1509.627982] loop_control_ioctl+0x165/0x360 [ 1509.632321] ? loop_add+0x8d0/0x8d0 [ 1509.634217] __nla_parse: 21 callbacks suppressed [ 1509.634226] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1509.635971] ? loop_add+0x8d0/0x8d0 [ 1509.635992] do_vfs_ioctl+0xd6e/0x1390 [ 1509.636014] ? ioctl_preallocate+0x210/0x210 [ 1509.636031] ? __fget+0x367/0x540 [ 1509.636050] ? ksys_dup3+0x3e0/0x3e0 [ 1509.668329] ? tomoyo_file_ioctl+0x23/0x30 [ 1509.672572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1509.678115] ? security_file_ioctl+0x93/0xc0 [ 1509.682556] ksys_ioctl+0xab/0xd0 [ 1509.686020] __x64_sys_ioctl+0x73/0xb0 [ 1509.689914] ? do_syscall_64+0x5b/0x610 [ 1509.693899] do_syscall_64+0x103/0x610 [ 1509.697796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1509.702999] RIP: 0033:0x457f29 [ 1509.706193] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1509.725095] RSP: 002b:00007f83f2436c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1509.732799] RAX: ffffffffffffffda RBX: 00007f83f2436c90 RCX: 0000000000457f29 06:38:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x830000c000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac015001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1509.740068] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1509.747332] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1509.754604] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24376d4 [ 1509.761874] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 [ 1509.774153] blk-mq: reduced tag depth (128 -> 64) 06:38:34 executing program 0 (fault-call:18 fault-nth:7): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0016001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:34 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) dup3(r2, r2, 0x80000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)=0x0) capset(&(0x7f00000001c0)={0x200f1526, r3}, &(0x7f0000000280)={0x6, 0x7d6, 0x6, 0x8, 0x2, 0xfffffffffffffff7}) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000002c0)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, &(0x7f0000000380)=0xfffffffffffffe6d) openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x4a1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) ioprio_get$pid(0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x380, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r4, 0x400448c9, &(0x7f0000000040)={{0x2, 0x5a3, 0x3f, 0xbf, 0x4, 0x7}}) 06:38:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, 0x0, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1509.985046] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4016001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x840000c000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, 0x0, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup3(r0, r0, 0x80000) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x2, 0xffffffffffffffff, 0xfffffffffffffffc) r2 = getpgid(0x0) ioprio_get$pid(0x0, r2) [ 1510.232797] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1510.242750] FAULT_INJECTION: forcing a failure. [ 1510.242750] name failslab, interval 1, probability 0, space 0, times 0 [ 1510.280824] CPU: 0 PID: 7097 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1510.287694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1510.297060] Call Trace: [ 1510.299663] dump_stack+0x172/0x1f0 [ 1510.303318] should_fail.cold+0xa/0x15 [ 1510.307226] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1510.312348] ? ___might_sleep+0x163/0x280 [ 1510.316514] __should_failslab+0x121/0x190 [ 1510.320765] should_failslab+0x9/0x14 [ 1510.324577] kmem_cache_alloc_node_trace+0x270/0x720 [ 1510.329703] __kmalloc_node+0x3d/0x70 [ 1510.333520] blk_mq_alloc_rq_map+0xb9/0x200 [ 1510.337848] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1510.342346] ? kasan_kmalloc+0x9/0x10 [ 1510.346150] blk_mq_alloc_tag_set+0x78a/0xd40 [ 1510.350658] loop_add+0x286/0x8d0 [ 1510.354111] ? idr_find+0x47/0x60 [ 1510.357569] loop_control_ioctl+0x165/0x360 [ 1510.361890] ? loop_add+0x8d0/0x8d0 [ 1510.365525] ? loop_add+0x8d0/0x8d0 [ 1510.369192] do_vfs_ioctl+0xd6e/0x1390 [ 1510.373106] ? ioctl_preallocate+0x210/0x210 [ 1510.377516] ? __fget+0x367/0x540 [ 1510.381002] ? ksys_dup3+0x3e0/0x3e0 [ 1510.384719] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1510.390286] ? tomoyo_file_ioctl+0x23/0x30 [ 1510.394520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1510.400065] ? security_file_ioctl+0x93/0xc0 [ 1510.404477] ksys_ioctl+0xab/0xd0 [ 1510.407972] __x64_sys_ioctl+0x73/0xb0 [ 1510.411891] do_syscall_64+0x103/0x610 [ 1510.415784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1510.420975] RIP: 0033:0x457f29 [ 1510.424170] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1510.443071] RSP: 002b:00007f83f2436c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1510.450777] RAX: ffffffffffffffda RBX: 00007f83f2436c90 RCX: 0000000000457f29 [ 1510.458044] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1510.465321] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1510.472586] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24376d4 [ 1510.479852] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 [ 1510.487644] net_ratelimit: 22 callbacks suppressed [ 1510.487652] protocol 88fb is buggy, dev hsr_slave_0 [ 1510.488591] protocol 88fb is buggy, dev hsr_slave_0 [ 1510.492753] protocol 88fb is buggy, dev hsr_slave_1 [ 1510.508392] protocol 88fb is buggy, dev hsr_slave_1 [ 1510.521373] blk-mq: reduced tag depth (128 -> 64) 06:38:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10000, 0x0) 06:38:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8016001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1510.684781] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:35 executing program 0 (fault-call:18 fault-nth:8): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x8501000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:35 executing program 4: syz_emit_ethernet(0x42, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @random="f4333b2b5bdc", [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0xb, @random="05a79dcf17d6", @mcast1, @empty, @mcast1}}}}, &(0x7f0000000080)={0x1, 0x3, [0xa31, 0xeb3, 0x743, 0x9ac]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) shutdown(r0, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r0}) ioprio_get$pid(0x0, 0x0) 06:38:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac016001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0017001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x8601000000000000, [0x4b564d03, 0x1, 0x17a]}) [ 1510.859575] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1510.891527] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4017001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1510.938187] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$netrom(r1, &(0x7f0000000000)={{0x3, @default}, [@rose, @netrom, @remote, @netrom, @rose, @bcast, @default, @rose]}, &(0x7f0000000080)=0x48) ioprio_get$pid(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) [ 1510.988530] FAULT_INJECTION: forcing a failure. [ 1510.988530] name failslab, interval 1, probability 0, space 0, times 0 [ 1511.026728] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8017001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1511.027058] CPU: 1 PID: 7133 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1511.042085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1511.051442] Call Trace: [ 1511.054038] dump_stack+0x172/0x1f0 [ 1511.057714] should_fail.cold+0xa/0x15 [ 1511.061617] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1511.066731] ? ___might_sleep+0x163/0x280 [ 1511.070901] __should_failslab+0x121/0x190 [ 1511.075196] should_failslab+0x9/0x14 [ 1511.079017] kmem_cache_alloc_node_trace+0x270/0x720 [ 1511.084140] ? kasan_unpoison_shadow+0x35/0x50 [ 1511.088744] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1511.093880] __kmalloc_node+0x3d/0x70 [ 1511.095028] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1511.097710] blk_mq_alloc_rq_map+0xfa/0x200 [ 1511.097733] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1511.097749] ? kasan_kmalloc+0x9/0x10 [ 1511.097771] blk_mq_alloc_tag_set+0x78a/0xd40 [ 1511.097802] loop_add+0x286/0x8d0 [ 1511.097823] loop_control_ioctl+0x165/0x360 [ 1511.097839] ? loop_add+0x8d0/0x8d0 [ 1511.097859] ? do_vfs_ioctl+0xd08/0x1390 [ 1511.138868] ? loop_add+0x8d0/0x8d0 [ 1511.142527] do_vfs_ioctl+0xd6e/0x1390 [ 1511.146436] ? ioctl_preallocate+0x210/0x210 [ 1511.150862] ? retint_kernel+0x2d/0x2d [ 1511.154781] ? tomoyo_file_ioctl+0x23/0x30 [ 1511.159033] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1511.164581] ? security_file_ioctl+0x93/0xc0 [ 1511.169003] ksys_ioctl+0xab/0xd0 [ 1511.172464] __x64_sys_ioctl+0x73/0xb0 [ 1511.176380] do_syscall_64+0x103/0x610 [ 1511.180280] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1511.185465] RIP: 0033:0x457f29 [ 1511.188656] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1511.207554] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1511.215264] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1511.222530] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1511.229803] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1511.237099] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1511.244365] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 [ 1511.255761] blk-mq: reduced tag depth (128 -> 64) 06:38:36 executing program 0 (fault-call:18 fault-nth:9): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac017001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e21, @rand_addr=0x7fff}, 0x20e, 0x0, 0x0, 0x0, 0x984, &(0x7f0000000000)='veth1_to_bond\x00', 0x1, 0x81, 0x8}) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000008980)={r0, 0x9, 0x7, "f0ad0f78985d3957886e7a6c5390ee5b31423c17133954a5a9a4c02dd03a169a85e7b3d6fb4de1d5abdf7e271283cb21f5fa921be185b937d093b33df034be9e4dc608ce0dc6c99bc5896910eeed922c3eee68bdea0306c0934e73450992d7dd356a7d628e036dec428ca79fa756b97fa894b15296bb7b4728d1a0567d0aaef4d3572b41d472f68da0538ee9d84b1a4b3d50be77a4de8eafc7b133264e0b63d8c01005d35de49a7fb6b284071401d9d9e106bfa5a0c1bf3c774ba198fd07a6330650"}) getpgrp(0x0) r2 = accept$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) recvmmsg(r0, &(0x7f0000008680)=[{{&(0x7f0000000340)=@caif=@dbg, 0x80, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000400)=""/65, 0x41}, {&(0x7f0000000480)=""/23, 0x17}], 0x3, &(0x7f0000000500)=""/14, 0xe}, 0x8}, {{&(0x7f0000000540)=@rc, 0x80, &(0x7f0000001a40)=[{&(0x7f00000005c0)=""/51, 0x33}, {&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000680)=""/183, 0xb7}, {&(0x7f0000000740)=""/71, 0x47}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000001840)=""/64, 0x40}, {&(0x7f0000001880)=""/60, 0x3c}, {&(0x7f00000018c0)=""/107, 0x6b}, {&(0x7f0000001940)=""/225, 0xe1}], 0xa, &(0x7f0000001b00)=""/187, 0xbb}, 0x40}, {{&(0x7f0000001bc0)=@isdn, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001c40)=""/78, 0x4e}, {&(0x7f0000001cc0)=""/2, 0x2}, {&(0x7f0000001d00)=""/157, 0x9d}], 0x3, &(0x7f0000001e00)=""/230, 0xe6}, 0xfffffffffffffff8}, {{&(0x7f0000001f00)=@alg, 0x80, &(0x7f0000002040)=[{&(0x7f0000001f80)=""/182, 0xb6}], 0x1, &(0x7f0000002080)=""/106, 0x6a}, 0xa18}, {{&(0x7f0000002100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000002180)=""/57, 0x39}], 0x1, &(0x7f0000002200)=""/100, 0x64}}, {{&(0x7f0000002280)=@generic, 0x80, &(0x7f00000035c0)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/237, 0xed}, {&(0x7f0000003400)=""/181, 0xb5}, {&(0x7f00000034c0)=""/200, 0xc8}], 0x4, &(0x7f0000003600)=""/94, 0x5e}, 0x100000001}, {{&(0x7f0000003680)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f0000004c40)=[{&(0x7f0000003700)=""/203, 0xcb}, {&(0x7f0000003800)=""/217, 0xd9}, {&(0x7f0000003900)=""/90, 0x5a}, {&(0x7f0000003980)=""/52, 0x34}, {&(0x7f00000039c0)=""/16, 0x10}, {&(0x7f0000003a00)=""/84, 0x54}, {&(0x7f0000003a80)=""/107, 0x6b}, {&(0x7f0000003b00)=""/142, 0x8e}, {&(0x7f0000003bc0)=""/69, 0x45}, {&(0x7f0000003c40)=""/4096, 0x1000}], 0xa, &(0x7f0000004d00)=""/25, 0x19}, 0x20}, {{&(0x7f0000004d40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004dc0), 0x0, &(0x7f0000004e00)=""/86, 0x56}, 0x100000001}, {{&(0x7f0000004e80)=@nfc, 0x80, &(0x7f0000008380)=[{&(0x7f0000004f00)=""/4096, 0x1000}, {&(0x7f0000005f00)=""/28, 0x1c}, {&(0x7f0000005f40)=""/4096, 0x1000}, {&(0x7f0000006f40)=""/4096, 0x1000}, {&(0x7f0000007f40)=""/120, 0x78}, {&(0x7f0000007fc0)=""/249, 0xf9}, {&(0x7f00000080c0)=""/255, 0xff}, {&(0x7f00000081c0)=""/146, 0x92}, {&(0x7f0000008280)}, {&(0x7f00000082c0)=""/164, 0xa4}], 0xa, &(0x7f0000008440)=""/9, 0x9}, 0xfffffffffffffffc}, {{&(0x7f0000008480)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x80, &(0x7f0000008580)=[{&(0x7f0000008500)=""/52, 0x34}, {&(0x7f0000008540)=""/26, 0x1a}], 0x2, &(0x7f00000085c0)=""/155, 0x9b}, 0x6}], 0xa, 0x20, &(0x7f0000008900)={0x0, 0x1c9c380}) sendto$packet(r2, &(0x7f0000000280)="e9b7e57b21e1a5d6ce86cb2253c79e2e8e02462868c901fff68a4978165142c35f36f2b53c90a9765ecb40b7d6e81e42694ec9c6a6f01a10d6fbe49b1ffc333b01e9e61f82bdd5cee7fe28cc110d12b7063726e9c693cec471011426a1082b9cb5009d22187a06228cf9b5ce35948cbf429afa358f9d43682802a739fab73678e7136aa28c2321f2aea9e5ecc69870e87bd5b1", 0x93, 0x40000, &(0x7f0000008940)={0x11, 0x1c, r3, 0x1, 0x1}, 0x14) gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) ioprio_get$pid(0x0, r4) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000001c0)={'veth0\x00', 0x8b1}) 06:38:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) [ 1511.476220] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, 0x0, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {0x0}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) [ 1511.517499] protocol 88fb is buggy, dev hsr_slave_0 [ 1511.522684] protocol 88fb is buggy, dev hsr_slave_1 [ 1511.527834] protocol 88fb is buggy, dev hsr_slave_0 [ 1511.532911] protocol 88fb is buggy, dev hsr_slave_1 06:38:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x8701000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, 0x0, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0018001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4018001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {0x0}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) [ 1511.748564] FAULT_INJECTION: forcing a failure. [ 1511.748564] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1511.782872] CPU: 1 PID: 7208 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1511.789741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1511.799102] Call Trace: [ 1511.801720] dump_stack+0x172/0x1f0 [ 1511.805379] should_fail.cold+0xa/0x15 [ 1511.809281] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1511.814372] ? ___might_sleep+0x163/0x280 [ 1511.818532] should_fail_alloc_page+0x50/0x60 [ 1511.823044] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1511.827729] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1511.832743] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1511.837445] protocol 88fb is buggy, dev hsr_slave_0 [ 1511.838297] ? find_next_bit+0x107/0x130 [ 1511.843522] protocol 88fb is buggy, dev hsr_slave_1 [ 1511.847582] ? __cpu_to_node+0x7e/0xa0 [ 1511.847603] ? blk_mq_hw_queue_to_node+0xf1/0x140 [ 1511.861340] blk_mq_alloc_rqs+0x223/0x7f0 [ 1511.865495] ? __kmalloc_node+0x4e/0x70 [ 1511.869551] __blk_mq_alloc_rq_map+0x15f/0x2e0 [ 1511.874148] ? kasan_kmalloc+0x9/0x10 [ 1511.877965] blk_mq_alloc_tag_set+0x78a/0xd40 [ 1511.882477] loop_add+0x286/0x8d0 [ 1511.885927] ? idr_find+0x47/0x60 [ 1511.889398] loop_control_ioctl+0x165/0x360 [ 1511.893837] ? loop_add+0x8d0/0x8d0 [ 1511.897475] ? loop_add+0x8d0/0x8d0 [ 1511.901105] do_vfs_ioctl+0xd6e/0x1390 [ 1511.905000] ? ioctl_preallocate+0x210/0x210 [ 1511.909416] ? __fget+0x367/0x540 [ 1511.912878] ? ksys_dup3+0x3e0/0x3e0 [ 1511.916623] ? rcu_read_lock_sched_held+0x110/0x130 [ 1511.921642] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1511.927184] ? tomoyo_file_ioctl+0x23/0x30 [ 1511.931429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1511.937018] ? security_file_ioctl+0x93/0xc0 [ 1511.941434] ksys_ioctl+0xab/0xd0 [ 1511.944898] __x64_sys_ioctl+0x73/0xb0 [ 1511.948792] do_syscall_64+0x103/0x610 [ 1511.952710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1511.957902] RIP: 0033:0x457f29 [ 1511.961128] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1511.980036] RSP: 002b:00007f83f2436c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1511.987743] RAX: ffffffffffffffda RBX: 00007f83f2436c90 RCX: 0000000000457f29 [ 1511.995006] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1512.002277] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1512.009542] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24376d4 [ 1512.016820] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:37 executing program 0 (fault-call:18 fault-nth:10): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8018001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x5, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x8705000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {0x0}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, 0x0, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac018001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) [ 1512.421502] FAULT_INJECTION: forcing a failure. [ 1512.421502] name failslab, interval 1, probability 0, space 0, times 0 [ 1512.457977] CPU: 1 PID: 7249 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1512.464859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1512.474238] Call Trace: [ 1512.476863] dump_stack+0x172/0x1f0 [ 1512.480543] should_fail.cold+0xa/0x15 [ 1512.484467] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1512.489611] ? ___might_sleep+0x163/0x280 [ 1512.493794] __should_failslab+0x121/0x190 [ 1512.493827] should_failslab+0x9/0x14 [ 1512.501877] kmem_cache_alloc_node+0x264/0x710 [ 1512.506483] ? debug_mutex_init+0x2d/0x60 [ 1512.510653] ? __mutex_init+0xef/0x130 [ 1512.510738] blk_alloc_queue_node+0x32/0x760 [ 1512.510762] blk_mq_init_queue+0x4a/0xb0 [ 1512.523138] loop_add+0x2dd/0x8d0 [ 1512.526611] ? idr_find+0x47/0x60 [ 1512.530086] loop_control_ioctl+0x165/0x360 [ 1512.534423] ? loop_add+0x8d0/0x8d0 [ 1512.538068] ? do_vfs_ioctl+0xca/0x1390 [ 1512.542061] ? loop_add+0x8d0/0x8d0 [ 1512.545701] do_vfs_ioctl+0xd6e/0x1390 [ 1512.549610] ? ioctl_preallocate+0x210/0x210 [ 1512.554032] ? __fget+0x367/0x540 [ 1512.557506] ? ksys_dup3+0x3e0/0x3e0 [ 1512.561243] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1512.566798] ? tomoyo_file_ioctl+0x23/0x30 [ 1512.571103] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1512.576654] ? security_file_ioctl+0x93/0xc0 [ 1512.581079] ksys_ioctl+0xab/0xd0 [ 1512.584552] __x64_sys_ioctl+0x73/0xb0 [ 1512.588458] do_syscall_64+0x103/0x610 [ 1512.592370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1512.597571] RIP: 0033:0x457f29 [ 1512.600774] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:38:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x402, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x1}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000700)={r2, @in={{0x2, 0x4e22, @local}}, 0x2, 0x10000}, &(0x7f00000007c0)=0x90) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r3, 0xffffffffffffff6d, &(0x7f0000000040)}, 0x6) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000001c0)={"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"}) ioctl$KVM_PPC_GET_SMMU_INFO(r3, 0x8250aea6, &(0x7f0000000640)=""/163) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000800)=""/22) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x1) ioprio_get$pid(0x0, 0x0) 06:38:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0019001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1512.619683] RSP: 002b:00007f83f2457c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1512.627401] RAX: ffffffffffffffda RBX: 00007f83f2457c90 RCX: 0000000000457f29 [ 1512.634679] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1512.641975] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1512.649257] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24586d4 [ 1512.656541] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:37 executing program 0 (fault-call:18 fault-nth:11): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x8b00000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4019001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8019001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac019001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80400, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000040)=0x6) 06:38:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x900d000000000000, [0x4b564d03, 0x1, 0x17a]}) [ 1512.974472] FAULT_INJECTION: forcing a failure. [ 1512.974472] name failslab, interval 1, probability 0, space 0, times 0 [ 1512.997932] CPU: 1 PID: 7289 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1513.004831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1513.014197] Call Trace: [ 1513.016804] dump_stack+0x172/0x1f0 [ 1513.020476] should_fail.cold+0xa/0x15 [ 1513.024383] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1513.029504] ? __should_failslab+0x87/0x190 [ 1513.033856] __should_failslab+0x121/0x190 [ 1513.038117] should_failslab+0x9/0x14 [ 1513.041969] kmem_cache_alloc_node_trace+0x270/0x720 [ 1513.047103] ? lockdep_init_map+0x1be/0x6d0 [ 1513.051444] __kmalloc_node+0x3d/0x70 [ 1513.055258] ? mempool_alloc+0x380/0x380 [ 1513.059333] ? mempool_free+0x380/0x380 [ 1513.063321] mempool_init_node+0x138/0x560 [ 1513.067573] ? wait_for_completion+0x440/0x440 [ 1513.072169] ? mempool_alloc+0x380/0x380 [ 1513.076241] ? mempool_free+0x380/0x380 [ 1513.080231] mempool_init+0x3d/0x50 [ 1513.083876] bioset_init+0x33a/0x700 [ 1513.087611] blk_alloc_queue_node+0x137/0x760 [ 1513.092123] blk_mq_init_queue+0x4a/0xb0 [ 1513.096198] loop_add+0x2dd/0x8d0 [ 1513.099662] ? idr_find+0x47/0x60 [ 1513.103134] loop_control_ioctl+0x165/0x360 [ 1513.107470] ? loop_add+0x8d0/0x8d0 [ 1513.111116] ? loop_add+0x8d0/0x8d0 [ 1513.114754] do_vfs_ioctl+0xd6e/0x1390 [ 1513.118659] ? ioctl_preallocate+0x210/0x210 [ 1513.123077] ? __fget+0x367/0x540 [ 1513.126546] ? ksys_dup3+0x3e0/0x3e0 [ 1513.130280] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1513.135836] ? tomoyo_file_ioctl+0x23/0x30 [ 1513.140084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1513.145630] ? security_file_ioctl+0x93/0xc0 [ 1513.150056] ksys_ioctl+0xab/0xd0 [ 1513.153534] __x64_sys_ioctl+0x73/0xb0 [ 1513.157435] do_syscall_64+0x103/0x610 [ 1513.161347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1513.166543] RIP: 0033:0x457f29 [ 1513.169744] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1513.188654] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1513.196370] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1513.203646] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1513.210920] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1513.218221] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 06:38:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a001a001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1513.225503] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:38 executing program 0 (fault-call:18 fault-nth:12): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {0x0}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a401a001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) bind$isdn_base(r1, &(0x7f0000000040)={0x22, 0x4, 0x80000001, 0x9}, 0x6) sendmsg$rds(r1, &(0x7f0000003a00)={&(0x7f0000000080)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, &(0x7f0000003800)=ANY=[@ANYBLOB="4800000000000000140100000100000006000000ff0f0000", @ANYPTR=&(0x7f00000011c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='r\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000034c0)=ANY=[@ANYPTR=&(0x7f0000001240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="d300000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='3\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000001340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="bb00000000000000", @ANYPTR=&(0x7f0000001400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0010000000000000", @ANYPTR=&(0x7f0000002400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0010000000000000", @ANYPTR=&(0x7f0000003400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="b700009e00000000"], @ANYBLOB="060000000000000010000000000000008100000000000000580000000000000014010000070000000500000001000000", @ANYPTR=&(0x7f0000003540)=ANY=[@ANYBLOB="0101000000000000"], @ANYPTR=&(0x7f0000003580)=ANY=[@ANYBLOB="070000007f9d66d6"], @ANYBLOB="b8f32d3700000000020000000000000000000000000000000400000000000000070000000000000009000000000000005800000000000000140100000800000038f0ffff08000000", @ANYPTR=&(0x7f00000035c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000003600)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0080000000000000d203000000000000008000000000000002000000000000007c00000000000000010000000000000030000000000000001401000003000000", @ANYPTR=&(0x7f0000003640)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\\\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000036c0)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="1000000000000000580000000000000014010000060000000000000007000000", @ANYPTR=&(0x7f0000003700)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000003740)=ANY=[@ANYBLOB="9703000000000000"], @ANYBLOB="01000000000000009c0500000000000000000000000000007f000000000000004100000000000000ffffff7f00000000580000000000000014010000080000000100000081000000", @ANYPTR=&(0x7f0000003780)=ANY=[@ANYBLOB="ff03000000000000"], @ANYPTR=&(0x7f00000037c0)=ANY=[@ANYBLOB="0002000000000000"], @ANYBLOB="05000000000000000700000000000000250b000000000000060000000000000010000000000000000500000000000000"], 0x1d8, 0x40011}, 0x40) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000003a40)=0x3, 0x4) 06:38:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {0x0}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x9104000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a801a001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 06:38:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {0x0}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {0x0}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac01a001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1513.672146] FAULT_INJECTION: forcing a failure. [ 1513.672146] name failslab, interval 1, probability 0, space 0, times 0 [ 1513.697980] CPU: 0 PID: 7359 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1513.704856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1513.714325] Call Trace: [ 1513.716959] dump_stack+0x172/0x1f0 06:38:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a001b001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1513.720622] should_fail.cold+0xa/0x15 [ 1513.724614] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1513.729748] ? ___might_sleep+0x163/0x280 [ 1513.733922] __should_failslab+0x121/0x190 [ 1513.738213] should_failslab+0x9/0x14 [ 1513.742041] kmem_cache_alloc+0x2b2/0x6f0 [ 1513.746219] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1513.751351] ? mempool_free+0x380/0x380 [ 1513.755348] mempool_alloc_slab+0x47/0x60 [ 1513.759520] ? mempool_alloc+0x380/0x380 [ 1513.763607] mempool_init_node+0x2e1/0x560 [ 1513.768310] ? mempool_alloc+0x380/0x380 [ 1513.772363] ? mempool_free+0x380/0x380 [ 1513.776328] mempool_init+0x3d/0x50 [ 1513.779969] bioset_init+0x33a/0x700 [ 1513.783756] blk_alloc_queue_node+0x137/0x760 [ 1513.788400] blk_mq_init_queue+0x4a/0xb0 [ 1513.792538] loop_add+0x2dd/0x8d0 [ 1513.795998] ? idr_find+0x47/0x60 [ 1513.799449] loop_control_ioctl+0x165/0x360 [ 1513.803765] ? loop_add+0x8d0/0x8d0 [ 1513.807403] ? loop_add+0x8d0/0x8d0 [ 1513.811135] do_vfs_ioctl+0xd6e/0x1390 [ 1513.815031] ? ioctl_preallocate+0x210/0x210 [ 1513.819437] ? __fget+0x367/0x540 [ 1513.823032] ? ksys_dup3+0x3e0/0x3e0 [ 1513.826751] ? tomoyo_file_ioctl+0x23/0x30 [ 1513.830988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1513.836615] ? security_file_ioctl+0x93/0xc0 [ 1513.841027] ksys_ioctl+0xab/0xd0 [ 1513.844477] __x64_sys_ioctl+0x73/0xb0 [ 1513.848359] ? do_syscall_64+0xed/0x610 [ 1513.852328] do_syscall_64+0x103/0x610 [ 1513.856211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1513.861394] RIP: 