040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a2040aff7e", 0x24}], 0x1}, 0x0) 18:59:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, 0x0, 0x0) [ 673.782903] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 18:59:21 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1000000000000000]}, 0x3e) 18:59:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a2040eff7e", 0x24}], 0x1}, 0x0) 18:59:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x81, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x117, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000280)={0xb, 0x10, 0xfa00, {&(0x7f0000000140), r2, 0x9}}, 0x18) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r5, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000000c0)={0x40}, 0x10) 18:59:21 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x3203000000000000]}, 0x3e) [ 674.008820] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 18:59:21 executing program 5: socketpair$unix(0x1, 0x4006, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1}, 0x0, 0x0, &(0x7f0000000180)={0x3, 0x5, 0x5, 0x1000}, &(0x7f00000001c0)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x10001}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r4, 0x4) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x407d, 0x0, [0x178, 0x0, 0x0, 0x80], [0xc1]}) [ 674.524790] net_ratelimit: 24 callbacks suppressed [ 674.524799] protocol 88fb is buggy, dev hsr_slave_0 [ 674.534992] protocol 88fb is buggy, dev hsr_slave_1 [ 675.484810] protocol 88fb is buggy, dev hsr_slave_0 [ 675.489961] protocol 88fb is buggy, dev hsr_slave_1 [ 675.805001] protocol 88fb is buggy, dev hsr_slave_0 [ 675.810082] protocol 88fb is buggy, dev hsr_slave_1 [ 675.884810] protocol 88fb is buggy, dev hsr_slave_0 [ 675.889944] protocol 88fb is buggy, dev hsr_slave_1 [ 676.044807] protocol 88fb is buggy, dev hsr_slave_0 [ 676.050058] protocol 88fb is buggy, dev hsr_slave_1 18:59:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x69bb, 0x0, 0x2000000000000c, 0xfa}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:59:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a2040fff7e", 0x24}], 0x1}, 0x0) 18:59:24 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4800000000000000]}, 0x3e) 18:59:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, 0x0, 0x0) [ 676.846017] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 18:59:24 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x3e) 18:59:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x69bb, 0x0, 0x2000000000000c, 0xfa}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:59:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20460ff7e", 0x24}], 0x1}, 0x0) 18:59:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x20100, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000180)={{0xffffffffffffffff, 0x3, 0x5, 0x3, 0xfffffffffffffff8}, 0x3ff, 0x6}) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000240)={0x6, &(0x7f00000000c0)=[{0x1, 0x5, 0x80, 0x3}, {0xffffffffffff8001, 0x3, 0x401, 0x100000000000}, {0x1f3bd324, 0x0, 0x0, 0xfffffffffffffffe}, {0x3, 0xa8ed, 0x7ff, 0x8}, {0x8, 0x7e10bd1a, 0xa4, 0x671787de}, {0x9, 0x26175e83, 0x401, 0x1}]}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0xf7, 0x80080) mkdirat(r5, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:24 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x6800000000000000]}, 0x3e) [ 677.064646] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 18:59:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0xf}], 0x1}, 0x0) 18:59:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x380) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e21, 0x3, @local, 0xb7}}, 0x6, 0x7, 0x100000000, 0x20, 0x200000000000022}, &(0x7f0000000480)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={r2, 0x7}, 0x8) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000240)={0x4, 0x0, 0x0, {0x77359400}, 0xffffffff00000000, 0x4}) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f00000003c0)={0x9d0000, 0x100, 0xbfe, [], &(0x7f0000000340)={0x990a7e, 0x7, [], @string=&(0x7f0000000300)}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpeername$inet6(r1, &(0x7f0000000400)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000440)=0x1c) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local}, 0x0, @in6}}, 0xb9) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f00000001c0)={0x40000000000, "038f39bce099cf3012313e598c587d55a0fb3df1b53cc796504975ce4611b178"}) connect$inet6(r6, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r6, &(0x7f0000000240), 0x5c3, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r7, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x177], [0xc1]}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000bc0)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000000c00)=0x10) recvmmsg(r5, &(0x7f0000000b40)=[{{&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000680)=""/187, 0xbb}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000740)=""/102, 0x66}, {&(0x7f00000007c0)=""/12, 0xc}, {&(0x7f0000000800)=""/126, 0x7e}, {&(0x7f0000000880)=""/136, 0x88}, {&(0x7f0000000940)=""/145, 0x91}], 0x8, &(0x7f0000000a80)=""/153, 0x99}, 0x10001}], 0x1, 0x100, &(0x7f0000000b80)={0x77359400}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000004c0)=0xc70000, 0x2) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f00000002c0)=0xce000, 0x4) 18:59:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:25 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x3e) 18:59:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x14}], 0x1}, 0x0) 18:59:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 18:59:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) [ 679.644816] net_ratelimit: 16 callbacks suppressed [ 679.644824] protocol 88fb is buggy, dev hsr_slave_0 [ 679.654963] protocol 