0033:0x457f29 [ 1513.864582] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1513.883482] RSP: 002b:00007f83f2436c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1513.891181] RAX: ffffffffffffffda RBX: 00007f83f2436c90 RCX: 0000000000457f29 [ 1513.898450] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1513.905712] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1513.912986] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24376d4 [ 1513.920249] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:38 executing program 0 (fault-call:18 fault-nth:13): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x9e00000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a401b001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {0x0}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {0x0}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a801b001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x9f00004000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x202, 0x0) r2 = dup(r0) fanotify_mark(r1, 0x46c259a8fbfbb6ef, 0x2, r2, &(0x7f0000000040)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_smc(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac01b001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1514.212401] FAULT_INJECTION: forcing a failure. [ 1514.212401] name failslab, interval 1, probability 0, space 0, times 0 [ 1514.233785] CPU: 1 PID: 7391 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1514.240929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1514.250553] Call Trace: [ 1514.253285] dump_stack+0x172/0x1f0 [ 1514.256996] should_fail.cold+0xa/0x15 06:38:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a001c001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a401c001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1514.260985] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1514.266094] ? ___might_sleep+0x163/0x280 [ 1514.270406] __should_failslab+0x121/0x190 [ 1514.274643] should_failslab+0x9/0x14 [ 1514.278621] kmem_cache_alloc+0x2b2/0x6f0 [ 1514.282773] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1514.288503] ? __phys_addr+0xa4/0x120 [ 1514.292305] ? mempool_init+0x3d/0x50 [ 1514.296111] mempool_alloc_slab+0x47/0x60 [ 1514.300278] ? mempool_alloc+0x380/0x380 [ 1514.304336] mempool_init_node+0x2e1/0x560 [ 1514.308655] ? mempool_alloc+0x380/0x380 [ 1514.312715] ? mempool_free+0x380/0x380 [ 1514.316686] mempool_init+0x3d/0x50 [ 1514.320349] bioset_init+0x33a/0x700 [ 1514.324072] blk_alloc_queue_node+0x137/0x760 [ 1514.328575] blk_mq_init_queue+0x4a/0xb0 [ 1514.332755] loop_add+0x2dd/0x8d0 [ 1514.336210] ? idr_find+0x47/0x60 [ 1514.339843] loop_control_ioctl+0x165/0x360 [ 1514.344165] ? loop_add+0x8d0/0x8d0 [ 1514.347793] ? do_vfs_ioctl+0xd08/0x1390 [ 1514.351848] ? loop_add+0x8d0/0x8d0 [ 1514.355504] do_vfs_ioctl+0xd6e/0x1390 [ 1514.359390] ? ioctl_preallocate+0x210/0x210 [ 1514.363794] ? __fget+0x367/0x540 [ 1514.367245] ? ksys_dup3+0x3e0/0x3e0 [ 1514.370983] ? rcu_read_lock_sched_held+0x110/0x130 [ 1514.376115] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1514.381656] ? tomoyo_file_ioctl+0x23/0x30 [ 1514.385900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1514.391450] ? security_file_ioctl+0x93/0xc0 [ 1514.395918] ksys_ioctl+0xab/0xd0 [ 1514.400306] __x64_sys_ioctl+0x73/0xb0 [ 1514.404255] do_syscall_64+0x103/0x610 [ 1514.408155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1514.413484] RIP: 0033:0x457f29 [ 1514.416784] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1514.435822] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1514.443581] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1514.450855] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1514.458134] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1514.465485] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1514.472931] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:39 executing program 0 (fault-call:18 fault-nth:14): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a801c001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") add_key(&(0x7f0000000080)='dns_resolver\x02', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) r2 = open(&(0x7f0000000000)='./file0\x00', 0x100, 0x4) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac01c001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0xa001000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000580)='/dev/binder#\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f00000001c0)=0xc) ioprio_get$pid(0x1, r4) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000200)={{0x2, 0x263}, 'port1\x00', 0x8, 0x20000, 0x5, 0x20, 0x556b, 0x9, 0x7fffffff, 0x0, 0x4, 0x4}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/xfrm_stat\x00') ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r5, 0xc0a85352, &(0x7f0000000040)={{0xfff, 0x1a}, 'port0\x00', 0x0, 0x20, 0x6, 0x80000001, 0x0, 0x84a, 0x7, 0x0, 0x0, 0x8}) 06:38:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) [ 1514.668710] __nla_parse: 22 callbacks suppressed [ 1514.679963] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a001d001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0xa00d000000000000, [0x4b564d03, 0x1, 0x17a]}) [ 1514.771692] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1514.790741] FAULT_INJECTION: forcing a failure. [ 1514.790741] name failslab, interval 1, probability 0, space 0, times 0 [ 1514.819497] CPU: 0 PID: 7445 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1514.826414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1514.835765] Call Trace: [ 1514.838416] dump_stack+0x172/0x1f0 [ 1514.842164] should_fail.cold+0xa/0x15 [ 1514.846051] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1514.851154] ? ___might_sleep+0x163/0x280 [ 1514.855314] __should_failslab+0x121/0x190 [ 1514.859544] should_failslab+0x9/0x14 [ 1514.863342] kmem_cache_alloc_node_trace+0x270/0x720 [ 1514.868442] ? retint_kernel+0x2d/0x2d [ 1514.872324] ? lockdep_init_map+0x1be/0x6d0 [ 1514.877013] __kmalloc_node+0x3d/0x70 [ 1514.880889] ? mempool_alloc+0x380/0x380 [ 1514.884969] ? mempool_free+0x380/0x380 [ 1514.888956] mempool_init_node+0x138/0x560 [ 1514.893273] ? mempool_alloc+0x380/0x380 [ 1514.897335] ? mempool_free+0x380/0x380 [ 1514.901422] mempool_init+0x3d/0x50 [ 1514.905126] bioset_init+0x536/0x700 [ 1514.908960] blk_alloc_queue_node+0x137/0x760 [ 1514.913472] blk_mq_init_queue+0x4a/0xb0 [ 1514.917648] loop_add+0x2dd/0x8d0 [ 1514.921099] ? idr_find+0x47/0x60 [ 1514.924547] loop_control_ioctl+0x165/0x360 [ 1514.924556] ? loop_add+0x8d0/0x8d0 [ 1514.924568] ? loop_add+0x8d0/0x8d0 [ 1514.924578] do_vfs_ioctl+0xd6e/0x1390 [ 1514.924589] ? ioctl_preallocate+0x210/0x210 [ 1514.924602] ? __fget+0x367/0x540 [ 1514.932584] ? ksys_dup3+0x3e0/0x3e0 [ 1514.932595] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1514.932607] ? tomoyo_file_ioctl+0x23/0x30 [ 1514.932615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1514.932627] ? security_file_ioctl+0x93/0xc0 [ 1514.940124] ksys_ioctl+0xab/0xd0 [ 1514.940135] __x64_sys_ioctl+0x73/0xb0 [ 1514.940146] do_syscall_64+0x103/0x610 [ 1514.940159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1514.940167] RIP: 0033:0x457f29 [ 1514.940181] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1515.010005] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 06:38:40 executing program 0 (fault-call:18 fault-nth:15): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a401d001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xffffffff, 0x4000) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x42040, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x78) fanotify_init(0xa, 0xc0000) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000001c0)={0x3, 0xfff, 0x1, 0x6f, 0x8, [{0x8, 0xfa4, 0x6, 0x0, 0x0, 0x84}, {0x17a, 0xc9, 0x1, 0x0, 0x0, 0x100}, {0x1, 0xffffffffffffd97e, 0x7fffffff, 0x0, 0x0, 0x2000}, {0x10001, 0x2, 0x6}, {0x5, 0xcee2, 0x0, 0x0, 0x0, 0x200}, {0x243a, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x202}, {0x5, 0x400, 0xe9}, {0x3, 0x6, 0xffffffff80000001}]}) 06:38:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {0x0}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1515.017703] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1515.025046] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1515.032382] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1515.039646] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1515.046908] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xe3, 0x14200) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x0, @local}}, 0x1e) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) [ 1515.099215] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {0x0}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a801d001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0xb000004000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {0x0}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {0x0}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x6, 0x20, 0x7, 'syz1\x00', 0x81}, 0x4, 0x404, 0xfffffffffffffff8, r3, 0x6, 0x4, 'syz0\x00', &(0x7f0000000080)=[')#([#wlan0\x00', '\x00', '#%\x00', 'vboxnet0#\x00', '\x00', 'bdevGPL$eth1\x00'], 0x27, [], [0x19c, 0xfffffffffffffffe, 0xffffffffffffffff, 0x6a]}) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f00000000c0)={0x6, 0x800, 0x101}) ioprio_get$pid(0x0, 0x0) [ 1515.279536] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1515.365964] FAULT_INJECTION: forcing a failure. [ 1515.365964] name failslab, interval 1, probability 0, space 0, times 0 [ 1515.378702] CPU: 0 PID: 7498 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1515.385558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1515.395202] Call Trace: [ 1515.397801] dump_stack+0x172/0x1f0 [ 1515.401617] should_fail.cold+0xa/0x15 [ 1515.405507] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1515.410678] ? ___might_sleep+0x163/0x280 [ 1515.414904] __should_failslab+0x121/0x190 [ 1515.419175] should_failslab+0x9/0x14 [ 1515.422985] kmem_cache_alloc+0x2b2/0x6f0 [ 1515.427132] ? mempool_free+0x380/0x380 [ 1515.431221] mempool_alloc_slab+0x47/0x60 [ 1515.435367] ? mempool_alloc+0x380/0x380 [ 1515.439545] mempool_init_node+0x2e1/0x560 [ 1515.443782] ? mempool_alloc+0x380/0x380 [ 1515.447839] ? mempool_free+0x380/0x380 [ 1515.451807] mempool_init+0x3d/0x50 [ 1515.455503] bioset_init+0x536/0x700 [ 1515.459221] blk_alloc_queue_node+0x137/0x760 [ 1515.463718] blk_mq_init_queue+0x4a/0xb0 [ 1515.467773] loop_add+0x2dd/0x8d0 [ 1515.471227] ? idr_find+0x47/0x60 [ 1515.474682] loop_control_ioctl+0x165/0x360 [ 1515.478997] ? loop_add+0x8d0/0x8d0 [ 1515.482778] ? loop_add+0x8d0/0x8d0 [ 1515.486403] do_vfs_ioctl+0xd6e/0x1390 [ 1515.490307] ? ioctl_preallocate+0x210/0x210 [ 1515.494708] ? __fget+0x367/0x540 [ 1515.498166] ? ksys_dup3+0x3e0/0x3e0 [ 1515.501969] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1515.506727] ? tomoyo_file_ioctl+0x23/0x30 [ 1515.510971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1515.516509] ? security_file_ioctl+0x93/0xc0 [ 1515.521028] ksys_ioctl+0xab/0xd0 [ 1515.524480] __x64_sys_ioctl+0x73/0xb0 [ 1515.528363] do_syscall_64+0x103/0x610 [ 1515.532389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1515.537644] RIP: 0033:0x457f29 [ 1515.540837] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1515.559891] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1515.567595] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1515.574856] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1515.582117] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1515.589507] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1515.596769] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:40 executing program 0 (fault-call:18 fault-nth:16): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac01d001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0xb700004000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fsetxattr$security_selinux(r0, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:kmsg_device_t:s0\x00', 0x23, 0x3) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'veth1_to_hsr\x00', 0xffffffff}) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000000080)=""/2, &(0x7f0000000240)=0x2) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5, 0x1000000000000, 0x1f, 0x1, 0x0, 0xffff, 0x10000, 0x3, 0x40, 0xfffffffffffffffc, 0x0, 0x800, 0x9, 0x7fff, 0x400, 0x108, 0x0, 0x8, 0x7fffffff, 0x6, 0x100000001, 0x15f, 0x57, 0x7fffffff, 0x81, 0xbe, 0x1, 0x6, 0x7fff, 0xffffffffffff0001, 0x1ff, 0xa58, 0x4, 0x9, 0x1ff, 0xcd, 0x0, 0x1, 0x7, @perf_bp={&(0x7f0000000040), 0xc}, 0x2, 0xffffffff7fffffff, 0x1, 0x7, 0x7, 0x20, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x2) ioprio_get$pid(0x0, 0x0) 06:38:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {0x0}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {0x0}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) [ 1515.677431] net_ratelimit: 18 callbacks suppressed [ 1515.677437] protocol 88fb is buggy, dev hsr_slave_0 [ 1515.687469] protocol 88fb is buggy, dev hsr_slave_1 [ 1515.692536] protocol 88fb is buggy, dev hsr_slave_0 [ 1515.697623] protocol 88fb is buggy, dev hsr_slave_1 [ 1515.708608] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1515.751189] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a001e001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0xc000000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) times(&(0x7f0000000000)) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) [ 1515.870714] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x2, 0x0) [ 1515.911608] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1515.997449] protocol 88fb is buggy, dev hsr_slave_0 [ 1516.002545] protocol 88fb is buggy, dev hsr_slave_1 [ 1516.007681] protocol 88fb is buggy, dev hsr_slave_0 [ 1516.012723] protocol 88fb is buggy, dev hsr_slave_1 [ 1516.033447] FAULT_INJECTION: forcing a failure. [ 1516.033447] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1516.045509] CPU: 1 PID: 7614 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1516.052347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1516.061709] Call Trace: [ 1516.064457] dump_stack+0x172/0x1f0 [ 1516.068194] should_fail.cold+0xa/0x15 [ 1516.072079] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1516.077186] ? debug_smp_processor_id+0x3c/0x280 [ 1516.081976] ? perf_trace_lock+0xeb/0x510 [ 1516.088337] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1516.094166] should_fail_alloc_page+0x50/0x60 [ 1516.098666] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1516.103337] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1516.108346] ? find_held_lock+0x35/0x130 [ 1516.112413] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1516.117732] cache_grow_begin+0x9c/0x860 [ 1516.121797] ? mempool_alloc_slab+0x47/0x60 [ 1516.127177] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1516.132762] kmem_cache_alloc+0x62d/0x6f0 [ 1516.136918] ? mempool_free+0x380/0x380 [ 1516.140914] mempool_alloc_slab+0x47/0x60 [ 1516.145095] ? mempool_alloc+0x380/0x380 [ 1516.149198] mempool_init_node+0x2e1/0x560 [ 1516.153454] ? mempool_alloc+0x380/0x380 [ 1516.157514] ? mempool_free+0x380/0x380 [ 1516.161561] mempool_init+0x3d/0x50 [ 1516.165212] bioset_init+0x536/0x700 [ 1516.168927] blk_alloc_queue_node+0x137/0x760 [ 1516.173450] blk_mq_init_queue+0x4a/0xb0 [ 1516.177554] loop_add+0x2dd/0x8d0 [ 1516.184277] ? idr_find+0x47/0x60 [ 1516.187767] loop_control_ioctl+0x165/0x360 [ 1516.192284] ? loop_add+0x8d0/0x8d0 [ 1516.195909] ? loop_add+0x8d0/0x8d0 [ 1516.199552] ? loop_add+0x8d0/0x8d0 [ 1516.203249] do_vfs_ioctl+0xd6e/0x1390 [ 1516.207139] ? ioctl_preallocate+0x210/0x210 [ 1516.211752] ? retint_kernel+0x2d/0x2d [ 1516.215651] ? tomoyo_path_chmod+0x30/0x30 [ 1516.222173] ? tomoyo_file_ioctl+0x12/0x30 [ 1516.226405] ? tomoyo_file_ioctl+0x23/0x30 [ 1516.230638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1516.236301] ? security_file_ioctl+0x93/0xc0 [ 1516.240887] ksys_ioctl+0xab/0xd0 [ 1516.244341] __x64_sys_ioctl+0x73/0xb0 [ 1516.248229] do_syscall_64+0x103/0x610 [ 1516.252124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1516.257357] RIP: 0033:0x457f29 [ 1516.260603] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1516.280189] RSP: 002b:00007f83f2457c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1516.287904] RAX: ffffffffffffffda RBX: 00007f83f2457c90 RCX: 0000000000457f29 [ 1516.295285] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1516.302557] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1516.309825] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24586d4 [ 1516.317249] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:41 executing program 0 (fault-call:18 fault-nth:17): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a401e001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x1) ioprio_get$pid(0x2000, 0x0) 06:38:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0xc100000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) [ 1516.427845] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a801e001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) r3 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x8, 0x2) r4 = syz_open_dev$vcsn(&(0x7f0000001280)='/dev/vcs#\x00', 0x1, 0x41) mq_timedsend(r3, &(0x7f00000011c0)="7baf165b5f5ef39b7d68bb0756e6f17c1a664ec48488efd4a4f897e26d351cd575e4d56d3ecac4585b9f835ae9d659ddd4dc3f07b22502217432be35d8abf311c8b7059e082ce3ff96e88f6bc622e36b8d4082310eae3c63b8885430927c6a845b3c70aa605c928c8e790fa4d98263", 0x6f, 0x669938f1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r5 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x20001) ioctl$VIDIOC_G_FBUF(r5, 0x8030560a, &(0x7f00000000c0)={0x6, 0x8, &(0x7f00000001c0)="76053737ef45fa4bcb92fe6700b6deadbc6d6103978c6ff75a3d3ace42cc75119a1bf1223a3bd76411feef37074f659a6021e9a5ec294d220fd33ee2d31bc865706d8d3fd00e3bd7504558790001cffd0a7281507c926452fd9a4c4f72c5d2c762dcff222ef98e1d98b23c0d07af93b49dfc18e585d854b8fc2534eedb040572945a820a1c0373736f4d561188d7892e71000ee2b3aac4db87849e7c686a22ffce5814ba83d13cbdb186e38f784c55bff59ca4c2308341c71054bbc611417a75fa74d5bfcf18410e39e9872621cc6fea8393abbabe739162b43315f5e93d06de874a7fd51035c6e894bb28962f1bdcc666310fafc0a22564054bb70926aed25fd0f5b3bfbc3f7f04851a88bcc52849ea7444ba952bf1a06b1270abbe691cce19f416f28072f4d6f3f6305dc615e820e97506d726ff425464da7f949e41ed5e9e35b1fc9e2e96c584db1d9dba6bbb54a3563e0f5ea68e89e4c69da369a841806d09caf727fdfc9de7807890173dece7b52d56e9c866723b21fbfcb667262a6cce947165cd5a451f9f7de9fc1e593119da1c04d5dc9db1c2272afd74a71e02dfae555e05de3e8a850a63189c2146d9fa688d40d03526cb23edaa9a26e49d809a2dae7627ee3fa6cf4ff4fd46913ec6c44a6487a1b38b36dbc048903d0f666df4c927c7cc1e8942a0196d700d3fbfb80b922f718156d4b5e270ad8c082d7357d68f8a5322717603a0bec94133abf189e481ec6d04429044c6813c4065c737ab5ce2ea6214c75970a83575d13743726f736e13691b5b6ad9416b2b4f776b61144f3d63f3dc0dbc55f711822afa657513c13700102d7aa3e047a8437e00a6aaf535cba88d75ffa3a0da5476c505a42086ee3dda6ace8fb46cf3f724bb47d2e4b2fe81d11e7823043ed74c1fea34beb78cc5ccf07e1752f7a8682f72bbcbcf3922978948aa43a5ead988136d837675a8ed00e920d6ae8171a3dd83a5af680ee719a05c458d63fe2fb4e8bc9fe7a82d9331343829c65cadc7945ecc7429eb2195433858a5e791bdb6feaa4a0d9ea2c6e7ef9b65c936a97fc84e1d279d0bec75a9e2b7d9ea442b0527107294f6901c817ac816cb2b2f1653f5b7cab112840844ed6bfedff6c22cd45ad153ff6bc4678694a695e076951cd23bebd35d688ac62080794dfbb8933f2c9131c1d52654e5a7873edab56f72a29db0e2bafd5d393420134772912db3cfeab922e4ccc3cb3ac5cff4dfa9106323a1f0440cecc521836ec1eea0e353ccea41848a60ea2882815cba059b7388a845786659a2b1ccb48976ab152afb7eed1c46e8bc2c434c1075368b8ec5edc85808ea3374be4fb111ec1eb6295b0ab418feac7e0e8a5dfb35c7a5fbcfcfceb32e56ca716ad6e4b8564fce58ffffc9aa8f94b6f2e634dcb570474553af1d555d7ac32f6e7926d5488146c0c8c69ef0c4ce14e70a4e5980403a2d334ea44b451abb7a52d14bfd1c2e1c74b90214f5c442531d55f9c507bfae5916460bb2b663679875b70b36919b90a9d3cdf4886fbda743b4a615db0540ce75ca86d88b0c7d6c39e913e273a16f622f8259ff5dcd650991e419a051a0833e90e525aaf8c95fff32f65f2f7fa4210d289372702cd7c90c252a7c11997981bdfc65f6de355cb34c6f28551ac5f58c39a0eee3710a42ff6765b601cd5d6a25dcc619fe896c4d2a0bac67bf262f6470c24cb7202bc15a6e7a3e57ac8a0dc93515b6b60da5a467357482a7b2197206af194307ab58f950a0ec2b525a0848b7f6cfed14065a1dccf047c1e18c5f5a16a69881408167ea386500a020ae09f78c9358bff6efaec9b0bec77350858ae7d1fe30a948154def0190d27db9a907b9079d04d64a07ea374d1f8b9e00e4ea57917ce89a7aab8a440b5b4af9552cb6b5819e3a326fbbbd90ee39f350c37cf53203a24cbaeb73689065f6c1983f1124540798007eb0fc211529f9941fe5d9d16b02b30847d5d391a9d8c0212c065131837f0fe574af2818060d4e5f29f86568e4f6e10c841de56f2b3014478c9cba86dc9b1ce11f4875224cc0b1710a0266e3885bc85f10e72d46fcfe7adedb9720e20afc283cfd1286150b6b6ad19edf47f097fa8e57982577fb4588ba025fc32b3d795c2e319aa0c2b0f46cd84931a3b8b3abfa83ab5863bf1b84184add6407c9488b9e62b70eb8cc102cd801bd098a5423c8473da545deac1809d364d7c51fcf941545cd33f74f43e41cbeb4bf28482b14de9ec0f353a4a207ea00f7ae1f55f2cb1e3447ed30dfce5aa89968d60e28c4a5dc8aca2080f238815b81b2080838cdca4eb344dd79ee3918b3d67fb13beb105d227136b47437b21117da6b4cb275de9ed82ab00c1e8ee085470c3f5897e41187c31e0fb8b942a3b188c4b49113cf0d416d24c457d60af6717ba99d4e31a07e2d284cfd4b637847d2f0b1c9435523a2b7840c9a5844369125105bfdacd43bc6a0862c0950cf6f83b3ecd47790fb1bf0e06a19b88abc8f03ac58f9d5292bb4def1320596cf1f7e11ccf3f3d43eff3371161ed0d649c456ec2c68af24f745232df9adfc61af6e2fe48d6a9a533f15b51561ecfd5cf45b5283517f3f48e77f7839419ac45e103ba2a73d35bdaadf12835073cbd46dad0859ffbfd3da47b890abb44de1c4ccc92db246b9930d9a09f7bd32bc3270e389166fa101311a4825588dc3b49b4de3ee258e3b291944a8fd6be5f3ca64bf750cff7c22e95e37650a4c975f363055134b87ca182590a35738aec39ac709625842277400339fc1b8055490c43f450f707f424a7386d6726a358e43c4d335c04c7bfc609a5cfce946e8282ff50eb93814e12e17c73afdd07d29b3256c491f96127efff8888ac03b34a0886183d5d74c253ca8a2fe2fdc6d4161c5e53bbb8c4fe6b61794a05d8ca465de406517f971e62fe631f29de92be38dff8e660638f5d6385ec1f544eff8d56bf11e5ca6ac5b7a55f519d24dc9da3a41a7ababb5b29dc9f5f8b0fd539baa0e06dc83ca36fc6d4f7fc510c87483d81eb8abc059f440ec447bdb81fac2739194cba4944be1fa0370162867c388abd596f10e452722d8f96980db3d697358e7cd04d14596f9d16824b3c9b1a1840cea56e684603f627d6a7742432b5625c0bff97a666173697751d382d93560f65bb452c9c03e215a13f38aedea6e7c63265c5624a6219ea0e7456c75c1b3af71b2366735f85d07cdce386a45336f0f9d0e463d29140ec4ad30682f4fcbc1a2a9104e75cc477095a2f0fa9ca3fc479e137ad879bb720144136307899b4a2e5e67900f56e8ba02e31d9c050c3f741cc218ad442890613b54068d64ff2608ce45a931c47065670d0f3d10c5140511841c7fa6c3af646d5c899ce8b834991576c2ca468f7e4c0610f4e155cc4499441cfdf4dd32fc15fecfee53a23c4df3ea0a66872c0ee4d4e15aa9accdf86064717aea1508ea1d7d71867e69bd9d5779bc7ee5a7a81592ad1654960ac5a6d5d2bb22b16157e7320e7630158d444137406ff5710fb9ce59027124932f9be8345c9948d6612875fd78224e01d6f660d7781279a9a67c6b05538f8b146805a7bb79743dd599d0e99c728290bc3dfe234bb5cdfe88342db29e75d7d7a88bb792c1717740c1d649d2067b20d735d4e8006a1ce647bb24eaec43af4ab5c6174923530497abc9bb6379563e11e9f7f1d7d41aed6e8ce3fc167dc2524387a89e2624777e260056cf696cf810edc890e5155ceb50adb4834c5c1304102a52974528379feab0aa172057ebf45c8c6c28ee533cfc2aca37b9e61fc1c0fca364d626497875acb5e04e56800179d5f33d005608484d557e44c8b4ef422cc5281c3b31068793502ab9d18051b61c6f30e18b927814269ae38397343a75a0decfd025557988bd12c26ab7e5a04e9afd97bc058e330cfe5dc45dd18137be670bbd4a70dacf5fe1b2b57cec018e496fd7992685e5d02a5a842a16c2e28426cf21d2c2f33aa876658fe0232348f3272c05d64a401fdd8a159aa6d7371c8a9b9cc7b9423248c872ed558a63aae1814110e9d0e855ad5cb59915b8471c7bf2cbaf4f9c18b7c629411a4e5d7d29f24353a6d6600835d8075573423fc8aa671ddf384080826b81dfb200e7984bc8fd24d5cf76126e65fb4db1d2ea190f11a730add4af5f6f89c4f45f7b71478c4f662b48512137f86b638b489f7d7afa89801af067e1e3037b111c1c4d5fda9bc46e779ea69921b2b823ea3b20a8c7ed831810cf02227f25c2e15fbcae6ab7e0787567368a9eadbd23c892c77ca81d28f2e4f384227b574169d286937170d8ae72d96c553bd8913cb32d7726d99d309a23941720f7852c2f314a8ba6fc16a6db7719c9b6354551e74f377ce0b7d5855233dc164d299d296a7adc0812e7aee37d385f928714be15ba1829a99fea00ce3309264d8795a075e4515a55172e0d528de1ed648e3d32df5956b6e975f7e74ce5b257a5e2c97eae0994ec6ac8c6ea83009ff339245a5918b55753824acee62f5370b3ea6785192cd886ae1fa0b66a95e2ca752186ece599576060990e4deafe2b8965e4ed9b95a9df97918702c7c57ed1caf3ec130154a973e8906e086dfb145ee720817bafd0ebb9f7e05a8a25d052de0ddb03042c8e8fa713161d5ce778a270c7983627332e0384e46c40087331886b7e72e66d5a15b95897721ad4e9efb5a063621c981a64f5cd6ebab40a770457021b744b33902767b8c1a95fb241df9a3d10b18f69940415773dc9c039f3793f3d38d32bb14bc05a2ef8ade8066fab0bb4ff701dfa93d2098695e7898b51a07dbb359770bc5e2ec6faca2285b09b5823156f651433af10f4d293ff2c4f04d80b702ea67ed1e79fc8ee2971767f626dc1ba1d2a8fd5eb149b4bfe1fc66f9f584ad935f2f4fb5155018186e263b8b56fb2b25ebc40d1d588fe511d8aa2b35dab67271dccb98ac3fb9edeb89ee7fb45068e2838e8d3255481d714f5c7426ef00646dc5c0bf550f2c13f51b444922d753ee064863d88d8b38bfe186c087699cd2e05f1d7f2e188496b266fe86fb5df86ee2c12ec99634d4e3d193469b48e6834c48a790fda01c3313c16adf158f5d5b33ef1db1a2c444d56104d2a9920660d1cf8c013b278e81a0842c2393fd0913de210a231212b584d2ca302c3017f415a76485a7e8e6bc559d3250ebdb40c0e6229823ba1504cb868428a5df74556c881c642349b2e391c497901f7440a0fdfe324892b3e4d45f4a86f100a42cb31845e2e45eafa1aafb2a39401cfb474a8beb0706d8c5300827a899bc63a52dcdbfa91c608fc93a0c24b7d03b5e2540706ff9a9ba9911a7fc3ae8208710532cb2266aee5c9072d1c720c2d7e6d372f68771111551f59b78f46737a691e9ac500d4e549970a21aad9a7c374bd4de25f790517c383cb598e57bbdf7c1df34bbd0170727ca504c0f605d8ad64a2f7b101c5d8bcfc63482272999155b1931df50e8e4ce31ba5051dfeb61e3070dce5b76140b77c4d86be6987abe9a01c480cc6a6a580d8046f6b7c21a40898b363e5fc99351c542a492be8bde1aa03e0bec8f27d7769178667808456169b804990aa421ea1a40809616180454cbea3b04e8f78350dcb49d25c64c6631278f63f69ca3f03f0b437f4093afae96a38a945759e88649bfd331051ed29c2eb713fd8b762c00574628c96eae91d6cf9b4f6fa8ef887765333550472a719bfc1fe949622d1602ea442a2c81ba7842457ab48f8421ab8354e2ee7b06a9ff98faa8342c5d06ba021a8648c9bb849bd7f67197999fdbb", {0x471d, 0x3, 0x41495043, 0xb, 0x40, 0x5}}) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) tkill(r2, 0x3) ioctl$EVIOCRMFF(r5, 0x40044581, &(0x7f0000001240)=0x10000) ioprio_get$pid(0x0, 0x0) r6 = syz_genetlink_get_family_id$team(&(0x7f0000001300)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000001340)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000001440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001480)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000001580)=0xe8) recvmmsg(r5, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f00000015c0)=""/227, 0xe3}, {&(0x7f00000016c0)=""/185, 0xb9}, {&(0x7f0000001780)=""/208, 0xd0}, {&(0x7f0000001880)=""/18, 0x12}, {&(0x7f00000018c0)=""/203, 0xcb}, {&(0x7f00000019c0)=""/16, 0x10}], 0x6, &(0x7f0000001a80)=""/187, 0xbb}, 0x2a}, {{&(0x7f0000001b40)=@sco, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001bc0)=""/110, 0x6e}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000001d00)=""/95, 0x5f}, {&(0x7f0000001d80)=""/240, 0xf0}], 0x4}, 0x4}, {{&(0x7f0000001ec0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002040)=[{&(0x7f0000001f40)=""/37, 0x25}, {&(0x7f0000001f80)=""/51, 0x33}, {&(0x7f0000001fc0)=""/80, 0x50}], 0x3, &(0x7f0000002080)=""/211, 0xd3}}, {{0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000002180)=""/143, 0x8f}, {&(0x7f0000002240)=""/44, 0x2c}, {&(0x7f0000002280)=""/252, 0xfc}, {&(0x7f0000002380)=""/70, 0x46}], 0x4}, 0x627}], 0x4, 0x10000, &(0x7f0000002540)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000002640)={0x0, @initdev}, &(0x7f0000002680)=0xc) getsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f00000026c0)={@dev, @empty, 0x0}, &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000002740)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@dev}}, &(0x7f0000002840)=0xe8) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000002a00)={'veth1_to_bond\x00', 0x0}) recvmmsg(r3, &(0x7f0000003d80)=[{{&(0x7f0000003380)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000003440)=[{&(0x7f0000003400)=""/24, 0x18}], 0x1, &(0x7f0000003480)=""/52, 0x34}, 0x8}, {{&(0x7f00000034c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003680)=[{&(0x7f0000003540)=""/68, 0x44}, {&(0x7f00000035c0)=""/90, 0x5a}, {&(0x7f0000003640)=""/48, 0x30}], 0x3, &(0x7f00000036c0)=""/170, 0xaa}, 0x1}, {{&(0x7f0000003780)=@ax25={{}, [@remote, @null, @default, @bcast, @bcast, @default, @bcast, @netrom]}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003800)=""/232, 0xe8}, {&(0x7f0000003900)=""/117, 0x75}, {&(0x7f0000003980)=""/74, 0x4a}, {&(0x7f0000003a00)=""/234, 0xea}, {&(0x7f0000003b00)=""/135, 0x87}, {&(0x7f0000003bc0)=""/143, 0x8f}], 0x6, &(0x7f0000003d00)=""/76, 0x4c}, 0x2}], 0x3, 0x2, 0x0) getsockname(r5, &(0x7f0000003e40)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000003ec0)=0x80) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000007dc0)={@initdev, @empty, 0x0}, &(0x7f0000007e00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000007e40)={@loopback, @multicast1, 0x0}, &(0x7f0000007e80)=0xc) getsockopt$inet6_mreq(r3, 0x29, 0x1f, &(0x7f0000007ec0)={@mcast2, 0x0}, &(0x7f0000007f00)=0x14) accept$packet(r4, &(0x7f0000007f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007f80)=0x14) accept$packet(r3, &(0x7f0000007fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008000)=0x14) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000008040)={{{@in6=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000008140)=0xe8) getsockopt$inet6_mreq(r5, 0x29, 0x0, &(0x7f00000081c0)={@local, 0x0}, &(0x7f0000008200)=0x14) accept$packet(r3, &(0x7f0000008240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008280)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000082c0)={'vcan0\x00', 0x0}) accept$packet(r4, &(0x7f00000084c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000008500)=0x14) getsockname$packet(r4, &(0x7f0000008540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008580)=0x14) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000008680)={0x0, @broadcast, @loopback}, &(0x7f00000086c0)=0xc) recvmmsg(r4, &(0x7f000000a400)=[{{&(0x7f0000008700)=@nfc, 0x80, &(0x7f0000008a40)=[{&(0x7f0000008780)=""/145, 0x91}, {&(0x7f0000008840)=""/53, 0x35}, {&(0x7f0000008880)}, {&(0x7f00000088c0)}, {&(0x7f0000008900)=""/88, 0x58}, {&(0x7f0000008980)=""/126, 0x7e}, {&(0x7f0000008a00)=""/41, 0x29}], 0x7, &(0x7f0000008ac0)=""/97, 0x61}, 0x7fff}, {{&(0x7f0000008b40)=@rc, 0x80, &(0x7f0000008dc0)=[{&(0x7f0000008bc0)=""/155, 0x9b}, {&(0x7f0000008c80)=""/72, 0x48}, {&(0x7f0000008d00)=""/175, 0xaf}], 0x3, &(0x7f0000008e00)=""/31, 0x1f}, 0xfffffffffffffffa}, {{&(0x7f0000008e40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000009040)=[{&(0x7f0000008ec0)=""/85, 0x55}, {&(0x7f0000008f40)=""/251, 0xfb}], 0x2, &(0x7f0000009080)=""/52, 0x34}, 0x6}, {{&(0x7f00000090c0)=@nl=@unspec, 0x80, &(0x7f000000a140)=[{&(0x7f0000009140)=""/4096, 0x1000}], 0x1}, 0x200}, {{&(0x7f000000a180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000a300)=[{&(0x7f000000a200)=""/56, 0x38}, {&(0x7f000000a240)=""/154, 0x9a}], 0x2, &(0x7f000000a340)=""/134, 0x86}, 0x5}], 0x5, 0x2, &(0x7f000000a540)={0x77359400}) getpeername$packet(r5, &(0x7f000000a580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a5c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f000000a600)={'vcan0\x00', 0x0}) accept4$packet(r4, &(0x7f000000a680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a6c0)=0x14, 0x800) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f000000aac0)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f000000abc0)=0xe8) clock_gettime(0x0, &(0x7f0000010a00)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000107c0)=[{{&(0x7f000000acc0)=@nfc_llcp, 0x80, &(0x7f000000d100)=[{&(0x7f000000ad40)=""/235, 0xeb}, {&(0x7f000000ae40)=""/4096, 0x1000}, {&(0x7f000000be40)=""/46, 0x2e}, {&(0x7f000000be80)=""/4096, 0x1000}, {&(0x7f000000ce80)=""/138, 0x8a}, {&(0x7f000000cf40)=""/28, 0x1c}, {&(0x7f000000cf80)=""/77, 0x4d}, {&(0x7f000000d000)=""/212, 0xd4}], 0x8, &(0x7f000000d180)=""/125, 0x7d}, 0x1000}, {{&(0x7f000000d200)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d3c0)=[{&(0x7f000000d280)=""/141, 0x8d}, {&(0x7f000000d340)=""/71, 0x47}], 0x2, &(0x7f000000d400)=""/36, 0x24}, 0x7ff}, {{&(0x7f000000d440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000d500)=[{&(0x7f000000d4c0)=""/34, 0x22}], 0x1}, 0x2}, {{&(0x7f000000d540)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f000000d880)=[{&(0x7f000000d5c0)=""/231, 0xe7}, {&(0x7f000000d6c0)=""/56, 0x38}, {&(0x7f000000d700)=""/200, 0xc8}, {&(0x7f000000d800)=""/97, 0x61}], 0x4, &(0x7f000000d8c0)=""/231, 0xe7}, 0x7ff}, {{0x0, 0x0, &(0x7f000000e9c0)=[{&(0x7f000000d9c0)=""/4096, 0x1000}], 0x1, &(0x7f000000ea00)=""/82, 0x52}, 0x40}, {{&(0x7f000000ea80)=@can, 0x80, 0xfffffffffffffffd}, 0x3}, {{&(0x7f000000eb00)=@rc, 0x80, &(0x7f000000fec0)=[{&(0x7f000000eb80)=""/179, 0xb3}, {&(0x7f000000ec40)=""/103, 0x67}, {&(0x7f000000ecc0)=""/4096, 0x1000}, {&(0x7f000000fcc0)=""/196, 0xc4}, {&(0x7f000000fdc0)=""/224, 0xe0}], 0x5, &(0x7f000000ff40)=""/37, 0x25}, 0x1}, {{&(0x7f000000ff80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f00000100c0)=[{&(0x7f0000010000)=""/132, 0x84}], 0x1, &(0x7f0000010100)=""/159, 0x9f}, 0x16}, {{&(0x7f00000101c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000010680)=[{&(0x7f0000010240)=""/56, 0x38}, {&(0x7f0000010280)=""/115, 0x73}, {&(0x7f0000010300)=""/254, 0xfe}, {&(0x7f0000010400)=""/80, 0x50}, {&(0x7f0000010480)=""/59, 0x3b}, {&(0x7f00000104c0)=""/207, 0xcf}, {&(0x7f00000105c0)=""/94, 0x5e}, {&(0x7f0000010640)=""/23, 0x17}], 0x8, &(0x7f0000010700)=""/160, 0xa0}}], 0x9, 0x100, &(0x7f0000010a40)={r33, r34+30000000}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000010b40)={'vcan0\x00', 0x0}) getsockopt$inet6_mreq(r4, 0x29, 0x1f, &(0x7f0000010b80)={@rand_addr, 0x0}, &(0x7f0000010bc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000010d40)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000010e40)=0xe8) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000010e80)={0x0, @dev, @remote}, &(0x7f0000010ec0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000010f00)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000011000)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000011c40)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000011c00)={&(0x7f0000011040)={0xbbc, r6, 0x801, 0x70bd25, 0x25dfdbfd, {}, [{{0x8, 0x1, r7}, {0x78, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r8}, {0x104, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0x19c, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x100, 0x5ce00404, 0x0, 0x20}, {0x3120, 0x6, 0xab45, 0x80000000}, {0x9, 0x4, 0x9, 0x3}, {0x2, 0x9, 0x7f, 0x4}, {0x7ff, 0x6, 0x9, 0x80000001}, {0x40, 0x0, 0x9, 0x80}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x278, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r18}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3000000000000}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r20}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x4, 0x13, 0x6b, 0x1}, {0x0, 0x1f, 0x5fd, 0xffffffff}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}]}}, {{0x8, 0x1, r21}, {0x230, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8, 0x7, 0xfffffffffffffff7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r23}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x84e}}, {0x8, 0x6, r24}}}]}}, {{0x8, 0x1, r25}, {0x174, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r27}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r28}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x5, 0x67, 0x4, 0x7}]}}}]}}, {{0x8, 0x1, r29}, {0x78, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3d}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}]}}, {{0x8, 0x1, r31}, {0x1bc, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r32}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r35}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r36}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r37}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r38}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r39}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r40}}}]}}]}, 0xbbc}}, 0x4000810) 06:38:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0xc200000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {0x0}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1516.576500] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1516.667664] FAULT_INJECTION: forcing a failure. [ 1516.667664] name failslab, interval 1, probability 0, space 0, times 0 [ 1516.698582] CPU: 0 PID: 7643 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1516.705428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1516.714771] Call Trace: [ 1516.717351] dump_stack+0x172/0x1f0 [ 1516.720993] should_fail.cold+0xa/0x15 [ 1516.724989] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1516.730088] ? ___might_sleep+0x163/0x280 [ 1516.734310] __should_failslab+0x121/0x190 [ 1516.738550] should_failslab+0x9/0x14 [ 1516.742609] kmem_cache_alloc_node_trace+0x270/0x720 [ 1516.747711] ? retint_kernel+0x2d/0x2d [ 1516.751596] bdi_alloc_node+0x8a/0x100 [ 1516.755478] blk_alloc_queue_node+0x15d/0x760 [ 1516.759984] blk_mq_init_queue+0x4a/0xb0 [ 1516.764044] loop_add+0x2dd/0x8d0 [ 1516.767487] ? idr_find+0x47/0x60 [ 1516.770953] loop_control_ioctl+0x165/0x360 [ 1516.775269] ? loop_add+0x8d0/0x8d0 [ 1516.778891] ? loop_add+0x8d0/0x8d0 [ 1516.782517] do_vfs_ioctl+0xd6e/0x1390 [ 1516.786399] ? ioctl_preallocate+0x210/0x210 [ 1516.790799] ? __fget+0x367/0x540 [ 1516.794248] ? ksys_dup3+0x3e0/0x3e0 [ 1516.797973] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1516.803509] ? tomoyo_file_ioctl+0x23/0x30 [ 1516.807777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1516.813509] ? security_file_ioctl+0x93/0xc0 [ 1516.817925] ksys_ioctl+0xab/0xd0 [ 1516.821470] __x64_sys_ioctl+0x73/0xb0 [ 1516.825429] do_syscall_64+0x103/0x610 [ 1516.829330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1516.834514] RIP: 0033:0x457f29 [ 1516.837699] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1516.856590] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1516.864289] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1516.871555] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1516.878824] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1516.886339] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1516.893718] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 [ 1516.902492] protocol 88fb is buggy, dev hsr_slave_0 [ 1516.908091] protocol 88fb is buggy, dev hsr_slave_0 06:38:41 executing program 0 (fault-call:18 fault-nth:18): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac01e001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) fcntl$lock(r0, 0x25, &(0x7f0000000080)={0x1, 0x3, 0x5, 0x9, r1}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = fcntl$dupfd(r0, 0x406, r2) ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000000c0)) ioprio_get$pid(0x0, 0x0) 06:38:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{0x0}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {0x0}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0xce00000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a001f001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{0x0}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x200, 0x40000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x120000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="98010000", @ANYRES16=r2, @ANYBLOB="100429bd7000ffdbdf250f0000001c000100180001006574683a76657468315f746f5f6272696467650020000600040002000400020004000200080001000100000008000100010000007c0004000c000700080001001b00000014000700080004000900000008000200ffffff7f4c000700080002000900000008000400080000000800030008000000080003000700000008000400090000000800040080000000080001000c000000080003000800000008000200743e00000c00010073797a310000000050000700080001000600000008000100000400000c0004004000000000000000080001000600000008000100010000000c00030001000000000000000c000300020000000000000008000200080000002c00090008000100070000000800020002000000080001000300000008000200dc000000080002000900000014000600080001000800000004000200040002003c000200080002000800000008000100db0000000800010001010000040004000400040004000400080001003f000000040004000800020006000000727e70e21e76d83c019d2fc2a471d21c5e547038ec1872b9e1c4b0050fb939e9463308dd003cbeca8ea23b9a4abd1857a71813fa135ca86cee4e1207bccddd8bbd27064ff4d9708c03b26daaff18c34c353385bac017eb6cdf2e1b94731802d5ac21d5b93f62ad6a4f0881359eecce7f7436f79fc471361ce6f2aa8b1ab35606277ebfc78284dca04280967b42a439c838d072f00da3dc379671a73c8f0421d3cea51cb30c333f94392bbcb01d9fc99e09d4a3d3cfc4267b8ee342bd03dc852d100edf059c4da1f76ae4592ae0c8ca4f1e94ce43dcd92abe667398a1edc7c307aaa74cb222fbb23c22210fb399c92bdf4d"], 0x198}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) ioprio_get$pid(0x0, 0x0) 06:38:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {0x0}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a401f001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0xd004000000000000, [0x4b564d03, 0x1, 0x17a]}) [ 1517.195527] FAULT_INJECTION: forcing a failure. [ 1517.195527] name failslab, interval 1, probability 0, space 0, times 0 [ 1517.211100] CPU: 0 PID: 7689 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1517.217976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1517.227335] Call Trace: [ 1517.229918] dump_stack+0x172/0x1f0 [ 1517.233562] should_fail.cold+0xa/0x15 [ 1517.237448] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1517.242546] ? ___might_sleep+0x163/0x280 [ 1517.246698] __should_failslab+0x121/0x190 [ 1517.250928] should_failslab+0x9/0x14 [ 1517.254900] kmem_cache_alloc_trace+0x2d1/0x760 [ 1517.259692] ? trace_hardirqs_on+0x67/0x230 [ 1517.264011] ? kasan_check_read+0x11/0x20 [ 1517.268165] wb_congested_get_create+0x18d/0x3a0 [ 1517.272920] wb_init+0x4b3/0x780 [ 1517.276387] bdi_init+0x2a1/0x420 [ 1517.279918] bdi_alloc_node+0x9f/0x100 [ 1517.283902] blk_alloc_queue_node+0x15d/0x760 [ 1517.288404] blk_mq_init_queue+0x4a/0xb0 [ 1517.292467] loop_add+0x2dd/0x8d0 [ 1517.295916] loop_control_ioctl+0x165/0x360 [ 1517.300260] ? loop_add+0x8d0/0x8d0 [ 1517.303884] ? loop_add+0x8d0/0x8d0 [ 1517.307507] do_vfs_ioctl+0xd6e/0x1390 [ 1517.311403] ? ioctl_preallocate+0x210/0x210 [ 1517.315811] ? __fget+0x367/0x540 [ 1517.319261] ? ksys_dup3+0x3e0/0x3e0 [ 1517.322998] ? tomoyo_file_ioctl+0x23/0x30 [ 1517.327233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1517.332764] ? security_file_ioctl+0x93/0xc0 [ 1517.337245] ksys_ioctl+0xab/0xd0 [ 1517.340708] __x64_sys_ioctl+0x73/0xb0 [ 1517.344593] ? do_syscall_64+0x5b/0x610 [ 1517.348563] do_syscall_64+0x103/0x610 [ 1517.352570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1517.357752] RIP: 0033:0x457f29 [ 1517.360956] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1517.379979] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1517.387680] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1517.394954] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1517.402217] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1517.409479] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1517.416817] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:42 executing program 0 (fault-call:18 fault-nth:19): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a801f001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000040)={0x1000, 0x2800000000}) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x611e062a, 0x80) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000040)) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioprio_get$pid(0x2, r3) 06:38:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{0x0}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0xd901000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac01f001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0020001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x5fec6099, 0x2000) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x200) ioctl$TIOCCBRK(r2, 0x5428) ioprio_get$pid(0x0, 0x0) 06:38:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4020001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1517.712893] FAULT_INJECTION: forcing a failure. [ 1517.712893] name failslab, interval 1, probability 0, space 0, times 0 [ 1517.731145] CPU: 1 PID: 7738 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1517.738134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1517.747501] Call Trace: [ 1517.750092] dump_stack+0x172/0x1f0 [ 1517.753724] should_fail.cold+0xa/0x15 [ 1517.757619] ? retint_kernel+0x2d/0x2d [ 1517.761535] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1517.766658] ? __should_failslab+0xe7/0x190 [ 1517.771110] __should_failslab+0x121/0x190 [ 1517.775528] should_failslab+0x9/0x14 [ 1517.779334] kmem_cache_alloc_trace+0x2d1/0x760 [ 1517.784015] blk_alloc_queue_stats+0x40/0x100 [ 1517.788513] blk_alloc_queue_node+0x195/0x760 [ 1517.793026] blk_mq_init_queue+0x4a/0xb0 [ 1517.797102] loop_add+0x2dd/0x8d0 [ 1517.800556] ? idr_find+0x47/0x60 [ 1517.804025] loop_control_ioctl+0x165/0x360 [ 1517.808371] ? loop_add+0x8d0/0x8d0 [ 1517.812018] ? do_vfs_ioctl+0xca/0x1390 [ 1517.816006] ? write_comp_data+0x1e/0x70 [ 1517.820068] ? loop_add+0x8d0/0x8d0 [ 1517.823802] do_vfs_ioctl+0xd6e/0x1390 [ 1517.827852] ? ioctl_preallocate+0x210/0x210 [ 1517.832284] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1517.837047] ? retint_kernel+0x2d/0x2d [ 1517.840961] ? tomoyo_file_ioctl+0x23/0x30 [ 1517.845201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1517.850866] ? security_file_ioctl+0x93/0xc0 [ 1517.855392] ksys_ioctl+0xab/0xd0 [ 1517.858855] __x64_sys_ioctl+0x73/0xb0 [ 1517.862749] do_syscall_64+0x103/0x610 [ 1517.866711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1517.872571] RIP: 0033:0x457f29 [ 1517.875768] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1517.894674] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1517.902377] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1517.909641] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1517.916904] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1517.924168] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1517.931435] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:42 executing program 0 (fault-call:18 fault-nth:20): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0xe006000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8020001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000040)={0x1c9, 0x7, 0x0, "d1a041e08d67e04099d8ac297a4494d29b17b42c7a6fbfe0b2ed5a50a2c8a18a", 0x39565559}) r2 = getpgrp(0xffffffffffffffff) mq_notify(r1, &(0x7f0000000080)={0x0, 0x41, 0x2, @tid=r2}) 06:38:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac020001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x200) 06:38:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{0x0}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1518.360381] FAULT_INJECTION: forcing a failure. [ 1518.360381] name failslab, interval 1, probability 0, space 0, times 0 [ 1518.379660] CPU: 1 PID: 7800 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1518.386523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1518.395893] Call Trace: [ 1518.398509] dump_stack+0x172/0x1f0 [ 1518.402170] should_fail.cold+0xa/0x15 [ 1518.406114] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1518.411261] ? ___might_sleep+0x163/0x280 [ 1518.415451] __should_failslab+0x121/0x190 [ 1518.419714] should_failslab+0x9/0x14 [ 1518.423537] kmem_cache_alloc_node_trace+0x270/0x720 [ 1518.428668] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 1518.433514] blkg_alloc+0x93/0x590 [ 1518.437094] blkcg_init_queue+0x27/0x3d0 [ 1518.441183] blk_alloc_queue_node+0x541/0x760 [ 1518.445706] blk_mq_init_queue+0x4a/0xb0 [ 1518.449794] loop_add+0x2dd/0x8d0 [ 1518.453272] ? idr_find+0x47/0x60 [ 1518.456753] loop_control_ioctl+0x165/0x360 06:38:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0xff02000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0021001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x30400, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xd, &(0x7f0000000040)="6299cc915c3453c95288de61698c547dd5", 0x11) [ 1518.461101] ? loop_add+0x8d0/0x8d0 [ 1518.464754] ? loop_add+0x8d0/0x8d0 [ 1518.468408] do_vfs_ioctl+0xd6e/0x1390 [ 1518.472328] ? ioctl_preallocate+0x210/0x210 [ 1518.476761] ? __fget+0x367/0x540 [ 1518.480254] ? ksys_dup3+0x3e0/0x3e0 [ 1518.484016] ? rcu_read_lock_sched_held+0x110/0x130 [ 1518.489053] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1518.494618] ? tomoyo_file_ioctl+0x23/0x30 [ 1518.498878] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1518.504481] ? security_file_ioctl+0x93/0xc0 [ 1518.508915] ksys_ioctl+0xab/0xd0 [ 1518.512422] __x64_sys_ioctl+0x73/0xb0 [ 1518.516334] do_syscall_64+0x103/0x610 [ 1518.520246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.525446] RIP: 0033:0x457f29 [ 1518.528649] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1518.547561] RSP: 002b:00007f83f2436c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1518.555282] RAX: ffffffffffffffda RBX: 00007f83f2436c90 RCX: 0000000000457f29 [ 1518.562563] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1518.569839] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1518.577118] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24376d4 [ 1518.584393] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:43 executing program 0 (fault-call:18 fault-nth:21): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4021001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{0x0}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8021001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0xff0b000000000000, [0x4b564d03, 0x1, 0x17a]}) 06:38:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) getpid() ioprio_get$pid(0x0, r1) 06:38:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac021001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{0x0}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1518.919510] FAULT_INJECTION: forcing a failure. [ 1518.919510] name failslab, interval 1, probability 0, space 0, times 0 [ 1518.958864] CPU: 1 PID: 7824 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1518.965740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1518.975109] Call Trace: [ 1518.977724] dump_stack+0x172/0x1f0 [ 1518.981394] should_fail.cold+0xa/0x15 [ 1518.985315] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1518.990472] ? ___might_sleep+0x163/0x280 [ 1518.994645] __should_failslab+0x121/0x190 [ 1518.998905] should_failslab+0x9/0x14 [ 1519.002747] kmem_cache_alloc_node_trace+0x270/0x720 [ 1519.007872] ? kmem_cache_alloc_node_trace+0xf/0x720 [ 1519.013013] blkg_alloc+0x93/0x590 [ 1519.016622] blkcg_init_queue+0x27/0x3d0 [ 1519.020702] blk_alloc_queue_node+0x541/0x760 [ 1519.025215] blk_mq_init_queue+0x4a/0xb0 [ 1519.029296] loop_add+0x2dd/0x8d0 [ 1519.032767] ? idr_find+0x47/0x60 [ 1519.036237] loop_control_ioctl+0x165/0x360 [ 1519.040577] ? loop_add+0x8d0/0x8d0 [ 1519.044221] ? loop_add+0x8d0/0x8d0 [ 1519.047862] do_vfs_ioctl+0xd6e/0x1390 [ 1519.051770] ? ioctl_preallocate+0x210/0x210 [ 1519.056192] ? __fget+0x367/0x540 [ 1519.059662] ? ksys_dup3+0x3e0/0x3e0 [ 1519.063395] ? tomoyo_file_ioctl+0x23/0x30 [ 1519.067641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1519.073191] ? security_file_ioctl+0x93/0xc0 [ 1519.077617] ksys_ioctl+0xab/0xd0 [ 1519.081085] __x64_sys_ioctl+0x73/0xb0 [ 1519.084991] do_syscall_64+0x103/0x610 [ 1519.088912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1519.094132] RIP: 0033:0x457f29 [ 1519.097334] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1519.116246] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1519.123981] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1519.131263] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1519.138541] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1519.145816] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1519.153091] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0022001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:44 executing program 0 (fault-call:18 fault-nth:22): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:44 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x9000000, 0x404003) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x100, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000040)=0x9, 0x4) 06:38:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4022001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x10, 0x1, 0x17a]}) 06:38:44 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x20201) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8022001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4400, 0x0) mq_notify(r1, &(0x7f0000000200)={0x0, 0x3e, 0x0, @thr={&(0x7f0000000100)="e4ab03847c5d73cde53476aff5bbc3ac5a2783715d21cbbb3b934abbf06e73664613996ecb019be62db09d0cb7caddef9e7cdbf89ce798d0897b58", &(0x7f00000001c0)="11efc2edeca1979115d2c00bf8eb753746ff7394d127c0eaea11d57c1d7362473b98d5b4a0bd4e214503bccbf916"}}) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x73) ioprio_get$pid(0x0, 0x0) [ 1519.747880] __nla_parse: 17 callbacks suppressed [ 1519.747889] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x11, 0x1, 0x17a]}) 06:38:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) [ 1519.888904] FAULT_INJECTION: forcing a failure. [ 1519.888904] name failslab, interval 1, probability 0, space 0, times 0 [ 1519.949201] CPU: 0 PID: 7891 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1519.956073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1519.965438] Call Trace: [ 1519.968053] dump_stack+0x172/0x1f0 [ 1519.971714] should_fail.cold+0xa/0x15 [ 1519.972040] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1519.975640] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1519.975670] ? ___might_sleep+0x163/0x280 [ 1519.975698] __should_failslab+0x121/0x190 [ 1519.997678] should_failslab+0x9/0x14 [ 1520.001502] kmem_cache_alloc_node_trace+0x270/0x720 [ 1520.006628] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 1520.011429] blkg_alloc+0x93/0x590 [ 1520.015011] blkcg_init_queue+0x27/0x3d0 [ 1520.019102] blk_alloc_queue_node+0x541/0x760 [ 1520.019703] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1520.023624] blk_mq_init_queue+0x4a/0xb0 [ 1520.023644] loop_add+0x2dd/0x8d0 [ 1520.023660] ? idr_find+0x47/0x60 [ 1520.023679] loop_control_ioctl+0x165/0x360 06:38:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac022001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0023001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1520.047463] ? loop_add+0x8d0/0x8d0 [ 1520.051118] ? loop_add+0x8d0/0x8d0 [ 1520.054777] do_vfs_ioctl+0xd6e/0x1390 [ 1520.058696] ? ioctl_preallocate+0x210/0x210 [ 1520.063129] ? __fget+0x367/0x540 [ 1520.066605] ? ksys_dup3+0x3e0/0x3e0 [ 1520.070339] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1520.075908] ? tomoyo_file_ioctl+0x23/0x30 [ 1520.080195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1520.085755] ? security_file_ioctl+0x93/0xc0 [ 1520.090189] ksys_ioctl+0xab/0xd0 [ 1520.093718] __x64_sys_ioctl+0x73/0xb0 [ 1520.097629] do_syscall_64+0x103/0x610 [ 1520.101534] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1520.106745] RIP: 0033:0x457f29 [ 1520.109968] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1520.128884] RSP: 002b:00007f83f2415c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1520.136606] RAX: ffffffffffffffda RBX: 00007f83f2415c90 RCX: 0000000000457f29 [ 1520.143888] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1520.151164] RBP: 000000000073c0e0 R08: 0000000000000000 R09: 0000000000000000 [ 1520.158446] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24166d4 [ 1520.165721] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000004 06:38:45 executing program 0 (fault-call:18 fault-nth:23): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4023001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:45 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x3) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1f, 0x5}, &(0x7f0000000100)=0x8) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x36) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000200)=0x8001) 06:38:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) [ 1520.335006] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:45 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5b2, 0x200080) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="06000200ff03df2a4709b68876eb28024601dabc3113a7c59602e67f9438c0eac32fea3e673638c5355b690fc829a852051c5b8441c9a2549d2afaf345dbc68b2a99d854"], &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0)={r1, @in6={{0xa, 0x4e21, 0xc9, @ipv4={[], [], @local}, 0x1}}}, 0x84) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x12, 0x1, 0x17a]}) 