88fb is buggy, dev hsr_slave_1 18:59:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x69bb, 0x0, 0x2000000000000c, 0xfa}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:59:27 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7400000000000000]}, 0x3e) 18:59:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x25}], 0x1}, 0x0) 18:59:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, 0xffffffffffffffff, 0x0) 18:59:27 executing program 5: r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x3, 0x400000) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000180)={r1, 0x8}) socketpair$unix(0x1, 0x10000003, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000100)=0x401) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ustat(0x5, &(0x7f00000000c0)) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f00000001c0)={0x7000, 0x1, 0x7, 0x0, 0x40}) 18:59:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 679.964780] protocol 88fb is buggy, dev hsr_slave_0 [ 679.969872] protocol 88fb is buggy, dev hsr_slave_1 [ 680.044833] protocol 88fb is buggy, dev hsr_slave_0 [ 680.056523] protocol 88fb is buggy, dev hsr_slave_1 18:59:27 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x3e) 18:59:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0xc0}], 0x1}, 0x0) 18:59:28 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0xff00000000000000]}, 0x3e) 18:59:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, 0xffffffffffffffff, 0x0) 18:59:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x2001, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000100)=0x1, &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0xec0}], 0x1}, 0x0) [ 680.204771] protocol 88fb is buggy, dev hsr_slave_0 [ 680.209920] protocol 88fb is buggy, dev hsr_slave_1 [ 680.216686] protocol 88fb is buggy, dev hsr_slave_0 [ 680.221773] protocol 88fb is buggy, dev hsr_slave_1 18:59:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x69bb, 0x0, 0x2000000000000c, 0xfa}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:59:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, 0xffffffffffffffff, 0x0) 18:59:30 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x3e) 18:59:30 executing program 5: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x33fe0}], 0x1}, 0x0) 18:59:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 18:59:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x20000424}], 0x1}, 0x0) 18:59:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 18:59:31 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2]}, 0x3e) 18:59:31 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x7ffff000}], 0x1}, 0x0) 18:59:31 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3]}, 0x3e) [ 684.924763] net_ratelimit: 24 callbacks suppressed [ 684.924770] protocol 88fb is buggy, dev hsr_slave_0 [ 684.934818] protocol 88fb is buggy, dev hsr_slave_1 [ 685.884776] protocol 88fb is buggy, dev hsr_slave_0 [ 685.889883] protocol 88fb is buggy, dev hsr_slave_1 18:59:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x69bb, 0x0, 0x2000000000000c, 0xfa}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:59:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0xfffffdef}], 0x1}, 0x0) 18:59:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f00000000c0)={0x7d, 0x0, [0x4176, 0x1], [0xc1]}) 18:59:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 18:59:33 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3e) 18:59:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 686.204790] protocol 88fb is buggy, dev hsr_slave_0 [ 686.209932] protocol 88fb is buggy, dev hsr_slave_1 18:59:34 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x5]}, 0x3e) 18:59:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x2}, 0x0) [ 686.284794] protocol 88fb is buggy, dev hsr_slave_0 [ 686.289919] protocol 88fb is buggy, dev hsr_slave_1 18:59:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 18:59:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x4000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000100)={0x4, 0x100000}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:34 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3e) 18:59:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x3}, 0x0) [ 686.444761] protocol 88fb is buggy, dev hsr_slave_0 [ 686.449908] protocol 88fb is buggy, dev hsr_slave_1 18:59:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x69bb, 0x0, 0x2000000000000c, 0xfa}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:59:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x280080, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000140)={r4, 0x3}) write$capi20_data(r3, &(0x7f00000001c0)={{0x10, 0x8, 0x87, 0x81, 0x6, 0xffffffffffff8001}, 0x81, "e2dcb0cdc7f95c1a544baad1654efe724c92cb61024e1675188e349c3a6b6ff053004675b3b58da91207e2c9e668f34083982490205ca23d1448ce5625545ae6339d1e5e86dbbd9c1c1dacefaf38d0138fb10be12a04549ae99a0dc9a88c4101726597079be523f33af87645b5b9f8e9bec174d31fcc0502ccb73e0bb938f8c0ad"}, 0x93) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000180)={0x2, r1}) ioctl$KVM_ENABLE_CAP_CPU(r5, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:37 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7]}, 0x3e) 18:59:37 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 18:59:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x8}, 0x0) 18:59:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 18:59:37 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa]}, 0x3e) 18:59:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x17}, 0x0) 18:59:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x69bb, 0x0, 0x2000000000000c, 0xfa}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 18:59:37 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 18:59:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000280)={0x5, [0x7, 