06:38:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8023001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:45 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x501000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x42008200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, r1, 0x20, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x4008001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioprio_get$pid(0x0, 0x0) [ 1520.613051] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1520.625807] FAULT_INJECTION: forcing a failure. [ 1520.625807] name failslab, interval 1, probability 0, space 0, times 0 [ 1520.704285] CPU: 1 PID: 7928 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1520.711163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1520.720531] Call Trace: [ 1520.723137] dump_stack+0x172/0x1f0 [ 1520.726873] should_fail.cold+0xa/0x15 [ 1520.730857] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1520.736002] ? ___might_sleep+0x163/0x280 [ 1520.740170] __should_failslab+0x121/0x190 [ 1520.744422] should_failslab+0x9/0x14 [ 1520.748242] kmem_cache_alloc_trace+0x2d1/0x760 [ 1520.753123] ? lock_downgrade+0x880/0x880 [ 1520.757303] blk_iolatency_init+0x4e/0x2f0 [ 1520.761564] blkcg_init_queue+0x163/0x3d0 [ 1520.765733] blk_alloc_queue_node+0x541/0x760 [ 1520.770284] blk_mq_init_queue+0x4a/0xb0 [ 1520.774973] loop_add+0x2dd/0x8d0 [ 1520.778425] ? idr_find+0x47/0x60 [ 1520.781877] loop_control_ioctl+0x165/0x360 [ 1520.786196] ? loop_add+0x8d0/0x8d0 [ 1520.789819] ? loop_add+0x8d0/0x8d0 [ 1520.793731] do_vfs_ioctl+0xd6e/0x1390 [ 1520.797748] ? ioctl_preallocate+0x210/0x210 [ 1520.802171] ? __fget+0x367/0x540 [ 1520.805639] ? ksys_dup3+0x3e0/0x3e0 [ 1520.809368] ? rcu_read_lock_sched_held+0x110/0x130 [ 1520.814395] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1520.819974] ? tomoyo_file_ioctl+0x23/0x30 [ 1520.824223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1520.829770] ? security_file_ioctl+0x93/0xc0 [ 1520.834193] ksys_ioctl+0xab/0xd0 [ 1520.837663] __x64_sys_ioctl+0x73/0xb0 [ 1520.841567] do_syscall_64+0x103/0x610 [ 1520.845472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1520.850670] RIP: 0033:0x457f29 [ 1520.853875] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1520.872784] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1520.880889] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1520.888357] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1520.895645] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 06:38:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac023001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1520.902926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1520.910230] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x1b, 0x1, 0x17a]}) [ 1520.983223] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1521.037439] net_ratelimit: 22 callbacks suppressed [ 1521.037448] protocol 88fb is buggy, dev hsr_slave_0 [ 1521.047446] protocol 88fb is buggy, dev hsr_slave_0 [ 1521.047678] protocol 88fb is buggy, dev hsr_slave_1 [ 1521.052650] protocol 88fb is buggy, dev hsr_slave_1 06:38:46 executing program 0 (fault-call:18 fault-nth:24): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) connect(r0, &(0x7f0000000080)=@hci={0x1f, r1, 0x1}, 0x80) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x882, 0x4) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) ioprio_get$pid(0x0, 0x0) 06:38:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0024001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) [ 1521.229373] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x34, 0x1, 0x17a]}) 06:38:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4024001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x9, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x8) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7f, 0x60400) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x8) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x7de9, 0x100, 0xfff}) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1521.449719] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1521.473897] FAULT_INJECTION: forcing a failure. [ 1521.473897] name failslab, interval 1, probability 0, space 0, times 0 06:38:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) [ 1521.596004] CPU: 0 PID: 7979 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1521.602900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1521.612303] Call Trace: [ 1521.614931] dump_stack+0x172/0x1f0 [ 1521.618624] should_fail.cold+0xa/0x15 [ 1521.622549] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1521.627772] ? ___might_sleep+0x163/0x280 [ 1521.631977] __should_failslab+0x121/0x190 [ 1521.636251] should_failslab+0x9/0x14 [ 1521.640076] kmem_cache_alloc_trace+0x2d1/0x760 [ 1521.644766] ? lock_downgrade+0x880/0x880 [ 1521.644788] blk_iolatency_init+0x4e/0x2f0 [ 1521.644809] blkcg_init_queue+0x163/0x3d0 [ 1521.657377] blk_alloc_queue_node+0x541/0x760 [ 1521.661898] blk_mq_init_queue+0x4a/0xb0 [ 1521.666016] loop_add+0x2dd/0x8d0 [ 1521.669489] ? idr_find+0x47/0x60 [ 1521.672991] loop_control_ioctl+0x165/0x360 [ 1521.677337] ? loop_add+0x8d0/0x8d0 [ 1521.681245] ? loop_add+0x8d0/0x8d0 [ 1521.684895] do_vfs_ioctl+0xd6e/0x1390 [ 1521.688838] ? ioctl_preallocate+0x210/0x210 [ 1521.693378] ? __fget+0x367/0x540 [ 1521.696854] ? ksys_dup3+0x3e0/0x3e0 [ 1521.700587] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1521.700611] ? tomoyo_file_ioctl+0x23/0x30 [ 1521.700627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1521.700643] ? security_file_ioctl+0x93/0xc0 [ 1521.700662] ksys_ioctl+0xab/0xd0 [ 1521.700681] __x64_sys_ioctl+0x73/0xb0 [ 1521.727876] do_syscall_64+0x103/0x610 [ 1521.731805] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1521.737012] RIP: 0033:0x457f29 [ 1521.740224] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1521.759364] RSP: 002b:00007f83f2436c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1521.767085] RAX: ffffffffffffffda RBX: 00007f83f2436c90 RCX: 0000000000457f29 [ 1521.774366] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1521.781642] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1521.788921] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24376d4 06:38:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8024001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) [ 1521.796221] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 [ 1521.830193] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:46 executing program 0 (fault-call:18 fault-nth:25): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac024001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x3a, 0x1, 0x17a]}) 06:38:46 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x101, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x100, 0x0) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfff) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1521.918474] protocol 88fb is buggy, dev hsr_slave_0 [ 1521.924522] protocol 88fb is buggy, dev hsr_slave_1 [ 1521.929840] protocol 88fb is buggy, dev hsr_slave_0 [ 1521.935490] protocol 88fb is buggy, dev hsr_slave_1 06:38:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) [ 1521.962895] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0025001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x3b, 0x1, 0x17a]}) 06:38:47 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000200)={0x3, "7aa83f4e05f5e4816e1c1e08f69353deb9ffb9d0d3b914005c8055bfd5d2e811", 0x3, 0x10, 0x7fff, 0xffff, 0x4, 0x0, 0x9, 0x7}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x1, 0x0) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x80000, 0x0) r3 = dup3(r1, r1, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="2200000005000000406afbc6f6dc6e4994c5f12d97efa164a6a4ef0602000000f8ea"], 0x4400) ioprio_get$pid(0x0, 0x0) 06:38:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, 0x0) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4025001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1522.235115] FAULT_INJECTION: forcing a failure. [ 1522.235115] name failslab, interval 1, probability 0, space 0, times 0 [ 1522.237496] protocol 88fb is buggy, dev hsr_slave_0 [ 1522.251529] protocol 88fb is buggy, dev hsr_slave_1 [ 1522.257234] CPU: 1 PID: 8020 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1522.264101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1522.273467] Call Trace: [ 1522.276080] dump_stack+0x172/0x1f0 [ 1522.279745] should_fail.cold+0xa/0x15 [ 1522.283692] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1522.288867] ? ___might_sleep+0x163/0x280 [ 1522.293065] __should_failslab+0x121/0x190 [ 1522.297332] should_failslab+0x9/0x14 [ 1522.301148] kmem_cache_alloc_node_trace+0x270/0x720 [ 1522.306254] ? retint_kernel+0x2d/0x2d [ 1522.310145] iolatency_pd_alloc+0x8d/0x140 [ 1522.314382] ? iolatency_clear_scaling.isra.0+0x180/0x180 [ 1522.319959] blkcg_activate_policy+0x128/0x560 [ 1522.324549] blk_iolatency_init+0x151/0x2f0 [ 1522.328965] blkcg_init_queue+0x163/0x3d0 [ 1522.333123] blk_alloc_queue_node+0x541/0x760 [ 1522.337622] blk_mq_init_queue+0x4a/0xb0 [ 1522.341793] loop_add+0x2dd/0x8d0 [ 1522.345248] ? idr_find+0x47/0x60 [ 1522.348707] loop_control_ioctl+0x165/0x360 [ 1522.353031] ? loop_add+0x8d0/0x8d0 [ 1522.356661] ? loop_add+0x8d0/0x8d0 [ 1522.360291] do_vfs_ioctl+0xd6e/0x1390 [ 1522.364184] ? ioctl_preallocate+0x210/0x210 [ 1522.368603] ? __fget+0x367/0x540 [ 1522.372086] ? ksys_dup3+0x3e0/0x3e0 [ 1522.375819] ? tomoyo_file_ioctl+0x23/0x30 [ 1522.380069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1522.385615] ? security_file_ioctl+0x93/0xc0 [ 1522.390024] ksys_ioctl+0xab/0xd0 [ 1522.393477] __x64_sys_ioctl+0x73/0xb0 [ 1522.397377] do_syscall_64+0x103/0x610 [ 1522.401280] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1522.406463] RIP: 0033:0x457f29 [ 1522.409649] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1522.428662] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1522.436371] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1522.443636] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1522.450897] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1522.458156] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1522.465415] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:47 executing program 0 (fault-call:18 fault-nth:26): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8025001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f0000000240)) ioprio_get$pid(0x0, r1) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000280)=0x6, &(0x7f00000002c0)=0x2) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x5, 0x400003) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200026bd7000fedbdf250c0000000c00020008000100010000000c0009000800020001000000"], 0x2c}, 0x1, 0x0, 0x0, 0xc000}, 0x1) 06:38:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, 0x0) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac025001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, 0x0) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x48, 0x1, 0x17a]}) 06:38:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0026001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:47 executing program 4: ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000000)={0x1, 0xffffffffffffff9c, 0x1}) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000040)={0x0, 0x35, "4c94a4e1ee7656b8ed4690d3ba0f23d5a5af8d9a83489342667084c73e2234b2090eb72dadb205eb1d8ae94de3d3d96924f0bc987d"}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_config_ext, 0x100000000000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1522.863805] FAULT_INJECTION: forcing a failure. [ 1522.863805] name failslab, interval 1, probability 0, space 0, times 0 [ 1522.888141] CPU: 1 PID: 8067 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1522.895005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1522.904375] Call Trace: [ 1522.906977] dump_stack+0x172/0x1f0 06:38:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4026001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1522.910600] should_fail.cold+0xa/0x15 [ 1522.914476] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1522.919634] ? ___might_sleep+0x163/0x280 [ 1522.923802] __should_failslab+0x121/0x190 [ 1522.928061] should_failslab+0x9/0x14 [ 1522.931900] kmem_cache_alloc_node_trace+0x270/0x720 [ 1522.937069] ? init_timer_key+0x122/0x370 [ 1522.941230] blk_throtl_init+0x7d/0x680 [ 1522.945265] blkcg_init_queue+0x277/0x3d0 [ 1522.949427] blk_alloc_queue_node+0x541/0x760 [ 1522.953928] blk_mq_init_queue+0x4a/0xb0 [ 1522.958006] loop_add+0x2dd/0x8d0 [ 1522.961456] ? idr_find+0x47/0x60 [ 1522.964951] loop_control_ioctl+0x165/0x360 [ 1522.969275] ? loop_add+0x8d0/0x8d0 [ 1522.972927] ? loop_add+0x8d0/0x8d0 [ 1522.976564] do_vfs_ioctl+0xd6e/0x1390 [ 1522.980456] ? ioctl_preallocate+0x210/0x210 [ 1522.984867] ? __fget+0x367/0x540 [ 1522.988328] ? ksys_dup3+0x3e0/0x3e0 [ 1522.992047] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1522.997589] ? tomoyo_file_ioctl+0x23/0x30 [ 1523.001821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1523.007359] ? security_file_ioctl+0x93/0xc0 [ 1523.011781] ksys_ioctl+0xab/0xd0 [ 1523.015245] __x64_sys_ioctl+0x73/0xb0 [ 1523.019150] do_syscall_64+0x103/0x610 [ 1523.023045] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1523.028245] RIP: 0033:0x457f29 [ 1523.031463] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1523.050363] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1523.058070] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1523.065339] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1523.072604] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1523.079869] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1523.087134] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:48 executing program 0 (fault-call:18 fault-nth:27): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x8) 06:38:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8026001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x49, 0x1, 0x17a]}) 06:38:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, 0x0) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac026001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:48 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000000)={0xf20, {{0xa, 0x4e23, 0x81, @remote, 0x8}}}, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, r2, 0x0) ioprio_get$pid(0x1, r3) 06:38:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0027001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1523.468222] unchecked MSR access error: WRMSR to 0x49 (tried to write 0x0000000000000001) at rIP: 0xffffffff81305094 (native_write_msr+0x4/0x30) [ 1523.507720] FAULT_INJECTION: forcing a failure. [ 1523.507720] name failslab, interval 1, probability 0, space 0, times 0 [ 1523.534486] CPU: 1 PID: 8115 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1523.539025] Call Trace: [ 1523.541344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1523.541353] Call Trace: [ 1523.541379] dump_stack+0x172/0x1f0 [ 1523.541409] should_fail.cold+0xa/0x15 [ 1523.541439] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1523.544232] ? vmx_set_msr+0x130c/0x2230 [ 1523.553370] ? ___might_sleep+0x163/0x280 [ 1523.553394] __should_failslab+0x121/0x190 [ 1523.553416] should_failslab+0x9/0x14 [ 1523.553434] kmem_cache_alloc_trace+0x2d1/0x760 [ 1523.553454] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1523.553475] ? blk_mq_queue_stopped+0x130/0x130 [ 1523.553493] blk_stat_alloc_callback+0x58/0x270 [ 1523.553510] ? blk_mq_hctx_mark_pending+0x180/0x180 [ 1523.567052] ? pt_update_intercept_for_msr+0x690/0x690 06:38:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4027001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1523.568669] blk_mq_init_allocated_queue+0x85/0x1570 [ 1523.568689] ? blkcg_init_queue+0x18a/0x3d0 [ 1523.568707] ? blkcg_init_queue+0x198/0x3d0 [ 1523.568727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1523.568743] ? blk_alloc_queue_node+0x559/0x760 [ 1523.568763] blk_mq_init_queue+0x62/0xb0 [ 1523.568782] loop_add+0x2dd/0x8d0 [ 1523.568796] ? idr_find+0x47/0x60 [ 1523.568814] loop_control_ioctl+0x165/0x360 [ 1523.575857] kvm_set_msr+0x190/0x380 [ 1523.577007] ? loop_add+0x8d0/0x8d0 [ 1523.577044] ? loop_add+0x8d0/0x8d0 [ 1523.577064] do_vfs_ioctl+0xd6e/0x1390 [ 1523.577084] ? ioctl_preallocate+0x210/0x210 [ 1523.577101] ? __fget+0x367/0x540 [ 1523.582233] do_set_msr+0xa6/0xf0 [ 1523.585123] ? ksys_dup3+0x3e0/0x3e0 [ 1523.585141] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1523.585165] ? tomoyo_file_ioctl+0x23/0x30 [ 1523.585180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1523.585199] ? security_file_ioctl+0x93/0xc0 [ 1523.590491] ? do_get_msr+0x150/0x150 [ 1523.594608] ksys_ioctl+0xab/0xd0 [ 1523.594630] __x64_sys_ioctl+0x73/0xb0 [ 1523.594650] do_syscall_64+0x103/0x610 [ 1523.594674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1523.594689] RIP: 0033:0x457f29 [ 1523.599886] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1523.604022] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1523.604031] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1523.604047] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1523.604057] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1523.604067] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1523.604077] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1523.604086] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 [ 1523.674192] msr_io+0x1b0/0x2e0 [ 1523.715442] ? kasan_check_read+0x11/0x20 [ 1523.729137] ? do_get_msr+0x150/0x150 [ 1523.736691] ? emulator_set_hflags+0xa0/0xa0 [ 1523.816015] ? lock_acquire+0x16f/0x3f0 06:38:48 executing program 0 (fault-call:18 fault-nth:28): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001280)='/dev/qat_adf_ctl\x00', 0x802, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001300)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000001640)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001600)={&(0x7f0000001340)={0x2b8, r2, 0x721, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x60, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe620}]}]}, @TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}]}, @TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5bd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x53}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4e552247}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x77}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6fe}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x24008000}, 0x2404c000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8027001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, 0x0) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1523.825471] ? kvm_arch_vcpu_ioctl+0x578/0x2fc0 [ 1523.830567] kvm_arch_vcpu_ioctl+0x5c7/0x2fc0 [ 1523.838736] ? kvm_arch_vcpu_ioctl+0x578/0x2fc0 [ 1523.851607] ? kvm_arch_vcpu_put+0x460/0x460 [ 1523.856880] ? mark_held_locks+0xf0/0xf0 [ 1523.861187] ? preempt_schedule+0x4b/0x60 [ 1523.865416] ? preempt_schedule_common+0x4f/0xe0 [ 1523.892558] ? lock_acquire+0x16f/0x3f0 [ 1523.923506] ? kvm_vcpu_ioctl+0x181/0xfa0 [ 1523.947956] ? __mutex_lock+0x3cd/0x1310 [ 1523.952377] ? refcount_sub_and_test_checked+0x154/0x200 [ 1523.958422] ? kvm_vcpu_ioctl+0x181/0xfa0 [ 1523.968588] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1523.986142] ? migrate_swap_stop+0x920/0x920 [ 1524.007685] ? mutex_trylock+0x1e0/0x1e0 [ 1524.018611] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1524.028974] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1524.044363] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 1524.051022] ? futex_wake+0x179/0x4d0 [ 1524.058644] kvm_vcpu_ioctl+0x8f6/0xfa0 [ 1524.063054] ? kvm_vcpu_block+0xcd0/0xcd0 [ 1524.067866] ? tomoyo_path_number_perm+0x263/0x520 [ 1524.073026] ? perf_trace_lock+0xeb/0x510 [ 1524.077214] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1524.083612] ? __lockdep_free_key_range+0x120/0x120 [ 1524.089108] ? find_held_lock+0x35/0x130 [ 1524.093185] ? kvm_vcpu_block+0xcd0/0xcd0 [ 1524.097336] do_vfs_ioctl+0xd6e/0x1390 [ 1524.101348] ? ioctl_preallocate+0x210/0x210 [ 1524.105755] ? __fget+0x367/0x540 [ 1524.109294] ? ksys_dup3+0x3e0/0x3e0 [ 1524.113028] ? nsecs_to_jiffies+0x30/0x30 [ 1524.117169] ? tomoyo_file_ioctl+0x23/0x30 [ 1524.121494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1524.127040] ? security_file_ioctl+0x93/0xc0 [ 1524.131681] ksys_ioctl+0xab/0xd0 [ 1524.135156] __x64_sys_ioctl+0x73/0xb0 [ 1524.139143] do_syscall_64+0x103/0x610 [ 1524.143077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1524.150478] RIP: 0033:0x457f29 [ 1524.157436] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1524.165255] FAULT_INJECTION: forcing a failure. [ 1524.165255] name failslab, interval 1, probability 0, space 0, times 0 [ 1524.177758] RSP: 002b:00007f7a944b5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1524.195942] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 [ 1524.210322] CPU: 1 PID: 8162 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1524.217175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1524.226533] Call Trace: [ 1524.229155] dump_stack+0x172/0x1f0 [ 1524.232804] should_fail.cold+0xa/0x15 [ 1524.236709] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1524.241820] ? ___might_sleep+0x163/0x280 [ 1524.245973] ? blk_mq_queue_stopped+0x130/0x130 [ 1524.250642] __should_failslab+0x121/0x190 [ 1524.254885] should_failslab+0x9/0x14 [ 1524.258694] __kmalloc+0x2dc/0x740 [ 1524.262234] ? kmem_cache_alloc_trace+0x354/0x760 [ 1524.267086] ? throtl_pd_free+0x23/0x30 [ 1524.271071] ? blk_stat_alloc_callback+0x84/0x270 [ 1524.275920] ? blk_mq_queue_stopped+0x130/0x130 [ 1524.280595] blk_stat_alloc_callback+0x84/0x270 [ 1524.285265] ? blk_mq_hctx_mark_pending+0x180/0x180 [ 1524.290292] blk_mq_init_allocated_queue+0x85/0x1570 [ 1524.295405] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1524.300958] ? blkcg_init_queue+0x18a/0x3d0 [ 1524.305297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1524.310833] ? blk_alloc_queue_node+0x559/0x760 [ 1524.315512] blk_mq_init_queue+0x62/0xb0 [ 1524.319578] loop_add+0x2dd/0x8d0 [ 1524.323034] ? idr_find+0x47/0x60 [ 1524.326492] loop_control_ioctl+0x165/0x360 [ 1524.330826] ? loop_add+0x8d0/0x8d0 [ 1524.334461] ? loop_add+0x8d0/0x8d0 [ 1524.338095] do_vfs_ioctl+0xd6e/0x1390 [ 1524.342001] ? ioctl_preallocate+0x210/0x210 [ 1524.346411] ? __fget+0x367/0x540 [ 1524.349872] ? ksys_dup3+0x3e0/0x3e0 [ 1524.353597] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1524.359139] ? tomoyo_file_ioctl+0x23/0x30 [ 1524.363372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1524.368916] ? security_file_ioctl+0x93/0xc0 [ 1524.373333] ksys_ioctl+0xab/0xd0 [ 1524.376789] __x64_sys_ioctl+0x73/0xb0 [ 1524.380683] do_syscall_64+0x103/0x610 [ 1524.384579] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1524.389767] RIP: 0033:0x457f29 [ 1524.392959] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1524.411856] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1524.419562] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1524.426829] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1524.434119] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1524.441392] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1524.448663] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 [ 1524.466310] RDX: 0000000020000280 RSI: 000000004008ae89 RDI: 0000000000000007 [ 1524.474139] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1524.489416] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7a944b66d4 [ 1524.496805] R13: 00000000004c0ab0 R14: 00000000004d28c8 R15: 00000000ffffffff 06:38:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x79, 0x1, 0x17a]}) 06:38:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac027001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, 0x0) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, 0x0, &(0x7f0000000340)) 06:38:49 executing program 0 (fault-call:18 fault-nth:29): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0028001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, 0x0, &(0x7f0000000340)) 06:38:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x202040, 0x0) ioctl$KVM_NMI(r1, 0xae9a) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x6, 0x5, 0x50, 0xfffffffffffffffb}, {0x1, 0x400, 0x386693b5}, {0x8000, 0x0, 0xffffffffffffffe6, 0x8}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) [ 1524.739612] FAULT_INJECTION: forcing a failure. [ 1524.739612] name failslab, interval 1, probability 0, space 0, times 0 [ 1524.767601] CPU: 1 PID: 8185 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1524.774443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1524.783780] Call Trace: [ 1524.786352] dump_stack+0x172/0x1f0 [ 1524.789989] should_fail.cold+0xa/0x15 [ 1524.793888] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1524.800303] ? ___might_sleep+0x163/0x280 [ 1524.804455] ? blk_mq_queue_stopped+0x130/0x130 [ 1524.809127] __should_failslab+0x121/0x190 [ 1524.813366] should_failslab+0x9/0x14 [ 1524.817167] __kmalloc+0x2dc/0x740 [ 1524.820725] ? kmem_cache_alloc_trace+0x354/0x760 [ 1524.825573] ? retint_kernel+0x2d/0x2d [ 1524.829466] ? blk_stat_alloc_callback+0x84/0x270 [ 1524.834310] ? blk_mq_queue_stopped+0x130/0x130 [ 1524.838979] blk_stat_alloc_callback+0x84/0x270 [ 1524.843676] ? blk_mq_hctx_mark_pending+0x180/0x180 [ 1524.848720] blk_mq_init_allocated_queue+0x85/0x1570 [ 1524.853858] ? blkcg_init_queue+0x18a/0x3d0 [ 1524.858198] ? blk_alloc_queue_node+0x543/0x760 [ 1524.862875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1524.868415] ? blk_alloc_queue_node+0x559/0x760 [ 1524.873093] blk_mq_init_queue+0x62/0xb0 [ 1524.877165] loop_add+0x2dd/0x8d0 [ 1524.880639] ? idr_find+0x47/0x60 [ 1524.884102] loop_control_ioctl+0x165/0x360 [ 1524.888425] ? loop_add+0x8d0/0x8d0 [ 1524.892056] ? do_vfs_ioctl+0xca/0x1390 [ 1524.896029] ? loop_add+0x8d0/0x8d0 [ 1524.899660] do_vfs_ioctl+0xd6e/0x1390 [ 1524.903558] ? ioctl_preallocate+0x210/0x210 [ 1524.907983] ? __fget+0x367/0x540 [ 1524.911441] ? ksys_dup3+0x3e0/0x3e0 [ 1524.915183] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1524.920736] ? tomoyo_file_ioctl+0x23/0x30 [ 1524.924973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1524.930508] ? security_file_ioctl+0x93/0xc0 [ 1524.934970] ksys_ioctl+0xab/0xd0 [ 1524.938434] __x64_sys_ioctl+0x73/0xb0 [ 1524.942326] do_syscall_64+0x103/0x610 [ 1524.946221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1524.951410] RIP: 0033:0x457f29 [ 1524.954603] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1524.973504] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1524.981214] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1524.988480] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1524.995746] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1525.003021] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1525.010303] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 [ 1525.032598] __nla_parse: 15 callbacks suppressed [ 1525.032607] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x8b, 0x1, 0x17a]}) 06:38:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4028001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x2) msgsnd(r1, &(0x7f00000001c0)={0x3, "3de7b8bc5f1ebac9d3fb94a00f845a99083f7f1440e5a9f60b61480184f2d70b3e2008590d11b463b39f70fb28e34b74d3e3ad548881ec656117d3dd867c34ed2abb7e522ce67dab098b00d93cef9074e42289e61b43b979d07feabbd30a64a08773a1f56fb1af507eb5f91794c7584638f2b0f97b39ec197b94731da427707c753a15b5857d2db28202c7e818fd570aecc38d9fce4520e179f39b2bcc996e6fff8bf2855328825402119dd112349deda1f2039b9a4f7d45611612e338342223b058db7075e6e5ba39471676810756fdd0b71bba795cf275aba7c647e7c8a6303e877759deb494e6530e0aeb725343f3410c"}, 0xfa, 0x800) ioprio_get$pid(0x0, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x10101, 0x0) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000040)=0x2) 06:38:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, 0x0, &(0x7f0000000340)) 06:38:50 executing program 0 (fault-call:18 fault-nth:30): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) [ 1525.223900] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000040)=[0x8, 0x2]) [ 1525.291412] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, 0x0) 06:38:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8028001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x9e, 0x1, 0x17a]}) 06:38:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, 0x0) [ 1525.483694] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1525.594300] FAULT_INJECTION: forcing a failure. [ 1525.594300] name failslab, interval 1, probability 0, space 0, times 0 [ 1525.617689] CPU: 1 PID: 8254 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1525.624554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1525.633942] Call Trace: [ 1525.636544] dump_stack+0x172/0x1f0 [ 1525.640202] should_fail.cold+0xa/0x15 [ 1525.644106] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1525.649225] ? ___might_sleep+0x163/0x280 [ 1525.653383] __should_failslab+0x121/0x190 [ 1525.657634] should_failslab+0x9/0x14 [ 1525.661443] kmem_cache_alloc_trace+0x2d1/0x760 [ 1525.666115] ? blk_mq_queue_stopped+0x130/0x130 [ 1525.670785] ? blk_stat_alloc_callback+0x1b0/0x270 [ 1525.675722] blk_mq_init_allocated_queue+0xf1/0x1570 [ 1525.680835] blk_mq_init_queue+0x62/0xb0 [ 1525.684917] loop_add+0x2dd/0x8d0 [ 1525.688380] ? idr_find+0x47/0x60 [ 1525.691841] loop_control_ioctl+0x165/0x360 [ 1525.696162] ? loop_add+0x8d0/0x8d0 [ 1525.699811] ? loop_add+0x8d0/0x8d0 [ 1525.703445] do_vfs_ioctl+0xd6e/0x1390 [ 1525.707335] ? ioctl_preallocate+0x210/0x210 [ 1525.711748] ? __fget+0x367/0x540 [ 1525.715206] ? ksys_dup3+0x3e0/0x3e0 [ 1525.718940] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1525.723723] ? tomoyo_file_ioctl+0x23/0x30 [ 1525.727975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1525.733511] ? security_file_ioctl+0x93/0xc0 [ 1525.737920] ksys_ioctl+0xab/0xd0 [ 1525.741401] __x64_sys_ioctl+0x73/0xb0 [ 1525.745291] do_syscall_64+0x103/0x610 [ 1525.749738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1525.754928] RIP: 0033:0x457f29 [ 1525.758123] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1525.777022] RSP: 002b:00007f83f2436c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1525.784730] RAX: ffffffffffffffda RBX: 00007f83f2436c90 RCX: 0000000000457f29 06:38:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000040)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={r2, 0x54, &(0x7f00000000c0)=[@in6={0xa, 0x4e24, 0x7ff, @loopback, 0x400}, @in6={0xa, 0x4e24, 0x6, @local, 0x8}, @in6={0xa, 0x4e24, 0x6, @empty, 0x6}]}, &(0x7f0000000200)=0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) ioprio_get$pid(0x0, 0x0) 06:38:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac028001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1525.791992] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1525.799261] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1525.806525] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24376d4 [ 1525.813803] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, 0x0, &(0x7f0000000340)) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1525.855696] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:50 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x101, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0029001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0xc1, 0x1, 0x17a]}) 06:38:51 executing program 0 (fault-call:18 fault-nth:31): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, 0x0) 06:38:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, 0x0, &(0x7f0000000340)) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1526.077474] net_ratelimit: 18 callbacks suppressed [ 1526.077482] protocol 88fb is buggy, dev hsr_slave_0 [ 1526.087549] protocol 88fb is buggy, dev hsr_slave_1 [ 1526.089431] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1526.092657] protocol 88fb is buggy, dev hsr_slave_0 [ 1526.106198] protocol 88fb is buggy, dev hsr_slave_1 06:38:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000080)={0x7, 0x1, 0x2, 0x0, 0x0, [{r0, 0x0, 0xd}, {r0, 0x0, 0x2}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x1ff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) tgkill(r1, r2, 0x39) r3 = getpgid(0x0) ioprio_get$pid(0x2, r3) [ 1526.174493] kvm [8284]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x1 06:38:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4029001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1526.296555] kvm [8284]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x1 06:38:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, 0x0, &(0x7f0000000340)) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1526.348786] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200, 0x0) r1 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x0, r1) 06:38:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0xc2, 0x1, 0x17a]}) 06:38:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8029001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1526.397496] protocol 88fb is buggy, dev hsr_slave_0 [ 1526.402642] protocol 88fb is buggy, dev hsr_slave_1 [ 1526.407820] protocol 88fb is buggy, dev hsr_slave_0 [ 1526.412895] protocol 88fb is buggy, dev hsr_slave_1 [ 1526.451500] FAULT_INJECTION: forcing a failure. [ 1526.451500] name failslab, interval 1, probability 0, space 0, times 0 [ 1526.475126] CPU: 0 PID: 8311 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1526.482008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1526.491377] Call Trace: [ 1526.493980] dump_stack+0x172/0x1f0 [ 1526.497643] should_fail.cold+0xa/0x15 06:38:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8257, 0x200000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)=0x0) mq_notify(r1, &(0x7f0000000080)={0x0, 0x3d, 0x1, @tid=r2}) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@int=0x1000, 0x4) [ 1526.501594] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1526.502777] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1526.506725] ? ___might_sleep+0x163/0x280 [ 1526.506756] __should_failslab+0x121/0x190 [ 1526.523625] should_failslab+0x9/0x14 [ 1526.527451] kmem_cache_alloc_node_trace+0x270/0x720 [ 1526.532571] ? find_next_bit+0x107/0x130 [ 1526.536670] __kmalloc_node+0x3d/0x70 [ 1526.540503] blk_mq_realloc_hw_ctxs+0x1a0/0xfa0 [ 1526.545198] blk_mq_init_allocated_queue+0x420/0x1570 06:38:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac029001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1526.550408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1526.555966] blk_mq_init_queue+0x62/0xb0 [ 1526.560057] loop_add+0x2dd/0x8d0 [ 1526.563521] ? idr_find+0x47/0x60 [ 1526.566993] loop_control_ioctl+0x165/0x360 [ 1526.571364] ? loop_add+0x8d0/0x8d0 [ 1526.575025] ? loop_add+0x8d0/0x8d0 [ 1526.576794] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1526.578678] do_vfs_ioctl+0xd6e/0x1390 [ 1526.578701] ? ioctl_preallocate+0x210/0x210 [ 1526.578720] ? __fget+0x367/0x540 [ 1526.578742] ? ksys_dup3+0x3e0/0x3e0 [ 1526.578768] ? tomoyo_file_ioctl+0x23/0x30 [ 1526.578786] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1526.612450] ? security_file_ioctl+0x93/0xc0 [ 1526.616874] ksys_ioctl+0xab/0xd0 [ 1526.620346] __x64_sys_ioctl+0x73/0xb0 [ 1526.624243] ? do_syscall_64+0x5b/0x610 [ 1526.628223] do_syscall_64+0x103/0x610 [ 1526.632119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1526.637306] RIP: 0033:0x457f29 [ 1526.640502] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1526.659403] RSP: 002b:00007f83f2436c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1526.667112] RAX: ffffffffffffffda RBX: 00007f83f2436c90 RCX: 0000000000457f29 [ 1526.674377] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1526.681653] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1526.688918] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24376d4 [ 1526.696184] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:51 executing program 0 (fault-call:18 fault-nth:32): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a002a001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, 0x0) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1526.754422] kvm [8329]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x1 06:38:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x48000, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000140)={0x9}, 0xfffffffffffffd06) ioprio_get$pid(0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x54) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x1f, 0x800) [ 1526.819589] kvm [8329]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x1 [ 1526.820372] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a402a001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1ff, 0x80) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000040)) 06:38:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0xce, 0x1, 0x17a]}) 06:38:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, 0x0) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a802a001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1527.002239] FAULT_INJECTION: forcing a failure. [ 1527.002239] name failslab, interval 1, probability 0, space 0, times 0 [ 1527.054433] CPU: 1 PID: 8336 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1527.061318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1527.070671] Call Trace: [ 1527.073267] dump_stack+0x172/0x1f0 [ 1527.076918] should_fail.cold+0xa/0x15 [ 1527.080819] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1527.085940] __should_failslab+0x121/0x190 [ 1527.090180] should_failslab+0x9/0x14 [ 1527.093982] kmem_cache_alloc_node_trace+0x270/0x720 [ 1527.099090] ? lock_downgrade+0x880/0x880 [ 1527.103249] __kmalloc_node+0x3d/0x70 [ 1527.107056] blk_mq_realloc_hw_ctxs+0x4c5/0xfa0 [ 1527.111730] ? kasan_unpoison_shadow+0x35/0x50 [ 1527.116336] blk_mq_init_allocated_queue+0x420/0x1570 [ 1527.121558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1527.127109] blk_mq_init_queue+0x62/0xb0 [ 1527.131177] loop_add+0x2dd/0x8d0 [ 1527.134630] ? idr_find+0x47/0x60 [ 1527.138090] loop_control_ioctl+0x165/0x360 [ 1527.142414] ? loop_add+0x8d0/0x8d0 [ 1527.146045] ? loop_add+0x8d0/0x8d0 [ 1527.149674] do_vfs_ioctl+0xd6e/0x1390 [ 1527.153573] ? ioctl_preallocate+0x210/0x210 [ 1527.157986] ? __fget+0x367/0x540 [ 1527.161446] ? ksys_dup3+0x3e0/0x3e0 [ 1527.165164] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1527.170727] ? tomoyo_file_ioctl+0x23/0x30 [ 1527.174964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1527.180505] ? security_file_ioctl+0x93/0xc0 [ 1527.184924] ksys_ioctl+0xab/0xd0 [ 1527.188384] __x64_sys_ioctl+0x73/0xb0 [ 1527.192278] do_syscall_64+0x103/0x610 [ 1527.196178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1527.201367] RIP: 0033:0x457f29 [ 1527.204561] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1527.223464] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1527.231171] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1527.238438] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1527.245702] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 06:38:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc148, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x47d, 0x10001, 0x1, 0x1, 0x0, 0x9, 0x7, 0x8, 0x20, 0x400, 0x8, 0x1, 0x101}, {0x93, 0x4d, 0x40000, 0x8, 0x1b9, 0x8000, 0x100, 0x10001, 0x0, 0x100000000, 0x9eca, 0x6}, {0xffffffff, 0x200, 0x3, 0x80, 0xfffffffffffffc01, 0x1, 0x5, 0x45f9, 0x7fffffff, 0x7f, 0x5, 0x0, 0x8000}], 0x2}) ioprio_get$pid(0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x2000) bind$ax25(r2, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) [ 1527.252985] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1527.260254] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 [ 1527.277448] protocol 88fb is buggy, dev hsr_slave_0 [ 1527.277486] protocol 88fb is buggy, dev hsr_slave_1 06:38:52 executing program 0 (fault-call:18 fault-nth:33): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac02a001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, 0x0) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpgrp(0xffffffffffffffff) getpid() setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000340)=ANY=[@ANYBLOB="080000000000000002004e22ac1414bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000300000002004e237f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24ac14140f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ac141426000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ad89"], 0x210) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xf, &(0x7f0000000080)='/dev/sequencer\x00'}, 0x30) ioprio_get$pid(0x1, r1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x84, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000040)={0x10}) 06:38:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x10a, 0x1, 0x17a]}) 06:38:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a002b001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() ptrace$poke(0x4, r1, &(0x7f0000000000), 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a402b001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x11e, 0x1, 0x17a]}) 06:38:52 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4081fe) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a802b001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1527.773966] FAULT_INJECTION: forcing a failure. [ 1527.773966] name failslab, interval 1, probability 0, space 0, times 0 [ 1527.828817] CPU: 1 PID: 8392 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1527.835693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1527.845053] Call Trace: [ 1527.847655] dump_stack+0x172/0x1f0 [ 1527.851322] should_fail.cold+0xa/0x15 [ 1527.855253] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1527.860383] ? ___might_sleep+0x163/0x280 [ 1527.864532] __should_failslab+0x121/0x190 [ 1527.868766] should_failslab+0x9/0x14 [ 1527.872566] kmem_cache_alloc_node_trace+0x270/0x720 [ 1527.877682] ? retint_kernel+0x2d/0x2d [ 1527.881895] __kmalloc_node+0x3d/0x70 [ 1527.885701] sbitmap_init_node+0x29e/0x510 [ 1527.889964] blk_mq_realloc_hw_ctxs+0x53b/0xfa0 [ 1527.894644] blk_mq_init_allocated_queue+0x420/0x1570 [ 1527.899839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1527.905381] blk_mq_init_queue+0x62/0xb0 [ 1527.909484] loop_add+0x2dd/0x8d0 [ 1527.913004] ? idr_find+0x47/0x60 [ 1527.916456] loop_control_ioctl+0x165/0x360 [ 1527.920779] ? loop_add+0x8d0/0x8d0 [ 1527.924411] ? loop_add+0x8d0/0x8d0 [ 1527.928039] do_vfs_ioctl+0xd6e/0x1390 [ 1527.931924] ? ioctl_preallocate+0x210/0x210 [ 1527.936324] ? __fget+0x367/0x540 [ 1527.939773] ? ksys_dup3+0x3e0/0x3e0 [ 1527.943473] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1527.949001] ? tomoyo_file_ioctl+0x23/0x30 [ 1527.953221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1527.958773] ? security_file_ioctl+0x93/0xc0 [ 1527.963212] ksys_ioctl+0xab/0xd0 [ 1527.966679] __x64_sys_ioctl+0x73/0xb0 [ 1527.970569] do_syscall_64+0x103/0x610 [ 1527.974448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1527.979632] RIP: 0033:0x457f29 [ 1527.982831] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1528.001743] RSP: 002b:00007f83f2457c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1528.009446] RAX: ffffffffffffffda RBX: 00007f83f2457c90 RCX: 0000000000457f29 [ 1528.016697] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1528.023960] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.031219] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24586d4 [ 1528.038481] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:53 executing program 0 (fault-call:18 fault-nth:34): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac02b001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, 0x0, &(0x7f0000000340)) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:53 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x8200, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f00000000c0)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200000, 0x0) r2 = openat(r0, &(0x7f00000001c0)='./file0\x00', 0x500003, 0x111) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400400200) dup3(r1, r2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) [ 1528.076088] kvm [8412]: vcpu0, guest rIP: 0xfff0 ignored wrmsr: 0x11e data 0x1 [ 1528.111187] kvm [8412]: vcpu0, guest rIP: 0xfff0 ignored wrmsr: 0x11e data 0x1 06:38:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a002c001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x140, 0x1, 0x17a]}) 06:38:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:53 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x200, 0x40) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x224, r1, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7f}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_BEARER={0x100, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x10001, @loopback, 0x1f}}, {0x14, 0x2, @in={0x2, 0x4e21, @loopback}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'lo\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'gretap0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xffffffffffff529f, @empty, 0x20}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x7, @ipv4={[], [], @loopback}, 0x8}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e23, @remote}}}}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x17f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x44}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xe}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x224}, 0x1, 0x0, 0x0, 0x4}, 0x24000000) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a402c001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1528.426250] FAULT_INJECTION: forcing a failure. [ 1528.426250] name failslab, interval 1, probability 0, space 0, times 0 [ 1528.457540] CPU: 1 PID: 8434 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1528.464411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1528.473772] Call Trace: [ 1528.476372] dump_stack+0x172/0x1f0 [ 1528.480025] should_fail.cold+0xa/0x15 [ 1528.484026] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1528.489145] ? ___might_sleep+0x163/0x280 [ 1528.493302] __should_failslab+0x121/0x190 [ 1528.497546] should_failslab+0x9/0x14 [ 1528.501360] kmem_cache_alloc_node_trace+0x270/0x720 [ 1528.506465] ? find_next_bit+0x107/0x130 [ 1528.510541] __kmalloc_node+0x3d/0x70 [ 1528.514344] blk_mq_realloc_hw_ctxs+0x1a0/0xfa0 [ 1528.519023] ? kasan_unpoison_shadow+0x35/0x50 [ 1528.523633] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1528.528756] blk_mq_init_allocated_queue+0x420/0x1570 [ 1528.533954] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1528.539508] blk_mq_init_queue+0x62/0xb0 [ 1528.543573] loop_add+0x2dd/0x8d0 [ 1528.547025] ? idr_find+0x47/0x60 [ 1528.550496] loop_control_ioctl+0x165/0x360 [ 1528.554819] ? loop_add+0x8d0/0x8d0 [ 1528.558452] ? loop_add+0x8d0/0x8d0 [ 1528.562080] do_vfs_ioctl+0xd6e/0x1390 [ 1528.565980] ? ioctl_preallocate+0x210/0x210 [ 1528.570394] ? __fget+0x367/0x540 [ 1528.573852] ? ksys_dup3+0x3e0/0x3e0 [ 1528.577574] ? tomoyo_file_ioctl+0x23/0x30 [ 1528.581810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1528.587354] ? security_file_ioctl+0x93/0xc0 [ 1528.591783] ksys_ioctl+0xab/0xd0 [ 1528.595242] __x64_sys_ioctl+0x73/0xb0 [ 1528.599142] do_syscall_64+0x103/0x610 [ 1528.603038] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1528.608227] RIP: 0033:0x457f29 06:38:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup2(r0, r0) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x1b26) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) [ 1528.611418] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1528.630315] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1528.638018] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1528.645307] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1528.652580] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1528.659844] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1528.667108] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:53 executing program 0 (fault-call:18 fault-nth:35): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 06:38:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x59}, {&(0x7f0000000580)}, {0x0}, {&(0x7f0000000640)=""/232, 0xe8}], 0x4, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a802c001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000040)={0x40, 0xfe000000, 0x83a0, 0x9, 0x2, 0x6, 0xa7}) 06:38:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 06:38:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x174, 0x1, 0x17a]}) 06:38:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac02c001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) process_vm_readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/232, 0xe8}], 0x1, &(0x7f0000000500)=[{&(0x7f0000000200)=""/221, 0xdd}, {&(0x7f0000000300)=""/110, 0x6e}, {&(0x7f0000000380)=""/186, 0xba}, {&(0x7f0000000440)=""/150, 0x96}], 0x4, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a002d001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, 0x0, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1528.979990] FAULT_INJECTION: forcing a failure. [ 1528.979990] name failslab, interval 1, probability 0, space 0, times 0 [ 1529.007696] CPU: 0 PID: 8479 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1529.014562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1529.023913] Call Trace: [ 1529.023951] dump_stack+0x172/0x1f0 [ 1529.023987] should_fail.cold+0xa/0x15 [ 1529.030195] ? retint_kernel+0x2d/0x2d [ 1529.030216] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1529.030238] ? __should_failslab+0xe7/0x190 [ 1529.030258] __should_failslab+0x121/0x190 [ 1529.030279] should_failslab+0x9/0x14 [ 1529.030299] kmem_cache_alloc_node_trace+0x270/0x720 [ 1529.060549] ? retint_kernel+0x2d/0x2d [ 1529.064452] __kmalloc_node+0x3d/0x70 [ 1529.068262] blk_mq_realloc_hw_ctxs+0x4c5/0xfa0 [ 1529.072939] ? kasan_unpoison_shadow+0x35/0x50 [ 1529.077536] blk_mq_init_allocated_queue+0x420/0x1570 [ 1529.082728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1529.090534] blk_mq_init_queue+0x62/0xb0 [ 1529.094601] loop_add+0x2dd/0x8d0 [ 1529.098052] ? idr_find+0x47/0x60 [ 1529.101508] loop_control_ioctl+0x165/0x360 [ 1529.105832] ? loop_add+0x8d0/0x8d0 [ 1529.109478] ? loop_add+0x8d0/0x8d0 [ 1529.113109] do_vfs_ioctl+0xd6e/0x1390 [ 1529.117001] ? ioctl_preallocate+0x210/0x210 [ 1529.121417] ? __fget+0x367/0x540 [ 1529.124872] ? ksys_dup3+0x3e0/0x3e0 [ 1529.128597] ? tomoyo_file_ioctl+0x23/0x30 [ 1529.132830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1529.138365] ? security_file_ioctl+0x93/0xc0 [ 1529.142779] ksys_ioctl+0xab/0xd0 [ 1529.146241] __x64_sys_ioctl+0x73/0xb0 [ 1529.150142] do_syscall_64+0x103/0x610 [ 1529.154039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1529.159248] RIP: 0033:0x457f29 06:38:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x175, 0x1, 0x17a]}) [ 1529.162441] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1529.181338] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1529.189045] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1529.196312] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1529.203575] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1529.210842] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1529.218109] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:54 executing program 0 (fault-call:18 fault-nth:36): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a402d001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, 0x0, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 06:38:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 06:38:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x0, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a802d001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x176, 0x1, 0x17a]}) 06:38:54 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac02d001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1529.636467] FAULT_INJECTION: forcing a failure. [ 1529.636467] name failslab, interval 1, probability 0, space 0, times 0 [ 1529.651184] CPU: 0 PID: 8539 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1529.658040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1529.667419] Call Trace: [ 1529.670050] dump_stack+0x172/0x1f0 [ 1529.673727] should_fail.cold+0xa/0x15 [ 1529.677651] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1529.682783] ? ___might_sleep+0x163/0x280 06:38:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SIOCNRDECOBS(r0, 0x89e2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x2000, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000240), &(0x7f0000000280)=0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="0674e41a000104", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0x1c) ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f00000001c0)=0x80000000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000000c0)={r3, 0x9}, &(0x7f0000000100)=0x8) [ 1529.686974] __should_failslab+0x121/0x190 [ 1529.691232] should_failslab+0x9/0x14 [ 1529.695056] kmem_cache_alloc_node_trace+0x270/0x720 [ 1529.700184] ? __raw_spin_lock_init+0x2d/0x100 [ 1529.704787] blk_alloc_flush_queue+0x8f/0x2d0 [ 1529.709317] blk_mq_realloc_hw_ctxs+0x732/0xfa0 [ 1529.713995] ? kasan_unpoison_shadow+0x35/0x50 [ 1529.718599] blk_mq_init_allocated_queue+0x420/0x1570 [ 1529.723803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1529.729357] blk_mq_init_queue+0x62/0xb0 [ 1529.733422] loop_add+0x2dd/0x8d0 [ 1529.736879] loop_control_ioctl+0x165/0x360 [ 1529.741212] ? loop_add+0x8d0/0x8d0 [ 1529.744845] ? loop_add+0x8d0/0x8d0 [ 1529.748479] do_vfs_ioctl+0xd6e/0x1390 [ 1529.752373] ? ioctl_preallocate+0x210/0x210 [ 1529.756784] ? __fget+0x367/0x540 [ 1529.760249] ? ksys_dup3+0x3e0/0x3e0 [ 1529.763977] ? tomoyo_file_ioctl+0x23/0x30 [ 1529.768516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1529.774061] ? security_file_ioctl+0x93/0xc0 [ 1529.778478] ksys_ioctl+0xab/0xd0 [ 1529.781944] __x64_sys_ioctl+0x73/0xb0 [ 1529.785839] ? do_syscall_64+0x5b/0x610 [ 1529.789825] do_syscall_64+0x103/0x610 [ 1529.793718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1529.798908] RIP: 0033:0x457f29 [ 1529.802110] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1529.821017] RSP: 002b:00007f83f2436c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1529.828735] RAX: ffffffffffffffda RBX: 00007f83f2436c90 RCX: 0000000000457f29 06:38:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a002e001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1529.836006] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1529.843273] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1529.850541] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24376d4 [ 1529.857811] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:54 executing program 0 (fault-call:18 fault-nth:37): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x0, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a402e001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x0, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x100, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x5) 06:38:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x17a, 0x1, 0x17a]}) 06:38:55 executing program 3 (fault-call:19 fault-nth:0): syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a802e001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1530.110268] __nla_parse: 21 callbacks suppressed [ 1530.110273] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0x0, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) gettid() fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioprio_get$pid(0x3, r3) perf_event_open(&(0x7f0000001200)={0x5, 0x70, 0x2, 0x20, 0x0, 0x800, 0x0, 0x2, 0x1, 0x6, 0x5, 0xfffffffffffff025, 0x8a0f00, 0x5, 0x7e60000, 0xb65f, 0x6, 0xfffffffffffffffb, 0x6, 0x5, 0x6, 0x5, 0x0, 0x2, 0x7fffffff, 0x200, 0x7, 0x7, 0x3, 0x1, 0x101, 0x1, 0x5, 0x2, 0x7, 0x8001, 0x5, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x3, 0xda}, 0x10000, 0x9, 0x80, 0x9, 0x80, 0x9, 0x9}, r2, 0x8, r1, 0xa) r4 = open(&(0x7f00000011c0)='./file0\x00', 0x200000, 0x20) name_to_handle_at(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0), 0x400) [ 1530.244895] FAULT_INJECTION: forcing a failure. [ 1530.244895] name failslab, interval 1, probability 0, space 0, times 0 [ 1530.264643] CPU: 1 PID: 8599 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1530.271500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.280853] Call Trace: [ 1530.283449] dump_stack+0x172/0x1f0 [ 1530.287093] should_fail.cold+0xa/0x15 [ 1530.290991] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1530.296104] ? ___might_sleep+0x163/0x280 [ 1530.300262] __should_failslab+0x121/0x190 [ 1530.304501] should_failslab+0x9/0x14 [ 1530.308305] kmem_cache_alloc_node_trace+0x270/0x720 [ 1530.313413] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1530.318955] ? find_next_bit+0x107/0x130 [ 1530.323026] blk_mq_init_tags+0x73/0x2c0 [ 1530.327092] blk_mq_alloc_rq_map+0x88/0x200 [ 1530.331424] blk_mq_init_sched+0x20c/0x750 [ 1530.335671] elevator_init_mq+0xcd/0x160 [ 1530.339738] blk_mq_init_allocated_queue+0x1136/0x1570 [ 1530.345058] blk_mq_init_queue+0x62/0xb0 [ 1530.349124] loop_add+0x2dd/0x8d0 [ 1530.352578] ? idr_find+0x47/0x60 [ 1530.356038] loop_control_ioctl+0x165/0x360 [ 1530.360362] ? loop_add+0x8d0/0x8d0 [ 1530.363996] ? loop_add+0x8d0/0x8d0 [ 1530.367629] do_vfs_ioctl+0xd6e/0x1390 [ 1530.371530] ? ioctl_preallocate+0x210/0x210 [ 1530.375941] ? __fget+0x367/0x540 [ 1530.379403] ? ksys_dup3+0x3e0/0x3e0 [ 1530.383126] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1530.388682] ? tomoyo_file_ioctl+0x23/0x30 [ 1530.392932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1530.398469] ? security_file_ioctl+0x93/0xc0 [ 1530.402880] ksys_ioctl+0xab/0xd0 [ 1530.406360] __x64_sys_ioctl+0x73/0xb0 [ 1530.410252] do_syscall_64+0x103/0x610 [ 1530.414148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1530.419341] RIP: 0033:0x457f29 [ 1530.422531] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:38:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac02e001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1530.441430] RSP: 002b:00007f83f2457c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1530.449136] RAX: ffffffffffffffda RBX: 00007f83f2457c90 RCX: 0000000000457f29 [ 1530.456404] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1530.463668] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1530.470939] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24586d4 [ 1530.478213] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x17b, 0x1, 0x17a]}) 06:38:55 executing program 0 (fault-call:18 fault-nth:38): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0x0, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1530.570452] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x4cc0, 0x0) getdents64(r1, &(0x7f0000000040)=""/155, 0x9b) ioprio_get$pid(0x0, 0x0) 06:38:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a002f001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f0000000080)=0x7f, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0x0, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x40000) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f00000001c0)={0x62cd, 0x4393, 0x81, 'queue1\x00', 0x10001}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() fcntl$getown(r2, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) fcntl$getown(r2, 0x9) r3 = getpgid(0x0) ioprio_get$pid(0x8000, r3) [ 1530.790979] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1530.824222] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x186, 0x1, 0x17a]}) 06:38:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a402f001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1530.933497] FAULT_INJECTION: forcing a failure. [ 1530.933497] name failslab, interval 1, probability 0, space 0, times 0 [ 1530.948901] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1530.960081] CPU: 1 PID: 8634 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1530.966937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.976300] Call Trace: [ 1530.978917] dump_stack+0x172/0x1f0 [ 1530.982576] should_fail.cold+0xa/0x15 [ 1530.986486] ? retint_kernel+0x2d/0x2d [ 1530.990395] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1530.995532] __should_failslab+0x121/0x190 [ 1530.999783] should_failslab+0x9/0x14 [ 1531.003603] kmem_cache_alloc_node_trace+0x270/0x720 [ 1531.008720] ? debug_smp_processor_id+0x2e/0x280 [ 1531.013484] __kmalloc_node+0x3d/0x70 [ 1531.017291] sbitmap_init_node+0x29e/0x510 [ 1531.021542] sbitmap_queue_init_node+0x40/0x710 [ 1531.026212] ? find_next_bit+0x107/0x130 [ 1531.030284] blk_mq_init_tags+0x119/0x2c0 [ 1531.034436] blk_mq_alloc_rq_map+0x88/0x200 [ 1531.038763] blk_mq_init_sched+0x20c/0x750 [ 1531.043008] elevator_init_mq+0xcd/0x160 [ 1531.047072] blk_mq_init_allocated_queue+0x1136/0x1570 [ 1531.052363] ? blk_alloc_queue_node+0x541/0x760 [ 1531.057043] blk_mq_init_queue+0x62/0xb0 [ 1531.061114] loop_add+0x2dd/0x8d0 [ 1531.064565] ? idr_find+0x47/0x60 [ 1531.068024] loop_control_ioctl+0x165/0x360 [ 1531.072349] ? loop_add+0x8d0/0x8d0 [ 1531.075979] ? loop_add+0x8d0/0x8d0 [ 1531.079610] do_vfs_ioctl+0xd6e/0x1390 [ 1531.083504] ? ioctl_preallocate+0x210/0x210 [ 1531.087915] ? __fget+0x367/0x540 [ 1531.091373] ? ksys_dup3+0x3e0/0x3e0 [ 1531.095088] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1531.100633] ? tomoyo_file_ioctl+0x23/0x30 [ 1531.104865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1531.110404] ? security_file_ioctl+0x93/0xc0 [ 1531.114814] ksys_ioctl+0xab/0xd0 [ 1531.118272] __x64_sys_ioctl+0x73/0xb0 [ 1531.122162] do_syscall_64+0x103/0x610 [ 1531.126058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1531.131251] RIP: 0033:0x457f29 [ 1531.134447] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1531.153361] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1531.161087] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1531.168354] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1531.175628] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 06:38:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x44000) sendmsg$nl_netfilter(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x3, 0x0, 0xb00, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x3}, [@typed={0x8, 0x7e, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @typed={0x14, 0x58, @ipv6=@empty}, @typed={0x14, 0x67, @ipv6=@mcast2}]}, 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x4000) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000200)={[0x3002, 0x5000, 0x0, 0xf000], 0x10001, 0x8, 0xff}) [ 1531.182902] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1531.190172] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a802f001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:56 executing program 0 (fault-call:18 fault-nth:39): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x0, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vbi(&(0x7f0000000300)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000500)={0x0, 0x4}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000540)={r2, 0x3a3, "7af42772243d96a5fdee83a677e566d2f421e80fefd0524a46f53f6c0f65a1ffc115e903faa27d165444efe6969d4860e5a70e7ccaa24afe372400d9bac57399ab684a3f327ff63afa6afb03e242174bf5c793d4e45523b7052502d46a3c1f9193d846ccbd6081b26ce5686b507eaa06b18aebd5183126fe0ec402e116bece3b6fe612559964498fefcd2d6de25c1172995a72b40a201a64fbb254f306d68490bb7f632432f706c18876fc2a63287e73a7377b3e5ed59f8a29fd1a279922287bcee363518fbf1f405e0573b74d976fe1babafeed483f2c7d4e43fdd98a6b127b834640c579125f2bb0d2e14cb462df462d411c3cf64b"}, &(0x7f00000004c0)=0xfe) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x8100) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f0000000080)=0x10000, 0x4) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000000c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r3, 0xc1105518, &(0x7f00000001c0)={{0x9, 0x2, 0x40, 0xfffffffffffffff9, 'syz0\x00', 0x80000001}, 0x1, 0x3, 0x333e, r4, 0x3, 0x200, 'syz1\x00', &(0x7f0000000100)=['/dev/input/mice\x00', '\x00', '/dev/input/mice\x00'], 0x21, [], [0x72a, 0x5, 0x1ed, 0x5]}) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000040)) ioprio_get$pid(0x0, 0x0) gettid() [ 1531.325692] kvm [8668]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0x186 data 0x1 06:38:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.stat\x00', 0x0, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000300)={0x7, 0xbc7, 0x5, 0x4, 0x10000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r5 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r7, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r7, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r6, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r7, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) getsockname(r6, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) [ 1531.388398] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:38:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x0, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) [ 1531.437477] net_ratelimit: 21 callbacks suppressed [ 1531.437485] protocol 88fb is buggy, dev hsr_slave_0 [ 1531.437515] protocol 88fb is buggy, dev hsr_slave_1 [ 1531.442569] protocol 88fb is buggy, dev hsr_slave_1 [ 1531.460066] kvm [8668]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0x186 data 0x1 06:38:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac02f001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:56 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1f) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000040)="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") 06:38:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x187, 0x1, 0x17a]}) [ 1531.643057] FAULT_INJECTION: forcing a failure. [ 1531.643057] name failslab, interval 1, probability 0, space 0, times 0 [ 1531.655001] CPU: 0 PID: 8688 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1531.661879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1531.664490] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1531.671229] Call Trace: [ 1531.671258] dump_stack+0x172/0x1f0 [ 1531.671288] should_fail.cold+0xa/0x15 06:38:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0030001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1531.671325] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1531.671356] ? ___might_sleep+0x163/0x280 [ 1531.699150] __should_failslab+0x121/0x190 [ 1531.703448] should_failslab+0x9/0x14 [ 1531.707267] kmem_cache_alloc_node_trace+0x270/0x720 [ 1531.712370] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1531.717914] ? find_next_bit+0x107/0x130 [ 1531.721999] blk_mq_init_tags+0x73/0x2c0 [ 1531.723527] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1531.726079] blk_mq_alloc_rq_map+0x88/0x200 [ 1531.726104] blk_mq_init_sched+0x20c/0x750 06:38:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4030001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1531.726135] elevator_init_mq+0xcd/0x160 [ 1531.747229] blk_mq_init_allocated_queue+0x1136/0x1570 [ 1531.752531] blk_mq_init_queue+0x62/0xb0 [ 1531.756710] loop_add+0x2dd/0x8d0 [ 1531.760223] ? idr_find+0x47/0x60 [ 1531.764170] loop_control_ioctl+0x165/0x360 [ 1531.768508] ? loop_add+0x8d0/0x8d0 [ 1531.772175] ? loop_add+0x8d0/0x8d0 [ 1531.774102] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1531.775820] do_vfs_ioctl+0xd6e/0x1390 [ 1531.775844] ? ioctl_preallocate+0x210/0x210 06:38:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8030001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1531.775862] ? __fget+0x367/0x540 [ 1531.775882] ? ksys_dup3+0x3e0/0x3e0 [ 1531.800058] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1531.805611] ? tomoyo_file_ioctl+0x23/0x30 [ 1531.810208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1531.815758] ? security_file_ioctl+0x93/0xc0 [ 1531.820186] ksys_ioctl+0xab/0xd0 [ 1531.823552] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1531.823662] __x64_sys_ioctl+0x73/0xb0 [ 1531.836033] do_syscall_64+0x103/0x610 [ 1531.839943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1531.845139] RIP: 0033:0x457f29 [ 1531.848351] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1531.867251] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1531.874947] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1531.882199] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1531.889457] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1531.896730] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1531.903982] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:57 executing program 0 (fault-call:18 fault-nth:40): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac030001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x0, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/icmp\x00') getsockopt$inet_buf(r2, 0x0, 0x2f, &(0x7f00000001c0)=""/37, &(0x7f0000000300)=0x25) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r3, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x4000000, 0x0, 0x0) flistxattr(r2, &(0x7f0000000800)=""/114, 0x72) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x184013, r2, 0x0) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r4}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r5 = accept4$bt_l2cap(r3, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) sendmmsg$inet_sctp(r3, &(0x7f0000000c80)=[{&(0x7f0000000580)=@in={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000000940)=[{&(0x7f0000000900)="2ffa42553a28fec093408ceb96da321f5d0962b66e038362cbe8f80df4af873b97fd8aaa0ad600", 0x27}, {&(0x7f0000000a40)="c892e4da3d9dbc2419bcb3c98ee945aad7614e53d576c5bcdb607e1aa6c93305cb2b6a951054868c996f5638297fd992828016f3820dcc30cee723d24c4c547bed836017316e62f0318ffe415c5197bb291a054c81ba35dabf5a31e30d44f98f967172ba135bed01f7f3a49f36466b52fb69f28209ba6e5928b00ae6c843bcb62600552576168254311d19e99e0d30a651d683a1f3f32eb8ea8952b8c77ea23eee3a5824a692c390ea6779d433cb", 0xae}, {&(0x7f0000000b00)="5d5883a4a301157f0dc1a7f6ad261250562106544e8bbd6906c23b1fa9c7e2638947f31d510994f463ba9c3f485d328f9343e318337f6f7036a2ffb8ef5b98d4c8214ca29d1f31eba5c9c23d1d9777a140193773328fba103a5a67b54d", 0x5d}, {&(0x7f0000000b80)="9093bdd157c3b8e9c8663b1c11094f159972afd1b673704729f02f9399dfb37fb644e74c5699a87a2762f7468ac37dd11ba1472ab412866dff52a8611c4d0f378b271482488b2b932d1681c55d51d4051bb23f778a325c181d9a624e298ab1e179600b30bf94777c75a0e6f98cf8942193e97f31f603e8956a1ce26a0b0e5614d451d023233ff5a6780c5b870d18237102de4e104d6a16864ab47a15f93be7ff29e6", 0xa2}], 0x4, &(0x7f0000000c40)=[@init={0x18, 0x84, 0x0, {0xe074, 0x1, 0x0, 0x2}}, @init={0x18, 0x84, 0x0, {0x4, 0x8, 0x6, 0x1}}], 0x30, 0x4000000}], 0x1, 0x4000) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000cc0)={0x4, 0x5, 0x2, 0x0, 0x0, [{r2, 0x0, 0x3}, {r6, 0x0, 0x1f}]}) write$smack_current(r7, &(0x7f00000002c0)='vmnet0\x00', 0x5) bind$rds(r7, &(0x7f0000000500)={0x2, 0x4e23, @local}, 0x10) ioctl$RTC_WKALM_SET(r7, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r6, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r7, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r7, 0x80045300, &(0x7f0000000540)) getsockname(r6, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) accept4(r0, &(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000240)=0x80, 0x80800) accept4$packet(0xffffffffffffff9c, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0x14, 0x80800) accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000500)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000b00)={@local, @initdev, 0x0}, &(0x7f0000000b40)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000b80)={'vcan0\x00', 0x0}) ioctl$SG_SET_COMMAND_Q(r2, 0x2271, &(0x7f0000000280)) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000f00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800220}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000bc0)={0x2f0, r3, 0x200, 0x70bd25, 0x25dfdbff, {}, [{{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x180, 0x2, [{0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0xfffffffffffff26c, 0x4, 0x0, 0x40}, {0x8032, 0xc2f, 0x100000000, 0xbc0d}, {0x10000000000000, 0x8c, 0x0, 0x1000}, {0x7ff, 0x2, 0x7c1, 0xdcd3}, {0x7, 0x6b8, 0x1971, 0xffffffff}, {0x2, 0x401, 0x3, 0x9}, {0x6478, 0x7, 0x3, 0x5}, {0x3ff, 0x0, 0xb9c, 0x4}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x55e, 0x78f, 0x9}, {0x58b, 0x28f, 0x0, 0x8000}, {0x714, 0x80, 0xffffffffffffda50, 0xffc00}, {0x0, 0xffff, 0x1, 0xe}, {0xffff, 0xb77e, 0x80, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}]}}, {{0x8, 0x1, r8}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0xc0, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0xfffffffffffffff2, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}]}}]}, 0x2f0}, 0x1, 0x0, 0x0, 0x4}, 0x40014) ioprio_get$pid(0x0, 0x0) [ 1532.043446] kvm [8721]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0x187 data 0x1 06:38:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0031001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1532.104101] kvm [8721]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0x187 data 0x1 06:38:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) ioprio_get$pid(0x0, r1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) 06:38:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x0, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x1a0, 0x1, 0x17a]}) 06:38:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4031001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x300, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000011c0)={'filter\x00', 0xb0, "a4c6079ecf7d11a6086f43c1e34c041bfa6aec20eb65eb994abea5bae19580939992211e92cff4ae4027bf060b0287247324e0e0c0dccb8653d4a52d891d13bc029607bf55834a7dc1c68f65224b0c5ee61ca59b594a3baab4c27337875b0dd97265f5cdc8d00b301ad13eecf53f19e37397ec6939e9be7d269d9a79d8fe791d86a1fbe2c5899f31d2221a88686442f4be7f664c9bf430dd0ded6737d583c342adde8dbdee5e297a6ba4194cdcea9c67"}, &(0x7f00000000c0)=0xd4) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r2, &(0x7f00000001c0)="a4f856676296411dd77fc72c6ed59bdb082de04b168c48683e107dae5c69f38116e6e3cdbbb3e4c37cc9d0e6a8b026d87e78a4de3caaf535f3ca55edff2b7efa0e4a7add69cb0a450d2d09633b7d4995d27098fb395a6f7b9bb4db3715e26b2b71bda4721f22b2ffe2bced741aed708b8ccadc138bbb727d1696193e5a12ef291f30e2df8f599e95800613088d486db938f366233c410db6cb51dbb2cd1a3f550538ca2ad5d6aa8f0468b640804606df686e401d0788f62413a4fffa7aa806e4b89d1d8207446f8ae9bdb5b637f09bbbc780ded71bdf413f2b3ab1b0f40d33d462909b6e05f8d5f219eecaf34f4021b84ee1af270ac7755ad3d870e8d49c674bd7553cd54ee452bd4ee84b3cfe0a8ab1f264cc3b3bc80545a3b13afe691b6f65e54544567bf0dc87b5c3396844fc29b6aa6f458ef64a61dc8a1a15d37cc5f021b94433603b641359e6bfbbdb25356449c1a4e8ac3a27c06747ca535fc36268d9338ef8cedac86f0beb2a7c9dc3915b7a506591441335b3d77971dace6246f507bc76af919fca95b1f2ad9140a3defd8c37f9109d947081cc9d4401e1fd755e23527e17d1f69f1ff509fc3529e7a62acf3f9b9f045fdaf7685a487fcbb9c35ab597813f79ffa2a9343dbfc208dfc5fb93a0ceca0c72f7e811dd2196fb31de74decea0c6c36c8ba6a61881226b5c9b58d73795a5d82ea71d86e3eabc1db5792f8dd489af77c1d4ab1fa243af7f20a5577d912c74ae348b2c7f66fb7db0532e4aab90b490779d0fde426c33984c74ad9a0dd0993b3849db06f2c8e3857341c4445d46ab8e4a3fd47d5cde5f73df04e2311f42f48cc169c3e565b47a9e3988b1440941170c4a437b4598e60ef6c2345e3e710714da0f5b2231ae1c69d9d907b713726134324cf8f7f92fa04a57837f891f747f6154eb3c94ff887c489b906c21d80cd6b2d77a699eb68ff9a6a73c5f470a3194eb79502c661bbba9e5334b0b53d29c8de40dbe2712d9d92448bc99b8294fe77f7495ca357220bfcb57fd1d1bcfef1bc382ae5a65108c6817f12a23439e98add235c302057a4171f8f433f0869bf05e0f02c07aafd93622ee9a2a3d63bc5897fb15a7b600b8f9bec3a23e292826890f1aaeae7bf3a416163c1cb1b4a1efe9122c6e8bab56df4f097d1de48d59a882fc9d6b0840311fce1fe093d7d5b4637c923ef6d39812b42f50344e48477b6c2e08747fc9daa5bc81344effb79c431362376d0d53481348c1e949210d60dda4c423b64c6a560037aae77255d11dd5306dbde2a6c3299659d48449b61dd44870aad8b8b3c190504fede6483823c0c5d16a99b1be5e11a22906fd594c066a9fc7213ec08cba54199c7206e62682f7dc66ce23011e2921f4dae9534aff161fe0ad310b5d2e053494ca24136d5c98a1fb195b2715d42042cbe7dc2aac18d22799a2c2eb2be906baa2256f4b6e2e1d1b96b06b30f9af072054a641916a6e65e300be71ef193b8ea759a9ec367e86aa1eef24b929dee5bb2072dcb5f438d217e29216cdb8b2f232f836fc85678a9f884128b280b992434437e84fa5b10a9db08d4ee3f0511cee6e946dbdd4d294e3ce68ecd3e9bf34e92efe65d13be72fcbb00bcb8ebff3ebfe85f157f28a2d1ce26d810d77b194bdf185b432062973caf7c913e11a8eb46870f002fe14b6b2e4bc9521b77a8fedcd45742b5436b5a260e671ac720adaacb1be09a28de7c2ec0c500e3ac8de3828529b9b15774a4a8e6fbfff89aeefd82f57336b2118ee09899da28295a8ff22b06db21a41c99453a05b09ed04c2d32532d9ec4e89e18177d6d15455316ea3d456d6a53a3320bde11930a179286e684cf814066d2e322e8066da27071d0d4fa5f163ae05c31a7969b78d7ca3c5eedf407dac8c3f2131ff45cce562f65a812ac39fed76f53872776e7e5cbe8f0fdc181090bc52bdf4101f71944c34da1449a67bec66c4a56e4c667c9874d30df68e76e2046ee36421a27ce87803e17f52fab4a0eb6177a9dbd0a6fb074b016fc62a8f744f00c632b7d300260a06a2cc7d765eacccab3c0903b72d65ea012c04118ee582046c961f1ae7d56a03a21883b5bfd54148ba04061dea4fd00c0e19b0ebdf8c01ef75bcf19b4d2131bce341dcd5ba1cadbad61b5d017bed72533fba76cb0653d8db642f426b91b77a9bd87fcab2d52d6dd7f138fef1b3e77ed122d7bef5f98fe294e290f953cf92c3c73fb399568f3d8b4d173d2761091b81cb65f147e8cb3f5b032068e39a8d3e8cd714251d9edf4a065551cccf0a080e2af2e4b88990fd4316ee89f430975de2c2dcac79d926bf48490a3fc372129b52b1dc02b118dad3bb959427f46cfe18399cfb1f1ff1fd1a48a0c1e92903d7fe5770204b1ac41268c86c53de9370dfd8560e86a7d4429879aa49069245fd1a0679b130a7b7301a6166afc9bb19d076c08b00f9cecf94f1e478a4b7ed9a9585eb22bd9acf52234e447ec82d463ff55e0f757cedee7b9bbe639021bfe1fb7023a27795fcb4ad54beef48d1162bc61d5b1631a05610d5dc2d459540a520d85a96a1465adb814a2b3cbdb0da1e95fbda8cd875d48a21301287d332b8342f7ea6709e1a2133873f3c4846686ce381825f404f13a51f6de887efe7edefc9b53baaac2ee0dfe7e0012ae072047ce042a056b08b80e4fb463ae9f834d199ec94c32751543ffbf37e26a2488e0c405d10acf2a5411bb88b040acf252a79acf9422db8867782f02a77c3e5dfdc5ac64c4d294b35d6432356824175453d2b685ac9d4cce25746d46a4537e31fb18a3b055950390e3a780dfe6481cc79c1dd53158d60881ddc3d2474ccdbc52367c77c139a51bc3701d49ac17b4ea41e03e46a2aa5f01bc6050b7cc8ef5e42c54ed7e0228514b24424c8819b9f802aca1c9c157c5235c9d4897b1ba18314e76b13c899ac3c3ff3416c0c4afcf305ffea12fef894229c18c5dba981e2a3d21cf214d5212ef1211af491d0d604746414f764f32342fede84da2ec266e5d9e4b38d42bfc954f8f7a63c64a97bb866aab3ff0edfdb6d1841910a970a5106d3042fe28716667c7d8d17f7e418063ba6187c31851a59589b380efbc0c3e71d7c4bf29a64867ccc6225c746c5045904509461c429e2b018191d3353430035080e0cd273885319f14ef96b29c51a2381e41e5da367fa947ac9cc63d461eb550faf7c5c9f3557717a0af95fa05679384394bed8e06c0788663d9e28ba8e71f4e5dc3f610ce6703848be15d0f31c1392249c32f6bb7097de7268832eb9bdd6f82953cf9b8c31cb65d09623ab8a608974e9701805cce3b87f8747d1c4de642aa61a4f17544369db2c3fd418fa283a5897705d3e917f83369403296245bc6b26cc8ab1c8220440360a4f091c3a9a0bce1976bab612f9228264e92d528e4883be84fd0291e770afe8fd7168f3cd6a806c947337e68b0215404a96fb24fdb511054b8e7ae360c39af2fedbdafa795e0e65e25506033bd988544f31070cd2f526a4eb39057a75d4c9a6c3f3b870cdbfd428fc7b43f7040645223fadb5764bc068c00da2a78667ecafa857a527bb71a4f0197659197ea28718e250b4a7c27fd62246a3af06799db53b3254d68f88d3fffeb2c8772752849e384fca011c8af8283af07ed75b8051a745ab9d38c3a1926931cad45daa1f495d6984e1f2311e4088c785fe41c5363c6d935fcb1ad80308c5b2feeb2268f3355828d305d130efdf0033b72086cf9f04df5763581917dca66985ecc26b0bdc933ea055b35c84d3f1c315276f9c8ba22125c2bc2fa0282094fb54cdba7803027cf96fa87d200d81b8a914024e384553d8a0d7376e3bb715188f85e709bff28fdac5b6bd35fcba5ed4a721754abc39ba907d9851a94729ae49379fa25d52e4b97a83b3a414db344a7a65c9252ecf8072da8b1cab9ebd3bcc6d2fd86ffcb4ba24b7ed070901f3dd35b73268d737f2a50c19070d94aeb2da6e0845db7c4bf344683ec798ec4b6df3c2dc160033bbd683f9c50df1524019fb88b4bd425e7162f6b923b9a1da2666042676f35486da83da07be7eb4dbfeecec90be960100c892ff9e17a8751cc509b801be9737a7e4c862c9001cc8601cc3e700e2fb14c5dbbcb8c55b757735d6c09d4695633f7e16163ba769c40a0526497f2f5e524d8a11e0b5916e04de41437771edfff825fbe7098f5745e6d59ce7513908a9f201ab72ab77d6d35bd66b3a989dfdd283b65272bb8814941afbc10c3e19f5f9e0753aec05724cb3b200fd3ad69ab8f6ccf523a05fe3cb2a296cb1157dcf02b5fbd15d9866b60c75efcb664299e239817e3423fd77971ae752df05e4dbed5794c6974b2d3df6e0e5a25c5cc6b6bfac642feac6b5516eba3d076e5bdf03ddc182b03efcafffce87ff0a2f3100f68f46491d7e500019e85da5d262f97f4d2276cb670ccae0f4027c8ed660048fa6ae6b67e1dda4afcf0c9d5353dbc9f255918b00bd4aff1e0c1ae768386b9361394ddf281dec929d363c0a6da121156d99622fafc62e13dcc0358404d248ecf85767c0b826d74bcbd617f1ff0163a95b1b7a7ab2b2f7111d50fdc5af6ebada6d18401808ddaa2132424b7bb62abe2f8552744466587079bd7e981b533570ae1d90120ab80f07e5d778a79372756f309e63f62fb44a9ab09ca36260c59ad1e9d123fe87abc9fd1f96deba8eac4c263aa2faaffac907663ee3f00671e09e0f14029f3ac2feb63ce20767f7865e7ef305a4f06408e303d24718990be83df0ac8236144e58264bd66dcc2f71a9131cb6cdef3bc3fc75228d7a04bb3da04aacdb63ec5c83daa8333f44bd85001b839c6b0fb66915b7b1425d2998f4384a65eb3f2637e6186ea200f006d6a106dff4598aacac5cc2029d6a7b5ef593f060c30f7b477c72c0d922034d0897b6c8f402b8ae47d8e4e72656b9269fdecb752f99741e29b3131c3912ea59dcd9801afee178ced69d551823131ca285deea07a6f12e6095ef229809a7a5d68690f82501df5e3a96f79dc0705c059918c68c0a159850b7b2a71050f528da4682ba2bfba7479a36b93b0a2ba87aad7570cb0db58de982b861d23ff7827e8059d9f96b059b8cdb5f1c531b9434a274f028e87ab3ab395f7c2edb3ea95bd4d92773a7fc653512aaa1c1ff06160453f8a96fd4823be698df83f967d174447ba9468bf19bd624f32ab2c03fdab418a1407f6c81b366e5bedff932c675167ae79b08137a07ae7551d3461f2a14a79a1fe1fca005a42905ea238a8aa23ca30b1f1bbb7b77def095322509fa949ee88b402fce2dfd993357cb63bc3ded87504e08345ed66fea69c982753d107f459f1df65ce977e8f46782374c0b300feb344040ffaf40bc1bf475471243ce2e525247d0d6b9b347c57d29d4274a33ed5f5d7996335165efdd7e0917fcfa13ce228b03a820eb64d2b8f1ab150175a4d17c22348524cea7b216886cb8a8b13eb346835edaeff91757918758d0fc8a7cac65264d43aa59c8a1900e2621a8901a92d26e5da66e8ac317095d2bd0e49473e5fd8dc2cd51173f4e8e10e833bf1925f317cb3e4ce1e7297bf80db6c2023fb45f799db2cedd2387d37939c564b1e59d222b7efa7ebae221ad86efec66fd557d33796dcee6f54ec9d0774d3c22a1f179c66538182dac96bf36b47f3b420d89f557187991bf7f738bb3fdb5b7f3377373a7033e0191655df7caa735ceb5c29b74f797b3411de763bf19eed35bdcc2f8b88dd2eed1abbb5ea5d3ac7bb884c359bf40ee2b744b1edf506910ba7fe2826f2218d5", &(0x7f0000000000)="bcd33031650d177d3525ad27eb5c9ded01fcc5e4edb6d223e4d712f9ea9f365128aaad91babd799a193ea1614c502b04b176", 0x1}, 0x20) 06:38:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8031001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1532.317453] protocol 88fb is buggy, dev hsr_slave_0 [ 1532.322538] protocol 88fb is buggy, dev hsr_slave_1 [ 1532.327680] protocol 88fb is buggy, dev hsr_slave_0 [ 1532.332796] protocol 88fb is buggy, dev hsr_slave_1 [ 1532.371512] FAULT_INJECTION: forcing a failure. [ 1532.371512] name failslab, interval 1, probability 0, space 0, times 0 [ 1532.384871] CPU: 0 PID: 8742 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1532.391752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1532.401113] Call Trace: [ 1532.403711] dump_stack+0x172/0x1f0 [ 1532.407364] should_fail.cold+0xa/0x15 [ 1532.411263] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1532.416372] ? __should_failslab+0x99/0x190 [ 1532.420705] __should_failslab+0x121/0x190 [ 1532.424943] should_failslab+0x9/0x14 [ 1532.428754] kmem_cache_alloc_node_trace+0x270/0x720 [ 1532.433872] __kmalloc_node+0x3d/0x70 [ 1532.437676] sbitmap_init_node+0x29e/0x510 [ 1532.441922] sbitmap_queue_init_node+0x40/0x710 [ 1532.446594] ? find_next_bit+0x107/0x130 [ 1532.450666] blk_mq_init_tags+0x119/0x2c0 [ 1532.454816] blk_mq_alloc_rq_map+0x88/0x200 [ 1532.459141] blk_mq_init_sched+0x20c/0x750 [ 1532.463389] elevator_init_mq+0xcd/0x160 [ 1532.467456] blk_mq_init_allocated_queue+0x1136/0x1570 [ 1532.472748] blk_mq_init_queue+0x62/0xb0 [ 1532.476810] loop_add+0x2dd/0x8d0 [ 1532.480265] ? idr_find+0x47/0x60 [ 1532.483726] loop_control_ioctl+0x165/0x360 [ 1532.488050] ? loop_add+0x8d0/0x8d0 [ 1532.491680] ? loop_add+0x8d0/0x8d0 [ 1532.495316] do_vfs_ioctl+0xd6e/0x1390 [ 1532.499210] ? ioctl_preallocate+0x210/0x210 [ 1532.503620] ? __fget+0x367/0x540 [ 1532.507079] ? ksys_dup3+0x3e0/0x3e0 [ 1532.510797] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1532.516342] ? tomoyo_file_ioctl+0x23/0x30 [ 1532.520575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1532.526112] ? security_file_ioctl+0x93/0xc0 [ 1532.530551] ksys_ioctl+0xab/0xd0 [ 1532.534011] __x64_sys_ioctl+0x73/0xb0 [ 1532.537918] do_syscall_64+0x103/0x610 [ 1532.541814] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1532.546999] RIP: 0033:0x457f29 [ 1532.550215] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1532.569110] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1532.576817] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1532.584082] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1532.591347] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1532.598613] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1532.605879] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 [ 1532.637475] protocol 88fb is buggy, dev hsr_slave_0 [ 1532.642585] protocol 88fb is buggy, dev hsr_slave_1 [ 1532.647753] protocol 88fb is buggy, dev hsr_slave_0 06:38:57 executing program 0 (fault-call:18 fault-nth:41): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r3 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r5, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r5, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r4, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r5, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r5, 0x80045300, &(0x7f0000000540)) getsockname(r4, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac031001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x0, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x800, 0x0) write$UHID_INPUT(r6, &(0x7f0000000b40)={0x8, "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", 0x1000}, 0x1006) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000080)={0x7fffffff, 0x77775f5f, 0x2, @stepwise={0x1302, 0xfffffffffffffffc, 0xffffffffffffffb4, 0xd2e, 0x1, 0x10000}}) write$smack_current(r7, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r7, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r7, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r7, 0x80045300, &(0x7f0000000540)) getsockname(r2, &(0x7f0000000ac0)=@pppol2tp, &(0x7f0000000500)=0x40b) 06:38:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x55) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'rose0\x00', 0x0}) r4 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x0, 0x2) bind$xdp(r2, &(0x7f0000000200)={0x2c, 0x3, r3, 0x34, r4}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) 06:38:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x1d9, 0x1, 0x17a]}) 06:38:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0032001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x0, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ioprio_get$pid(0x1, r1) 06:38:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x0, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4032001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1533.005423] kvm [8802]: vcpu0, guest rIP: 0xfff0 kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x1, nop [ 1533.056443] kvm [8802]: vcpu0, guest rIP: 0xfff0 kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x1, nop [ 1533.060905] FAULT_INJECTION: forcing a failure. [ 1533.060905] name failslab, interval 1, probability 0, space 0, times 0 [ 1533.096871] CPU: 1 PID: 8811 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1533.103731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1533.113087] Call Trace: [ 1533.115683] dump_stack+0x172/0x1f0 [ 1533.119330] should_fail.cold+0xa/0x15 [ 1533.119352] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1533.119373] ? ___might_sleep+0x163/0x280 [ 1533.128357] __should_failslab+0x121/0x190 [ 1533.128378] should_failslab+0x9/0x14 [ 1533.128396] kmem_cache_alloc_node_trace+0x270/0x720 [ 1533.128423] __kmalloc_node+0x3d/0x70 [ 1533.128444] blk_mq_alloc_rq_map+0xfa/0x200 [ 1533.128467] blk_mq_init_sched+0x20c/0x750 [ 1533.128493] elevator_init_mq+0xcd/0x160 [ 1533.140654] blk_mq_init_allocated_queue+0x1136/0x1570 [ 1533.140692] blk_mq_init_queue+0x62/0xb0 [ 1533.158125] loop_add+0x2dd/0x8d0 [ 1533.158141] ? idr_find+0x47/0x60 [ 1533.158162] loop_control_ioctl+0x165/0x360 [ 1533.158179] ? loop_add+0x8d0/0x8d0 [ 1533.158199] ? do_vfs_ioctl+0xca/0x1390 [ 1533.158215] ? loop_add+0x8d0/0x8d0 [ 1533.158232] do_vfs_ioctl+0xd6e/0x1390 [ 1533.197876] ? ioctl_preallocate+0x210/0x210 [ 1533.202305] ? __fget+0x367/0x540 [ 1533.205821] ? ksys_dup3+0x3e0/0x3e0 [ 1533.209554] ? tomoyo_file_ioctl+0x23/0x30 [ 1533.213794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1533.219335] ? security_file_ioctl+0x93/0xc0 [ 1533.223752] ksys_ioctl+0xab/0xd0 [ 1533.227208] __x64_sys_ioctl+0x73/0xb0 [ 1533.231102] do_syscall_64+0x103/0x610 [ 1533.235002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1533.240192] RIP: 0033:0x457f29 [ 1533.243386] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1533.262289] RSP: 002b:00007f83f2436c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1533.269999] RAX: ffffffffffffffda RBX: 00007f83f2436c90 RCX: 0000000000457f29 [ 1533.277273] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1533.284539] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1533.291805] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24376d4 [ 1533.299078] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:58 executing program 0 (fault-call:18 fault-nth:42): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) r7 = socket$vsock_stream(0x28, 0x1, 0x0) getsockname$packet(r7, 0x0, &(0x7f00000001c0)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8032001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:58 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2000) setsockopt$inet_mreqsrc(r0, 0x0, 0x2d, &(0x7f0000000040)={@multicast2, @local, @remote}, 0xc) connect(r0, &(0x7f0000000080)=@rxrpc=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e24, @multicast1}}, 0x80) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f00000001c0)={0xe8, 0x8da6, 0xffffffffffffffe1, 0x9, 0x8, 0x1}) getpeername$netrom(r1, &(0x7f0000000200)={{0x3, @netrom}, [@rose, @default, @default, @bcast, @netrom, @netrom, @remote, @netrom]}, &(0x7f0000000280)=0x56eba8a5d5c10e7d) ioctl$RTC_AIE_OFF(r0, 0x7002) ioctl$FICLONE(r2, 0x40049409, r1) ioprio_get$pid(0x0, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000100)={0x101}) 06:38:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x277, 0x1, 0x17a]}) 06:38:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x0, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac032001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x59, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) getpriority(0x0, r1) ioprio_get$pid(0x1, r1) fstat(r0, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xad6, 0x8, &(0x7f00000016c0)=[{&(0x7f00000001c0)="ab7d4ea55aebd69653d8eb7c2db84f0aede1be8c2083154d25af41cc8e06838f6e289fb839cf7994cfaea1dc5242b7241e77ed26555ae06018b3a35957441f049384faf8b6f91a7c8ed4c11cb8cd575f7ec62130790961379c508c3333140255bd93377821f0ade5bdfe00c84693ec0428063c6657eabb8da20d09d9391bf0fc8b444cfd60bcb934a72e942f643d989bbcfbca2b4eace10b7ff20b827b6375647a8930542037f28c78d70de419bc13eb482690fc26de0e074f6d1f87d608d70adf34eebadd6e792a40c2c5fbd6c84c26b3fcb3dbd297faee3ed26929ff55f21e41", 0xe1, 0x7}, {&(0x7f00000002c0)="f98bbdf86a3690f027a85accbf7af614aabdcdef0f479a78ed3a6d12da1d0a4dabeb97a28021a1d210c0644cd485cb0c97bc3eb4035dbddbe8d44eb140b4a4170b896d9159346d1190ada88130203c303913619fb0060059950aa147dc3bca978469779f3a150ac43f3ff44698fb2447ba7847bcf128a1fa7caa9b5419c37d9aef5862ff4f0c7797735c5f2f6e63e2986645a59cd9f3d908b92378cfb07f177dec0b529c5478a7d62705e99f0f6d07cb1276e2458b59cf3ed1868a3a42c7a377b61da58ceb3effea0923b672", 0xcc, 0x2}, {&(0x7f00000003c0)="7c5ef8043867d2b1f464dfdaee870b947e753c8b5b0159492db24b86419b231ba5ad55dfad979410b4081ba2b4716541f42cfedaad85c59bdad30c1076e49f8b9797be914d463a10bbb4292fea5a331ab93f782beca11e78aab9e24344aa427e6b30276e50eaf8621e39d45c66a13df752f8421186c185fdaad06894e4f819573c9b65bd560fb304feea5b3966ba0e887aaa9b38f422", 0x96, 0x5}, {&(0x7f0000000480)="4a6d9e2853edf7b6428de54e316f92781fa5f4757441338fdb3a36bbd72e10a24a3025f105d29ce6c0121499ffe8f8b1460722f7de9018f77fa649ce2a91e02f308f65a9e0747c3b5b21fe9f9829e9959fd4929a12e2b84e04f3b60444a3ff3fc84250d9a0ee94bd7e409cd8626fc3f3e88207dd104afc2c3ea43808df1f6d7cfc90e4cd99663816a04e56aae96b7f2e702f527fe345f19ba962bf5e61ea2722a77de8bc58a1625536b619bb11c599884df284a454abaad973d6363699c2317f5879bbf1c117820b2190d85618320c8307703e54337d4e224d9ed435b534c29a390a66f7a7ea60530c96814e805b348d70b611c2722c56e4ff697fc378e06fe42388fe97c24514262e90c8f8d4087cba28e1101e4af4c00876a6dab9d3fc7c29355e5af8d2311d1b642aeb76707c451c2bb8c27e2673e42c94689444b93b1831c5a8a6d2fedeeaae0121ee260af4296498a72f9fbfeb39bc7b4f67969bbd71a30ee79084c2b4dd34f8a047d0c7c13eee982b42a0e517850719de700b3b450829388e1ee0d1e952b650b773e988f69c59884f2d3946413d5f1c89ed6617f13692a45275ded9b384c322339d02260461de3f4c09d4fb588c6c78ed28db9a47af1ac8e46ee29d58e311ac25cb9a1674b1b88aecf7312d4d7384646bbd8ba19f74a8a72316ebaa122ae5b65d53dd5158e934007aff93f58298e619a771545b90d1192dfc4ea98104799c1e0f2533eda8cbca183e413e10ed32b544a73a81da174d27fda64d4146b845ab00d9c5148e30631d662cb0533ae3b7dfa161d4bcdf04613e3583f55ee4e3c9f3df98667ea0f3a2d3404d23516e37d20c631fd7ed55193173d137cf828db6a17b4a609e99062d369149035d04c6f643b96e2f5b1ffed863891fbd1c487382fe451a2e776ff333f74e315a86fd71e9e1d25c9a859d7b6825cce9eef90dadc37c98811a28868f0087d66637ec87c1910188b6d838e1a525432a219025a9c28f150aac15c58b4b5d3b989ccfc27e2c9a8522b6e52daaba83f1ae496fba9197656313d2bb15a7f621cde4d8faa3f9319cadd34776bcb4c7787b90b2e837573458d7cf9c32628319f4191f0bb1a1a2542bdeed735546bff61f272343d32f035593f953451dfe53b3e79b55983bfb80be94db9249d40e7b4851ca9d28cd24583d9b37c47522af55171492d2f54646678a3ac8c95d5e5cdf5f10d8c65b3ee5e696825d019d2b17acf6d2d45955e2551a774ebf18212419719682576bf0a4fb2f36e311a7e35aa6cc9b43f48f42e13c43bb57ae92aeaf7331ab0b65bcf7d82d84db5b97e3f34bc09092a4cdbe74198eb8f9e77ff8e8e9b1c44301a495bef7bcaf3c9ec6fa29fea900a3e413db5563300bc147972ee91d2001d053877326bbb093687f50d6da29cfb6a056dd7afe76a900d2d5c5809cc0212c992db372364dd87cadb55fcf07e478e3b82957bbdcbbbc32afc1c450bcc50efccac90fe1047a933efb383d8a123fef5c33a8d7b20f3b045c50c8185dbe03a89ff3278f4379ae27a593e87991f09cb15fd43185ca18276019dad682506be6760be5e92dbfce43f0c76b04d7e6d8829249872adaf0059d7cf5d4c938a2a9d8acf2c344fad200a2239bd3bcf9bff1e738a7a2f99fbe98a0f73613eec2b308b81685d0fd822a13373f2026854b8d2b152e13254edea6091b299cbbae68fa02cb3816aac4189ff5449c1b6f9b62c9588682b8f17992ee981bfc82a57f573529851ea7d8076d329972aca38dc08db25d618d1435c7a2b9ceacb8217d4952ad7060c74a1fc623c768f78457c34f6d469bc546b02d20031aa923d5990dae3e16a83fc61e08fb53784b02657ec2c5cc71658250595a0561acb1c6f8c0d9815bf36f40e9a9df25562022cacc9cc2b4dbea18d4ab9ec0c00c683d1ca8594140bcc107ad5079d84fc238b34f7f9572b2a51e83ce6990ffff0838706fe645f349f14b3c1f428868af4e1ec434a1d289cd1c7ec0a72b60d95f99920dfc23e130ae4f4294ff6281f96d97c78bbcf935d14ab237d5b80d2e9962cf7770599fca5bee4ea9ec87f48d24fd153ae4ef01c01e19b005261a772ee87e1e6d814b5e136a2eb384ed72f8183a48e48292944a3265b7273b90d051b9ebcd96b014d5b568fb3c533c61d09239209a839991fc31947c142c46f931f05aefec8597e0f6b07d3e4347552f4d8989b1d2b5c21166d21138d4a96814513f69031cd7a8dc7b0e27c659f4b58f868320ade2798867615961402a57351d3ef68a00bda05497ccca9e71873478ab390044cc733242b51698550fa110c4a6809008a22f0a9ff36f812e56360261e491cb34590fe10cb204aee17d30d4038a2b7b753040625e59c991f19aa12adb8268461f8868a2134135a1b6caaa3f40df465f36b37e37afefecd5d40b549b1d1e4cc4f217c6219dbb61200ace32d5272c7ed17bb8feee1ad861e4d58957bb59ddd30c3b72e3501e0fa5e731d063eea46b26199a12d9067d2389ca5e21286a30f3a75521b76df7a9e754f6dced47ca7e518fe4b787fe418db5bb98ec43e50f2f1231479a1f078b7bdc7c122018a00c9fdbb2057b0344c04edd0de877919009d3ed32f91870714f711a891f9ce7540c51161c9ab8e84f9b48351f83d6aa92d7c895e58915512484084c1b238eeedfced03ef1ea2e64d08edc658bafa6044eb7b9036d9f9904f5a856a159ed44f423a867e334eb2539bbbb92d2abc58763d924434373d55b9b87618528266554a5768b43af2d0707df94d1e02fe98ee3f7876b47ed2fbf378675b6ebff6e814786b0731eec87dcc4f220ff920da1a61454c07d11466e073a2b061db24f79336da3a6d67b010933e59b0c755e1a328717e01fa682a4cda81307a9a192391cbe9ca9d35f40e800d5ef8386e56803871e51ca3cf0b606451d08b59c39257cb67bb606f3ea36498a6030193d750dc73a8f7c4ecc24fa11d3cb3fc4e8c652e328404e2fb8cb9aa33eece4e607216447d0f11bd83a906d22a955ba536ce92c4466b400ebd7d9d1f9863f7901d7bc64fffc9862d13535fe1dc87b9c001a929f42389ce87badb6cc0a43d6a2b6dc9e85d1b080b49de8d837ee67559808b34422f42c0c05b1ba0e418239fed6183bdcf851f3c5d7dcdaef377db072d47b11d786f6c73e9e85074b12c87e3862679014aa5a819dd87e881257b0b7bb36d3d32cb297bb83244428c3073dc2e4377a8d64767be16ace0ecd8158e44828bb4e3e1fb693bce851c1205f85c903035b913f59907e0ff0c9f044f17d8dadf3edb5a524a0ca2492ed84a0631c35d7c1d507a3b71186618c050ec14dc80956c5d313695c84b2ae6c5fe03d7090212b6edd19cb65eadbae87627699e8be41f85fa452deb109b83eacdf62a2b9e1fc0661ddb994f99ee7dc53f7e5fb06eb0241205f818d5398e0121cb103ddd510b023447ee1c06970ad2bb02e788480a3ff045c4713064db90ef14c6708a939ef54891f3de7a3fb79427703b7988982a4260c4f50fa9d4428137581b3b6aaab2d2868ded6a409ee3c12a66e43ec3cc14f7f68183d570fe6b60348c591fb27f0f68b9bddf5f18e65ff5d5c42e6fd686c077b131d7fbedc128d9de13510449a113085ec4f084f1f1e4fa022a0e0d92d684db5883b89d0482a59ffff57767a6363dd056971e50db53731427038e6ad02b2aa8a3c11eddc2555068bbacf2fabe43d4ed13c3c61df89c877b739c64c7f86c0155dc93e7587bb5d9e069a4a3035d6dad1bf16e8e32a3746b490d790771b5259bf271a0f167af3ba7655639359ebd03150756372399df69b1ad2708f6b7d28d8e7e47c620866a7134c98ee7adfe6431f24e1ece8424f346a9589ff0c24a298175b99a94472a9d1cf3fe0f678ef8e725a7c2b66855127b6014425acd753e9eba9c9f6a305def136a93175ae8ee9f0a209cc93560ace19f695b86684fc6379d45edf5de034e5a835b15a2b6a62f4a10caaef417ae936ba9bd4648062b812eb34d18ee0f7c0cb1927a61417dec125e7254030ccedeaa21ae5f385da9cd8d5ff8dba1395c09f44b93967ceedc6947c0f710aef6c6e748c7a419cd1e7f688defd2c3d2297faf88b9fff3f5c34a08b876cdf0c89196124d0b4e14bdbadf7643b752754677eb2049d884fd811d822c414187e6f8f96e9ef17ba310541d8e169a11b38983aa63b3686a3f97b4ec93fd06fa9eeb8f912535a7cd3cc92effa2050f079cf02601d40903a20003e22d335de6fc75b7a1462fa87fd07a36fb71b33ed5dea955d5dbe4bc507df7a4ee256415eda31befc5aec3a22e69f5aa6575c25dd066e714608d0ef9e1ed467afa3aab2ec040db3c3b3687c1d1c88a4aff3d12f21fb7d24b1d0fc90cae3d3ffc3e8d902156ebc9661faf7bece64d50863b8ba8522ad62a974c099e42a42b2019bf7cd9f2dd3fcf08346af72b691d31e38c42b30ad92e57c79850289ee33688dce39b21d07cd780e5dc20fe60248abbe4fe07fd58065b5d52dc11154ebf519df3a4adb046ede9fd80559d1ef981153c0811b8110097216ca29facca8d6cb3c103790fba711158659876a76e39c160f6c7133888f8b4ff6690315c251c8e137316a9989455186c753a1c2770524bb7267b5cef963adfac2211aa12e711101f1c11ac41bae8dd82d1be5d3c0318562fe7a952153e6addb0309a5e1d64f42888eb2a63f45d704c44a8d9527f5b831ed533efc38a3b7d78e9c240e5c5dacefc7ed58e38fea491eb06dd7a1dc3782e2f199d543e895b156fe5a6660589dfc9dbf9b7e39d967496f12506c750716a3b2443847ba027bca02a7a75bcfe026e4585ec78478642f8d244e9e8f6cbaffecbfa9ce3df14f9b6a2ff2014a9d3dbad0b21c6f52d266bf40fb688af506f9affcf606da0d6415e7b3da6e6b5aec9a1a7134514bba8e6ee2168d19e421ba95694034510cd8e11f8683850e42c37c1e646f6e3c164fc8a6d31417f82e02f21c77e7227dc3830d1890ed81c6ad1cbb20747ba2ac0b4b788df1be77c57931b0b18a1d89cb32f602f2a68450a911c5568c0ef7b7295c79c95e60235556cabb03b83430cb165420a1a16096c87d934cedb26886f352ed9161cf6e82269fea16387057e4aaf76a5d0fffc3d8a70845cb355f28fc89c16ce8b7992af38c87bd56c04c92bfe23d1a42d596fe444fdd84967445f7b5c287abe7ea64b568ce0f5a6b0e375d4400e00376784a935188a1734f60684bc9cf93a89226cb52b1d9ec89634494fc89348724d30a8dece1ee5d11ffb59fddda3ea908760431b41587d75eeea19b0dd0020770837fb99e8fa873955da6bd1e57749ddedb11933d8d50fe1d9f868b0567b71afa652f477b5379cdcd5bc4047163dd3c5cfecee81dffcc219fb2768c100d8cf66c8c67fa9efa308e8fa22c7d5961e9c6db6a86fd99b89ad7029930cd70ab0dc795ceac51eeeb724cbfcdd1c60afc120347bfb92be6b11c8fd1350e64b78c4166baa3605a321c7ce8c004b866e268e59bb885212bae50b1d5242b9ef690ad5f873c02090a7fd7cf8f916337969bd54870f0c0821a6d0209996b1abe6afe29a215c5a7208d1b8df66b3469c76be44d0bee39e6066294b101f579142c97ea2dbb6968eb7abb7ca8b03352e9bbe2909a49d0055eac72d65bf43fc98606cc42901e76f0c27980fcb7bc2e332ecfc77f652fca8ce9e8ae47c2de47030217a6a9de0043dbd02aadfe6c805248bbdd415bb883266ccdccee8876bb03c2d35573006869b849c013b69cf86d377b8b4d90fd445fd7b0fbfb49", 0x1000, 0x1}, {&(0x7f00000000c0)="95be8eb2f59ebd890d811fc6dc9a7eb8943cdfe724165d75806505e4a14eb2ea48ad2c7ad58754d84a186777caab8d5583df5a384cb133", 0x37, 0xb0}, {&(0x7f0000001480)="43846c331891bb77c8b0fef9c29b7ab7aded48d7bc010560692dd52e994a951b6cc667ec9d909261e2b135809de659cd26f0f17b90a626768e0f422ce0826cda1e508e44764b49e5c93a3cba47c1ae74549474ef28521f84a4af09306e8a12364da273d86312dbf5aab7263978d53ecbfe810417c95eda272fe8cac7179942652d0c8046324104347bffd0645196646a63707971a9d5019c7c5fd7590ab58d50d9cb903fa8f9775ab8d076d4cd027872324d3f11712e", 0xb6, 0x3}, {&(0x7f0000001540)="261c275a61004cd05b30b599d8b9a0a972560756ed322c91d0b050c69bd21de47b210abefbf3f9e28946a5f0d4dfd2b2fd12b65cab8b68d6d4563df549e489177d211966916c51a5d9182dcf4c4939719746ef10a46e320f8218b911804ad5fc5ccb472758fb0f6c8bae564e55a022ee671b5b2668d96b335d4abd4893cdc552d2f5be85b2325836330781a9aa8c2aede53bd3bc873529fdfb6d74931aeb11de725fa50502f4fb2b2a5b2a047c7e98c1d1c1a9d123ebe3c82495f662adc0c0a49293a9c927241adc717e68", 0xcb, 0x400}, {&(0x7f0000001640)="7a176f7f194767c92d01c6dd66c3fb55902be3d9944fbc19240f0aacf47070e07414604506a5ea3114c4b59e530945b5c36bb60133a8ceee80885303f9f6e4a7bf91cad8b943defc5c", 0x49}], 0x10000, &(0x7f0000001800)={[{@balloc_notest4='block-allocator=notest4'}], [{@obj_role={'obj_role'}}, {@dont_measure='dont_measure'}, {@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r2}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}]}) 06:38:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0xfffffffffffffffd) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x0, 0x8, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:58 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000080)={0x1, 0x1}) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x7, &(0x7f00000001c0)=""/217) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000100), &(0x7f00000002c0)=0x4) ioprio_get$pid(0x0, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f00000000c0)=0x2, 0x4) 06:38:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0033001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1533.956501] FAULT_INJECTION: forcing a failure. [ 1533.956501] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1533.987956] CPU: 0 PID: 8861 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1533.994825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1534.004182] Call Trace: [ 1534.006778] dump_stack+0x172/0x1f0 [ 1534.010402] should_fail.cold+0xa/0x15 [ 1534.014279] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1534.019372] ? ___might_sleep+0x163/0x280 [ 1534.023515] should_fail_alloc_page+0x50/0x60 [ 1534.028067] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1534.032736] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1534.037741] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1534.043319] ? find_next_bit+0x107/0x130 [ 1534.047379] ? __cpu_to_node+0x7e/0xa0 [ 1534.051259] ? blk_mq_hw_queue_to_node+0xf1/0x140 [ 1534.056090] blk_mq_alloc_rqs+0x223/0x7f0 [ 1534.060229] ? __kmalloc_node+0x4e/0x70 [ 1534.064205] blk_mq_init_sched+0x266/0x750 [ 1534.068438] elevator_init_mq+0xcd/0x160 [ 1534.072486] blk_mq_init_allocated_queue+0x1136/0x1570 [ 1534.077778] blk_mq_init_queue+0x62/0xb0 [ 1534.081837] loop_add+0x2dd/0x8d0 [ 1534.085278] ? idr_find+0x47/0x60 [ 1534.088738] loop_control_ioctl+0x165/0x360 [ 1534.093079] ? loop_add+0x8d0/0x8d0 [ 1534.096714] ? loop_add+0x8d0/0x8d0 [ 1534.100349] do_vfs_ioctl+0xd6e/0x1390 [ 1534.104241] ? ioctl_preallocate+0x210/0x210 [ 1534.108663] ? retint_kernel+0x2d/0x2d [ 1534.112552] ? tomoyo_file_ioctl+0x23/0x30 [ 1534.116785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1534.122329] ? security_file_ioctl+0x93/0xc0 [ 1534.126737] ksys_ioctl+0xab/0xd0 [ 1534.130183] __x64_sys_ioctl+0x73/0xb0 [ 1534.134061] do_syscall_64+0x103/0x610 [ 1534.137951] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1534.143199] RIP: 0033:0x457f29 [ 1534.146384] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1534.165320] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1534.173017] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1534.180271] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1534.187538] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1534.194804] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1534.202062] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:38:59 executing program 0 (fault-call:18 fault-nth:43): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:38:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400}) write(r2, &(0x7f0000000480)="006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0xfffffffffffffec2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r3 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r5, &(0x7f00000002c0)='vmnet0\x00', 0x5) fchmodat(r5, &(0x7f0000000080)='./file0\x00', 0x80) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x8, 0x0, 0x0, 0x81}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f00000001c0)={r6, 0x81}, 0x8) ioctl$RTC_WKALM_SET(r5, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r4, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r5, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r5, 0x80045300, &(0x7f0000000540)) getsockname(r4, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x2ff, 0x1, 0x17a]}) 06:38:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4033001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x0, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) 06:38:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8033001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:38:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x0, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:38:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x4, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:38:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:38:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x47f, 0x1, 0x17a]}) [ 1534.617172] FAULT_INJECTION: forcing a failure. [ 1534.617172] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1534.666668] CPU: 1 PID: 8906 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1534.673554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1534.682918] Call Trace: [ 1534.685529] dump_stack+0x172/0x1f0 [ 1534.689280] should_fail.cold+0xa/0x15 [ 1534.693190] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1534.698306] ? ___might_sleep+0x163/0x280 [ 1534.702456] should_fail_alloc_page+0x50/0x60 [ 1534.706939] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1534.711686] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1534.716697] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1534.722230] ? find_next_bit+0x107/0x130 [ 1534.726330] ? __cpu_to_node+0x7e/0xa0 [ 1534.730227] ? memset+0x32/0x40 [ 1534.733507] blk_mq_alloc_rqs+0x223/0x7f0 [ 1534.737676] blk_mq_init_sched+0x266/0x750 [ 1534.741978] elevator_init_mq+0xcd/0x160 [ 1534.746034] blk_mq_init_allocated_queue+0x1136/0x1570 [ 1534.751311] blk_mq_init_queue+0x62/0xb0 [ 1534.755435] loop_add+0x2dd/0x8d0 [ 1534.758929] ? idr_find+0x47/0x60 [ 1534.762386] loop_control_ioctl+0x165/0x360 [ 1534.766695] ? loop_add+0x8d0/0x8d0 [ 1534.770328] ? loop_add+0x8d0/0x8d0 [ 1534.773963] do_vfs_ioctl+0xd6e/0x1390 [ 1534.777848] ? ioctl_preallocate+0x210/0x210 [ 1534.782253] ? __fget+0x367/0x540 [ 1534.785776] ? ksys_dup3+0x3e0/0x3e0 [ 1534.789499] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1534.795036] ? tomoyo_file_ioctl+0x23/0x30 [ 1534.800597] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1534.806133] ? security_file_ioctl+0x93/0xc0 [ 1534.810545] ksys_ioctl+0xab/0xd0 [ 1534.814002] __x64_sys_ioctl+0x73/0xb0 [ 1534.817892] do_syscall_64+0x103/0x610 [ 1534.821797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1534.826995] RIP: 0033:0x457f29 [ 1534.830181] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1534.849087] RSP: 002b:00007f83f2436c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1534.856810] RAX: ffffffffffffffda RBX: 00007f83f2436c90 RCX: 0000000000457f29 06:38:59 executing program 4: clock_nanosleep(0x2, 0x0, 0x0, 0x0) clock_nanosleep(0x2, 0xb8ef9e4c5c28237b, &(0x7f0000000000)={0x77359400}, 0x0) [ 1534.864089] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1534.871353] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1534.878618] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24376d4 [ 1534.886176] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:39:00 executing program 0 (fault-call:18 fault-nth:44): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:39:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac033001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:39:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x0, 0x7, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:39:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r0, 0x8) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000340)=0xffffff42) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000080)={0x4, [0x999, 0x100000000, 0x7, 0x76]}, &(0x7f00000001c0)=0xc) [ 1535.135493] __nla_parse: 13 callbacks suppressed [ 1535.135503] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:39:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x0, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:39:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x480, 0x1, 0x17a]}) 06:39:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0034001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:39:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x4000, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) memfd_create(&(0x7f00000001c0)='ppp0[*\x00', 0x2) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000800)=""/79) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) [ 1535.369925] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:39:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4034001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1535.420497] FAULT_INJECTION: forcing a failure. [ 1535.420497] name failslab, interval 1, probability 0, space 0, times 0 [ 1535.472529] CPU: 1 PID: 8956 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1535.479392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1535.488746] Call Trace: [ 1535.491350] dump_stack+0x172/0x1f0 [ 1535.494991] should_fail.cold+0xa/0x15 [ 1535.498898] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1535.504010] ? ___might_sleep+0x163/0x280 [ 1535.508164] __should_failslab+0x121/0x190 [ 1535.512404] should_failslab+0x9/0x14 [ 1535.516205] kmem_cache_alloc_node_trace+0x270/0x720 [ 1535.521323] ? memset+0x32/0x40 [ 1535.524616] ? loop_init_request+0x25/0xb0 [ 1535.528858] elevator_alloc+0x7d/0x170 [ 1535.532764] dd_init_queue+0x25/0x440 [ 1535.536568] blk_mq_init_sched+0x3a2/0x750 [ 1535.540814] elevator_init_mq+0xcd/0x160 [ 1535.544878] blk_mq_init_allocated_queue+0x1136/0x1570 [ 1535.550171] blk_mq_init_queue+0x62/0xb0 [ 1535.554240] loop_add+0x2dd/0x8d0 [ 1535.557711] ? idr_find+0x47/0x60 [ 1535.561186] loop_control_ioctl+0x165/0x360 [ 1535.565507] ? loop_add+0x8d0/0x8d0 [ 1535.569140] ? loop_add+0x8d0/0x8d0 [ 1535.572782] do_vfs_ioctl+0xd6e/0x1390 [ 1535.576672] ? ioctl_preallocate+0x210/0x210 [ 1535.581098] ? __fget+0x367/0x540 [ 1535.584552] ? ksys_dup3+0x3e0/0x3e0 [ 1535.588278] ? tomoyo_file_ioctl+0x23/0x30 [ 1535.592515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1535.598051] ? security_file_ioctl+0x93/0xc0 [ 1535.602464] ksys_ioctl+0xab/0xd0 [ 1535.605922] __x64_sys_ioctl+0x73/0xb0 [ 1535.609817] do_syscall_64+0x103/0x610 [ 1535.613713] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1535.618905] RIP: 0033:0x457f29 [ 1535.622097] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1535.640996] RSP: 002b:00007f83f2436c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1535.648714] RAX: ffffffffffffffda RBX: 00007f83f2436c90 RCX: 0000000000457f29 [ 1535.655995] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1535.663264] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1535.670533] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24376d4 [ 1535.677801] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 [ 1535.712896] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:39:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x0, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:39:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000a40)={0x0, 0xfff, 0x1, 0x80000001, 0x97, 0x4, 0x3, 0x1, {0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}}, 0x2, 0x3f, 0xfffffffffffffbff, 0x7, 0x80000001}}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000500)={r4, 0x9}, 0x8) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r5 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r7, &(0x7f00000002c0)='vmnet0\x00', 0x7) ioctl$RTC_WKALM_SET(r7, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r6, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r7, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) shutdown(r6, 