0x1000, 0xff, 0x6, 0xc0]}, 0xe) signalfd4(r2, &(0x7f0000000140)={0x7}, 0x8, 0x80800) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0100f400fce3f2959e1c4b0780884147c48609cc98888c533e1867163207d9bb8de7580bfddbcb0000000000000003e4e7b22e7ff300685199d34dc81fbc455eb119d7138f5e484c0aab2a5eef01032e14787115f022ea8b6c01b8085105e902087fa97aa32c790e31a1611ef27330a0972700794a7ce691951f3c71018ef9d319d23be3cc5b5bd069664fbe9ea77082f191e81dd42d2d949e86d36e084e891865d3efe20f07df932724673d794b89bdb8cc2f6bdbb35afeb368ae25a110abde17531eac055f5d2f24cf9ac5505a02a89889751edf1778290596e44f13e77b785cabe18f1fc1a5fe75b74fbd16d92341452413aec81a0d1f"]) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000100)={0x8, 0x3, 0x6, 0x100000005, 0x6}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:37 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x10]}, 0x3e) 18:59:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0xffffff1f}, 0x0) 18:59:37 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 18:59:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) read$eventfd(r2, &(0x7f00000000c0), 0x8) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x80) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000140)) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:37 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x48]}, 0x3e) 18:59:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x2}, 0x0) 18:59:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 18:59:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x3}, 0x0) 18:59:37 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x3e) [ 690.044886] net_ratelimit: 16 callbacks suppressed [ 690.044895] protocol 88fb is buggy, dev hsr_slave_0 [ 690.061624] protocol 88fb is buggy, dev hsr_slave_1 [ 690.364789] protocol 88fb is buggy, dev hsr_slave_0 [ 690.369897] protocol 88fb is buggy, dev hsr_slave_1 [ 690.444840] protocol 88fb is buggy, dev hsr_slave_0 [ 690.449982] protocol 88fb is buggy, dev hsr_slave_1 [ 690.605400] protocol 88fb is buggy, dev hsr_slave_0 [ 690.610499] protocol 88fb is buggy, dev hsr_slave_1 [ 690.615917] protocol 88fb is buggy, dev hsr_slave_0 [ 690.621000] protocol 88fb is buggy, dev hsr_slave_1 18:59:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x69bb, 0x0, 0x2000000000000c, 0xfa}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 18:59:40 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x10000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x4}, 0x0) 18:59:40 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x68]}, 0x3e) 18:59:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) 18:59:40 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x3e) 18:59:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xa}, 0x0) 18:59:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x69bb, 0x0, 0x2000000000000c, 0xfa}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 18:59:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0xfffffffffffffffd) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f00000000c0)={0x7, 0x5, 0xef}) 18:59:40 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:40 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x74]}, 0x3e) 18:59:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xe}, 0x0) 18:59:40 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:40 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0xa66, 0x80000) fallocate(r0, 0x24, 0x4fe, 0x33d926ee) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r1 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffeffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x30d) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x8000, 0x0) setns(r5, 0x20000) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f00000000c0)="f20f7cd8baf80c66b86527ef8966efbafc0cecb8000f8ec8b801008ee0670f2199baf80c66b8a69f138866efbafc0ced0fc77e03660f3804460466b8004800000f23c00f21f86635020001000f23f82ef32665de3c", 0x55}], 0x1, 0x2c, &(0x7f0000000180), 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xf}, 0x0) 18:59:40 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x3e) 18:59:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) 18:59:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 18:59:41 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x300]}, 0x3e) [ 695.324775] net_ratelimit: 24 callbacks suppressed [ 695.324781] protocol 88fb is buggy, dev hsr_slave_0 [ 695.334876] protocol 88fb is buggy, dev hsr_slave_1 18:59:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x88000, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000100)) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000200)="baf80c66b838dcfb8a66efbafc0c66ed66b814328d5a0f23d00f21f866350000000a0f23f866b8006000000f23d80f21f86635c00000500f23f83e0f019b000066b9e90b00000f320f20c06635040000000f22c0d4086526360fdbbc006066b8020000000f23c00f21f86635000005000f23f8f30f35", 0x76}], 0x1, 0x1, &(0x7f00000002c0)=[@flags={0x3, 0x6000}], 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x60}, 0x0) 18:59:43 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x332]}, 0x3e) 18:59:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 18:59:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) 18:59:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x69bb, 0x0, 0x2000000000000c, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 18:59:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xf0}, 0x0) 18:59:43 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x500]}, 0x3e) 18:59:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 18:59:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x300}, 0x0) 18:59:43 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x600]}, 0x3e) 18:59:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x518}, 0x0) 18:59:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000100)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000002c0), &(0x7f0000000300)=0x40) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) [ 696.107190] QAT: Invalid ioctl [ 696.183716] QAT: Invalid ioctl [ 696.284809] protocol 88fb is buggy, dev hsr_slave_0 [ 696.289987] protocol 88fb is buggy, dev hsr_slave_1 [ 696.604785] protocol 88fb is buggy, dev hsr_slave_0 [ 696.609930] protocol 88fb is buggy, dev hsr_slave_1 [ 696.684794] protocol 88fb is buggy, dev hsr_slave_0 [ 696.689915] protocol 88fb is buggy, dev hsr_slave_1 [ 696.844787] protocol 88fb is buggy, dev hsr_slave_0 [ 696.849918] protocol 88fb is buggy, dev hsr_slave_1 18:59:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x69bb, 0x0, 0x2000000000000c, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 18:59:46 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x700]}, 0x3e) 18:59:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xa00}, 0x0) 18:59:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x800, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3f35) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 18:59:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)}], 0x1}, 0x0) 18:59:46 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x3e) 18:59:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xe00}, 0x0) 18:59:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 18:59:46 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f0000000140)=0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x9, 0x2) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:46 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3203]}, 0x3e) 18:59:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xf00}, 0x0) [ 700.444782] net_ratelimit: 16 callbacks suppressed [ 700.444789] protocol 88fb is buggy, dev hsr_slave_0 [ 700.454846] protocol 88fb is buggy, dev hsr_slave_1 [ 700.764768] protocol 88fb is buggy, dev hsr_slave_0 [ 700.769849] protocol 88fb is buggy, dev hsr_slave_1 [ 700.845567] protocol 88fb is buggy, dev hsr_slave_0 [ 700.850661] protocol 88fb is buggy, dev hsr_slave_1 [ 701.004780] protocol 88fb is buggy, dev hsr_slave_0 [ 701.009867] protocol 88fb is buggy, dev hsr_slave_1 [ 701.014993] protocol 88fb is buggy, dev hsr_slave_0 [ 701.020058] protocol 88fb is buggy, dev hsr_slave_1 18:59:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x69bb, 0x0, 0x2000000000000c, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 18:59:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(r3, 0xc050561a, &(0x7f0000000100)={0x3ff, "7fedba73e7ceee57fae0daa7754c63ac841f24cbe8c12bdf9b96b947ae204109", 0x1, 0x9, 0x1, 0x40004, 0x0, 0x4}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:49 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x3e) 18:59:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x1805}, 0x0) 18:59:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)}], 0x1}, 0x0) 18:59:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x3f00}, 0x0) 18:59:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f00000000c0)={0x10000, 0x0, &(0x7f0000ffe000/0x1000)=nil}) 18:59:49 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x3e) 18:59:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x69bb, 0x0, 0x2000000000000c, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:59:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:49 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x3e) 18:59:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000140)=0x3, 0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 18:59:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x6000}, 0x0) 18:59:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:50 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6c00]}, 0x3e) 18:59:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xf000}, 0x0) 18:59:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)}], 0x1}, 0x0) 18:59:50 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x100, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000180), &(0x7f00000001c0)=0x1c, 0x800) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x4, 0x8}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x20880, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x80200, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x8c0, 0x0) ioctl$IOC_PR_REGISTER(r5, 0x401870c8, &(0x7f0000000100)={0x6, 0x9, 0x1}) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r6, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:50 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7400]}, 0x3e) 18:59:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x34000}, 0x0) 18:59:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x69bb, 0x0, 0x2000000000000c, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:59:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x400300}, 0x0) 18:59:52 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x3e) 18:59:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) userfaultfd(0x800) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x16b}], 0x1}, 0x0) 18:59:52 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x3e) 18:59:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xf0ffff}, 0x0) 18:59:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f00000000c0)={0x7, 0x4, 0x3, 0x4, 0x62}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:53 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x3e) 18:59:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x1000000}, 0x0) [ 705.724792] net_ratelimit: 24 callbacks suppressed [ 705.729790] protocol 88fb is buggy, dev hsr_slave_0 [ 705.734890] protocol 88fb is buggy, dev hsr_slave_1 [ 706.684807] protocol 88fb is buggy, dev hsr_slave_0 [ 706.689928] protocol 88fb is buggy, dev hsr_slave_1 [ 707.004807] protocol 88fb is buggy, dev hsr_slave_0 [ 707.009922] protocol 88fb is buggy, dev hsr_slave_1 [ 