0x1) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r7, 0x80045300, &(0x7f0000000540)) getsockname(r6, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:39:00 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={r1}, 0x0) 06:39:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x491, 0x1, 0x17a]}) 06:39:00 executing program 0 (fault-call:18 fault-nth:45): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:39:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8034001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:39:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x0, 0x6, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:39:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000080)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100028020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r7, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r7, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r7, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r7, 0x80045300, &(0x7f0000000540)) getsockname(r6, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:39:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac034001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1535.956453] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1535.988511] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:39:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x0, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:39:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x4d0, 0x1, 0x17a]}) [ 1536.076243] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1536.077276] FAULT_INJECTION: forcing a failure. [ 1536.077276] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1536.089273] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1536.120128] CPU: 1 PID: 9003 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1536.126983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1536.136338] Call Trace: [ 1536.138970] dump_stack+0x172/0x1f0 [ 1536.142622] should_fail.cold+0xa/0x15 [ 1536.146525] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1536.151640] ? ___might_sleep+0x163/0x280 [ 1536.152114] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1536.155810] should_fail_alloc_page+0x50/0x60 [ 1536.155829] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1536.155844] ? mark_held_locks+0xa4/0xf0 [ 1536.155864] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1536.155882] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1536.155902] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1536.192920] ? find_next_bit+0x107/0x130 [ 1536.197045] ? __cpu_to_node+0x7e/0xa0 [ 1536.200948] ? blk_mq_hw_queue_to_node+0xf1/0x140 [ 1536.205808] blk_mq_alloc_rqs+0x223/0x7f0 [ 1536.210026] blk_mq_init_sched+0x266/0x750 [ 1536.214288] elevator_init_mq+0xcd/0x160 [ 1536.215248] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1536.218366] blk_mq_init_allocated_queue+0x1136/0x1570 [ 1536.218403] blk_mq_init_queue+0x62/0xb0 [ 1536.218423] loop_add+0x2dd/0x8d0 [ 1536.218439] ? idr_find+0x47/0x60 [ 1536.218460] loop_control_ioctl+0x165/0x360 [ 1536.218476] ? loop_add+0x8d0/0x8d0 [ 1536.218498] ? loop_add+0x8d0/0x8d0 [ 1536.218517] do_vfs_ioctl+0xd6e/0x1390 [ 1536.258695] ? ioctl_preallocate+0x210/0x210 [ 1536.263139] ? __fget+0x367/0x540 [ 1536.266599] ? ksys_dup3+0x3e0/0x3e0 [ 1536.270319] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1536.275881] ? tomoyo_file_ioctl+0x23/0x30 [ 1536.280132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1536.285682] ? security_file_ioctl+0x93/0xc0 [ 1536.290110] ksys_ioctl+0xab/0xd0 [ 1536.290151] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1536.293573] __x64_sys_ioctl+0x73/0xb0 [ 1536.293596] do_syscall_64+0x103/0x610 [ 1536.293621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1536.293634] RIP: 0033:0x457f29 06:39:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0035001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:39:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4035001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:39:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8035001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1536.293650] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1536.293658] RSP: 002b:00007f83f2457c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1536.344901] RAX: ffffffffffffffda RBX: 00007f83f2457c90 RCX: 0000000000457f29 [ 1536.352158] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1536.359420] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1536.366689] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24586d4 [ 1536.373963] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 [ 1536.477479] net_ratelimit: 17 callbacks suppressed [ 1536.477487] protocol 88fb is buggy, dev hsr_slave_0 [ 1536.482530] protocol 88fb is buggy, dev hsr_slave_1 [ 1536.492707] protocol 88fb is buggy, dev hsr_slave_0 [ 1536.497853] protocol 88fb is buggy, dev hsr_slave_1 06:39:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000080)="360f20990f20c06635000001000f22c00f20c06635100000000f22c0dfac0b000fc7280f01c90f01d50f01667966b90b0200000f3266b94c0300000f32", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:39:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac035001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:39:01 executing program 0 (fault-call:18 fault-nth:46): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:39:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) ioctl$IMADDTIMER(r6, 0x80044940, &(0x7f0000000080)=0x2ee0228d547ecf59) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:39:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x0, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:39:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x560, 0x1, 0x17a]}) 06:39:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0036001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1536.797430] protocol 88fb is buggy, dev hsr_slave_0 [ 1536.802540] protocol 88fb is buggy, dev hsr_slave_1 [ 1536.807710] protocol 88fb is buggy, dev hsr_slave_0 [ 1536.812765] protocol 88fb is buggy, dev hsr_slave_1 06:39:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x0, 0x1, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:39:01 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) pipe2(0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e22, @empty}}) ioctl$VIDIOC_S_FMT(r0, 0xc0cc5605, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) io_cancel(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000300)="3819c3b57c3715d7940261bd", 0xc}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0xaea3, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 06:39:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4036001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:39:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x561, 0x1, 0x17a]}) 06:39:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8036001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:39:01 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) 06:39:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x31b, &(0x7f0000000300)=[{&(0x7f0000000800)="90ce308091eebf6e98a94e3dbc2b41403a1b4cfb507bb9a64861cbe5870f0717c1b24069167000a915eef7eda5366f73b60a397381f4c2d711fe29e521fc7388221986daba75757e40f39c7ab05dfc618c6ef7635791b90fa01b12dc9bf839", 0x0, 0x9}], 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) [ 1536.986919] FAULT_INJECTION: forcing a failure. [ 1536.986919] name failslab, interval 1, probability 0, space 0, times 0 [ 1537.004850] CPU: 1 PID: 9050 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1537.011716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1537.021076] Call Trace: [ 1537.023696] dump_stack+0x172/0x1f0 [ 1537.027365] should_fail.cold+0xa/0x15 [ 1537.031264] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1537.036375] ? ___might_sleep+0x163/0x280 [ 1537.040543] __should_failslab+0x121/0x190 [ 1537.044813] should_failslab+0x9/0x14 [ 1537.048616] kmem_cache_alloc_node_trace+0x270/0x720 [ 1537.053719] __alloc_disk_node+0x70/0x420 [ 1537.057874] loop_add+0x3aa/0x8d0 [ 1537.061339] ? idr_find+0x47/0x60 [ 1537.064818] loop_control_ioctl+0x165/0x360 [ 1537.069128] ? loop_add+0x8d0/0x8d0 [ 1537.072795] ? loop_add+0x8d0/0x8d0 [ 1537.076421] do_vfs_ioctl+0xd6e/0x1390 [ 1537.080318] ? ioctl_preallocate+0x210/0x210 [ 1537.084744] ? __fget+0x367/0x540 [ 1537.088227] ? ksys_dup3+0x3e0/0x3e0 [ 1537.091942] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1537.097926] ? tomoyo_file_ioctl+0x23/0x30 [ 1537.102168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1537.107707] ? security_file_ioctl+0x93/0xc0 [ 1537.112104] ksys_ioctl+0xab/0xd0 [ 1537.115547] __x64_sys_ioctl+0x73/0xb0 [ 1537.119439] do_syscall_64+0x103/0x610 [ 1537.123350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1537.128539] RIP: 0033:0x457f29 [ 1537.131718] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1537.150621] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1537.158347] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1537.165622] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1537.172886] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1537.180147] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1537.187419] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:39:02 executing program 0 (fault-call:18 fault-nth:47): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:39:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac036001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:39:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x0, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:39:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0037001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:39:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x570, 0x1, 0x17a]}) 06:39:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x0, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:39:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x0, 0x1, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:39:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r3, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r4}) write(r2, &(0x7f0000000480)="240000001a0025e1006bb482b149308e81b104fe", 0xff6c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r5 = accept4$bt_l2cap(r3, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r7, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$TUNSETLINK(r7, 0x400454cd, 0x207) ioctl$RTC_WKALM_SET(r7, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r6, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r7, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r7, 0x80045300, &(0x7f0000000540)) getsockname(r6, &(0x7f0000000800)=@pppol2tp, &(0x7f0000000080)=0x22) 06:39:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a4037001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1537.677432] protocol 88fb is buggy, dev hsr_slave_0 [ 1537.682587] protocol 88fb is buggy, dev hsr_slave_1 06:39:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x571, 0x1, 0x17a]}) [ 1537.740788] FAULT_INJECTION: forcing a failure. [ 1537.740788] name failslab, interval 1, probability 0, space 0, times 0 [ 1537.773837] CPU: 1 PID: 9122 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1537.780699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1537.790055] Call Trace: [ 1537.792634] dump_stack+0x172/0x1f0 [ 1537.796257] should_fail.cold+0xa/0x15 [ 1537.800135] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1537.805250] ? ___might_sleep+0x163/0x280 [ 1537.809398] __should_failslab+0x121/0x190 [ 1537.813624] should_failslab+0x9/0x14 [ 1537.817416] kmem_cache_alloc_node_trace+0x270/0x720 [ 1537.822513] __alloc_disk_node+0x70/0x420 [ 1537.826649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1537.832182] loop_add+0x3aa/0x8d0 [ 1537.835681] loop_control_ioctl+0x165/0x360 [ 1537.839998] ? loop_add+0x8d0/0x8d0 [ 1537.843619] ? loop_add+0x8d0/0x8d0 [ 1537.847238] do_vfs_ioctl+0xd6e/0x1390 [ 1537.851121] ? ioctl_preallocate+0x210/0x210 [ 1537.855523] ? __fget+0x367/0x540 [ 1537.858967] ? ksys_dup3+0x3e0/0x3e0 [ 1537.862675] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1537.868205] ? tomoyo_file_ioctl+0x23/0x30 [ 1537.872427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1537.877953] ? security_file_ioctl+0x93/0xc0 [ 1537.882353] ksys_ioctl+0xab/0xd0 [ 1537.885805] __x64_sys_ioctl+0x73/0xb0 [ 1537.889691] do_syscall_64+0x103/0x610 [ 1537.893572] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1537.898846] RIP: 0033:0x457f29 [ 1537.902024] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1537.920913] RSP: 002b:00007f83f2436c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1537.928606] RAX: ffffffffffffffda RBX: 00007f83f2436c90 RCX: 0000000000457f29 [ 1537.935863] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1537.943117] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1537.950376] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24376d4 [ 1537.957690] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:39:03 executing program 4: syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x20002, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x6) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xee, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, 0x0, 0x401, 0x4, @perf_config_ext, 0x1, 0x0, 0x0, 0x6, 0x4, 0x0, 0x7f}, 0x0, 0x0, r2, 0x8) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, 0x0) 06:39:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a8037001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:39:03 executing program 0 (fault-call:18 fault-nth:48): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:39:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r5 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) fdatasync(r4) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r7, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r7, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r6, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r7, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r7, 0x80045300, &(0x7f0000000540)) getsockname(r6, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:39:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x0, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:39:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000ac037001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:39:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x572, 0x1, 0x17a]}) 06:39:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$EVIOCGRAB(r6, 0x40044590, &(0x7f0000000080)=0x9) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r4, &(0x7f0000000880)=@pppol2tp, &(0x7f00000001c0)=0x80) [ 1538.250199] overlayfs: missing 'lowerdir' 06:39:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x0, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:39:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0038001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:39:03 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) bind$inet(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0xc0, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f00000001c0)={'ip6tnl0\x00'}) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) write$binfmt_misc(r1, &(0x7f0000000440)={'syz1'}, 0x1200e) 06:39:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x580, 0x1, 0x17a]}) [ 1538.397311] FAULT_INJECTION: forcing a failure. [ 1538.397311] name failslab, interval 1, probability 0, space 0, times 0 [ 1538.455678] CPU: 1 PID: 9176 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1538.462548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1538.471911] Call Trace: [ 1538.474521] dump_stack+0x172/0x1f0 [ 1538.478188] should_fail.cold+0xa/0x15 [ 1538.482111] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1538.487242] ? ___might_sleep+0x163/0x280 [ 1538.491421] __should_failslab+0x121/0x190 [ 1538.495679] should_failslab+0x9/0x14 [ 1538.499510] kmem_cache_alloc_trace+0x2d1/0x760 06:39:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0044001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:39:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0280001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1538.504198] ? part_uevent+0x120/0x120 [ 1538.508180] rand_initialize_disk+0x40/0xc0 [ 1538.512553] __alloc_disk_node+0x23f/0x420 [ 1538.516796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1538.522346] loop_add+0x3aa/0x8d0 [ 1538.525825] ? idr_find+0x47/0x60 [ 1538.529300] loop_control_ioctl+0x165/0x360 [ 1538.533640] ? loop_add+0x8d0/0x8d0 [ 1538.537298] ? loop_add+0x8d0/0x8d0 [ 1538.540934] do_vfs_ioctl+0xd6e/0x1390 [ 1538.544843] ? ioctl_preallocate+0x210/0x210 [ 1538.549284] ? __fget+0x367/0x540 [ 1538.552760] ? ksys_dup3+0x3e0/0x3e0 [ 1538.556485] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1538.562036] ? tomoyo_file_ioctl+0x23/0x30 [ 1538.566282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1538.571834] ? security_file_ioctl+0x93/0xc0 [ 1538.576265] ksys_ioctl+0xab/0xd0 [ 1538.579740] __x64_sys_ioctl+0x73/0xb0 [ 1538.583645] do_syscall_64+0x103/0x610 [ 1538.587551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1538.592746] RIP: 0033:0x457f29 [ 1538.595964] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1538.614853] RSP: 002b:00007f83f2436c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1538.622558] RAX: ffffffffffffffda RBX: 00007f83f2436c90 RCX: 0000000000457f29 [ 1538.629825] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1538.637080] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1538.644354] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24376d4 [ 1538.651633] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 06:39:03 executing program 0 (fault-call:18 fault-nth:49): setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x4}, {0x0, 0x7}]}, 0x14, 0x3) r0 = socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./\xe8_\x02\xde\x10\xb5\x14\xb9v\xbf8p\xeb\x11\x96\xd6$\x14p\x8cZ\x0f\xfc*\xa3kj\x01:\xcd{R\x97\xbd\x05&\xad\x13\xfcW#>\\I&m\x96W\x02\xb33X\x16Z\x82\xd7\x8a(n\xbc\x82gOEc\xd8V\x1b\xc8\\\xb4\atjsf\xf0:\xd5\xc2_\xf3f6\xfc\xb0\x06\xf9\f\xb5\xd4#\xf9J\xf0\xd8\xfe_\x1c\xff\xe0\"8\xdf\xf5^\\\xd6\x13\x85or#\xf38\xd9\xeeh\xb0%\xcc\xf7\xe5.\x8c\xa3\x7f\x84\x17l\r\x18\xd1\xea\x14\xa0\xcc\xd9\xb5\xc3_\x84\x93\xd1UG\xb3\x88*\x8a\xc7I\bD\riO\xe4\r\xfd\xbf\x98\xbd%\xc9(\xbe\xcd\b\x1b\x14\x8a\\\xdd\xd0\x86\x89\xed\xe9\xb09\xa3\xf4F%@&w\x89(\xb1\xeei\xf7\xde\xa1\xee\xbbj\xeb\x12', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x1200000000000000, 0x8, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x4c) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae, 0x40000120, &(0x7f0000000480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000240)={0x0, r4, 0x1}) 06:39:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0380001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:39:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:39:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget(0x0, 0x7, 0x430) semctl$GETPID(r1, 0x3, 0xb, &(0x7f0000000a40)=""/184) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r3, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r2, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r4}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r5 = accept4$bt_l2cap(r3, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r7, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r7, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl$UDMABUF_CREATE(r7, 0x40187542, &(0x7f0000000080)={r7, 0x1}) ioctl(r6, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r7, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r7, 0x80045300, &(0x7f0000000540)) getsockname(r6, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:39:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x0, 0x1f, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:39:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1ffffffc, &(0x7f0000000140)={0x2, 0x0, @remote}, 0xffffff5d) shutdown(r0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0xc0, 0x0) getpgrp(0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) write$binfmt_misc(r2, &(0x7f0000000440)={'syz1'}, 0x1200e) 06:39:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004a0007351dfffd946f6105000a0480001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:39:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x587, 0x1, 0x17a]}) 06:39:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r6, 0x84, 0x7, &(0x7f0000000080)={0x101}, 0x4) preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) prctl$PR_SET_FP_MODE(0x2d, 0x3) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) 06:39:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000007c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x2, 0x7fe, 0x0) sendto$inet6(r2, &(0x7f00000004c0)="0f752fde7b1e59d4d47ea9ee2fce117aa16d8e71b7593875f43170b01b5c1bb19a767ba09b70be858948fdedf01458ae66e159", 0x33, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r1, 0x24, &(0x7f0000000440)={0x3, 0x8, 0x8, 0x400, r3}) write(r0, &(0x7f0000000480)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc0000100023020000", 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000980)=""/135) r4 = accept4$bt_l2cap(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x800) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x2) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/116, 0x10000019b) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x900, 0x0) write$smack_current(r6, &(0x7f00000002c0)='vmnet0\x00', 0x5) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) ioctl(r5, 0x0, &(0x7f0000000100)="1333cd31a0a5a0bf89980d73eae26c92d05728e12b72ac9d5a76e06fcf6974ef9609818ba4bb191d36039050f2073696d0") preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000780)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x100000000000035c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000540)) getsockname(r5, &(0x7f0000000880)=@pppol2tp, &(0x7f0000000340)=0xffffff42) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0xfffffffffffffff9, 0x1, 0x80, 0x831, 0x8, 0x7, 0x6, 0x1, 0x1, 0x0, 0x4}) socket$inet_udp(0x2, 0x2, 0x0) 06:39:03 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 1539.007877] FAULT_INJECTION: forcing a failure. [ 1539.007877] name failslab, interval 1, probability 0, space 0, times 0 [ 1539.025772] CPU: 0 PID: 9223 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1539.032631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1539.041988] Call Trace: [ 1539.044593] dump_stack+0x172/0x1f0 [ 1539.048248] should_fail.cold+0xa/0x15 [ 1539.052161] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1539.057286] ? ___might_sleep+0x163/0x280 [ 1539.061466] __should_failslab+0x121/0x190 [ 1539.065719] should_failslab+0x9/0x14 [ 1539.069541] kmem_cache_alloc_trace+0x2d1/0x760 [ 1539.074316] device_create_groups_vargs+0x8e/0x270 [ 1539.079279] device_create_vargs+0x45/0x60 [ 1539.079302] bdi_register_va.part.0+0x38/0x740 [ 1539.079321] bdi_register+0x12a/0x140 [ 1539.079336] ? bdi_register_va+0x80/0x80 [ 1539.079363] ? enable_ptr_key_workfn+0x30/0x30 [ 1539.079384] ? memcpy_erms+0x8/0x10 06:39:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000004c0)=[@text32={0x20, &(0x7f0000000400)="b9800000c00f3235010000000f301c000f01cbb9800000c00f3235010000000f300f01c86736f36f0f01df0f2083ea0058000065000fc79b01000000", 0x3c}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1539.104242] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1539.109806] bdi_register_owner+0x61/0x110 [ 1539.114061] __device_add_disk+0xd68/0x1160 [ 1539.118404] ? blk_alloc_devt+0x2e0/0x2e0 [ 1539.122567] ? sprintf+0xc0/0x100 [ 1539.126046] ? scnprintf+0x140/0x140 [ 1539.129780] device_add_disk+0x2b/0x40 [ 1539.133672] loop_add+0x635/0x8d0 [ 1539.137146] loop_control_ioctl+0x165/0x360 [ 1539.141483] ? loop_add+0x8d0/0x8d0 [ 1539.145153] ? loop_add+0x8d0/0x8d0 [ 1539.148797] do_vfs_ioctl+0xd6e/0x1390 [ 1539.152722] ? ioctl_preallocate+0x210/0x210 [ 1539.157163] ? __fget+0x367/0x540 [ 1539.160633] ? ksys_dup3+0x3e0/0x3e0 [ 1539.164361] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1539.169925] ? tomoyo_file_ioctl+0x23/0x30 [ 1539.174175] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1539.179721] ? security_file_ioctl+0x93/0xc0 [ 1539.184159] ksys_ioctl+0xab/0xd0 [ 1539.187631] __x64_sys_ioctl+0x73/0xb0 [ 1539.191536] do_syscall_64+0x103/0x610 [ 1539.195463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1539.200662] RIP: 0033:0x457f29 [ 1539.203865] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1539.222775] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1539.230493] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1539.237784] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1539.245088] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1539.252369] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1539.259647] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 [ 1539.270140] WARNING: CPU: 0 PID: 9223 at block/genhd.c:717 __device_add_disk+0xef6/0x1160 [ 1539.278494] Kernel panic - not syncing: panic_on_warn set ... [ 1539.284404] CPU: 0 PID: 9223 Comm: syz-executor.0 Not tainted 5.0.0+ #13 [ 1539.291254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1539.300614] Call Trace: [ 1539.303214] dump_stack+0x172/0x1f0 [ 1539.306839] ? __device_add_disk+0xe00/0x1160 [ 1539.311382] panic+0x2cb/0x65c [ 1539.314584] ? __warn_printk+0xf3/0xf3 [ 1539.318492] ? __device_add_disk+0xef6/0x1160 [ 1539.322992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1539.328530] ? __warn.cold+0x5/0x45 [ 1539.332197] ? __device_add_disk+0xef6/0x1160 [ 1539.336704] __warn.cold+0x20/0x45 [ 1539.340259] ? __device_add_disk+0xef6/0x1160 [ 1539.344766] report_bug+0x263/0x2b0 [ 1539.348464] do_error_trap+0x11b/0x200 [ 1539.352369] do_invalid_op+0x37/0x50 [ 1539.356082] ? __device_add_disk+0xef6/0x1160 [ 1539.360577] invalid_op+0x14/0x20 [ 1539.364030] RIP: 0010:__device_add_disk+0xef6/0x1160 [ 1539.369126] Code: 30 e0 50 fe 0f 0b e9 98 fb ff ff 48 89 bd 18 ff ff ff e8 1d e0 50 fe 0f 0b 48 8b bd 18 ff ff ff e9 bf f7 ff ff e8 0a e0 50 fe <0f> 0b e9 80 fe ff ff e8 8e a1 23 fe 4c 89 e7 e8 16 da 88 fe e9 45 [ 1539.388026] RSP: 0018:ffff888053957af8 EFLAGS: 00010246 [ 1539.393397] RAX: 0000000000040000 RBX: ffff888053957be8 RCX: ffffc90005df3000 [ 1539.400671] RDX: 0000000000040000 RSI: ffffffff831f75f6 RDI: 0000000000000005 [ 1539.407943] RBP: ffff888053957c10 R08: ffff88808ad74080 R09: ffffed1015d05bc8 [ 1539.415199] R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: ffff888089192280 [ 1539.422454] R13: ffff888089192310 R14: 00000000fffffff4 R15: 0000000000000000 [ 1539.429717] ? __device_add_disk+0xef6/0x1160 [ 1539.434213] ? __device_add_disk+0xef6/0x1160 [ 1539.438697] ? blk_alloc_devt+0x2e0/0x2e0 [ 1539.442842] ? sprintf+0xc0/0x100 [ 1539.446310] ? scnprintf+0x140/0x140 [ 1539.450030] device_add_disk+0x2b/0x40 [ 1539.453913] loop_add+0x635/0x8d0 [ 1539.457371] loop_control_ioctl+0x165/0x360 [ 1539.461700] ? loop_add+0x8d0/0x8d0 [ 1539.465334] ? loop_add+0x8d0/0x8d0 [ 1539.468954] do_vfs_ioctl+0xd6e/0x1390 [ 1539.472832] ? ioctl_preallocate+0x210/0x210 [ 1539.477318] ? __fget+0x367/0x540 [ 1539.480777] ? ksys_dup3+0x3e0/0x3e0 [ 1539.484480] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1539.490026] ? tomoyo_file_ioctl+0x23/0x30 [ 1539.494260] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1539.499782] ? security_file_ioctl+0x93/0xc0 [ 1539.504178] ksys_ioctl+0xab/0xd0 [ 1539.507620] __x64_sys_ioctl+0x73/0xb0 [ 1539.511500] do_syscall_64+0x103/0x610 [ 1539.515395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1539.520595] RIP: 0033:0x457f29 [ 1539.523790] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1539.542677] RSP: 002b:00007f83f2478c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1539.550370] RAX: ffffffffffffffda RBX: 00007f83f2478c90 RCX: 0000000000457f29 [ 1539.557623] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1539.564891] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1539.572157] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83f24796d4 [ 1539.579423] R13: 00000000004c11d9 R14: 00000000004d30f0 R15: 0000000000000005 [ 1539.587565] Kernel Offset: disabled [ 1539.591356] Rebooting in 86400 seconds..