707.084774] protocol 88fb is buggy, dev hsr_slave_0 [ 707.089879] protocol 88fb is buggy, dev hsr_slave_1 [ 707.244816] protocol 88fb is buggy, dev hsr_slave_0 [ 707.249927] protocol 88fb is buggy, dev hsr_slave_1 18:59:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x69bb, 0x0, 0x2000000000000c, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:59:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:55 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3e) 18:59:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x2000000}, 0x0) 18:59:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x10, 0x2, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x4c000000, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002061f001cfffd946fa2830020200a000900010005e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) write$eventfd(r2, &(0x7f00000000c0)=0x7, 0x8) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x16b}], 0x1}, 0x0) 18:59:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) [ 708.194271] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 708.219849] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 18:59:56 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x3e) 18:59:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x3000000}, 0x0) [ 708.261271] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 708.274826] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 18:59:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x4000000}, 0x0) 18:59:56 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x3e) [ 710.844887] net_ratelimit: 16 callbacks suppressed [ 710.844895] protocol 88fb is buggy, dev hsr_slave_0 [ 710.854994] protocol 88fb is buggy, dev hsr_slave_1 18:59:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x16b}], 0x1}, 0x0) 18:59:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) fsetxattr$security_smack_transmute(r0, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x1) 18:59:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xa000000}, 0x0) 18:59:59 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x3e) [ 711.164798] protocol 88fb is buggy, dev hsr_slave_0 [ 711.170001] protocol 88fb is buggy, dev hsr_slave_1 18:59:59 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) 18:59:59 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x3e) 18:59:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) [ 711.244794] protocol 88fb is buggy, dev hsr_slave_0 [ 711.249991] protocol 88fb is buggy, dev hsr_slave_1 18:59:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xe000000}, 0x0) 18:59:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_STATFS(r4, &(0x7f0000000100)={0x60, 0x0, 0x3, {{0xffff, 0x401, 0x80000001, 0x6, 0x6, 0xfffffffffffffff8, 0x9, 0x20}}}, 0x60) openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x400000, 0x0) 18:59:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xf000000}, 0x0) [ 711.404780] protocol 88fb is buggy, dev hsr_slave_0 [ 711.409903] protocol 88fb is buggy, dev hsr_slave_1 [ 711.415064] protocol 88fb is buggy, dev hsr_slave_0 [ 711.420136] protocol 88fb is buggy, dev hsr_slave_1 18:59:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x220}], 0x1}, 0x0) 18:59:59 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x3e) 18:59:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 18:59:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x18050000}, 0x0) 18:59:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x10000, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x7) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 18:59:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 18:59:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) [ 712.088259] EXT4-fs (loop1): bad geometry: block count 1080 exceeds size of device (1 blocks) 18:59:59 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x3e) 19:00:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x3f000000}, 0x0) 19:00:00 executing program 5: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3f) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000100)={{0x8, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x1, 'sh\x00', 0x10, 0xfffffffffffffffe, 0x1c}, {@empty, 0x4e23, 0x7, 0xffffffffffffff01, 0xfffffffffffeffff, 0xffffffff}}, 0x44) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) fallocate(r1, 0x9, 0xffff, 0xaa000) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 19:00:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) [ 712.210555] EXT4-fs (loop1): bad geometry: block count 1080 exceeds size of device (1 blocks) 19:00:00 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x3e) 19:00:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x220}], 0x1}, 0x0) 19:00:00 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x1}}, 0x18) lseek(r0, 0x0, 0x4) close(r0) 19:00:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x60000000}, 0x0) 19:00:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x100) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:00:00 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x32030000]}, 0x3e) 19:00:00 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x3e) 19:00:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x9effffff}, 0x0) 19:00:00 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4c000000]}, 0x3e) 19:00:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) 19:00:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xf0ffffff}, 0x0) 19:00:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x220}], 0x1}, 0x0) 19:00:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:01 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x68000000]}, 0x3e) 19:00:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xffffffff, 0x400) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 19:00:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xfcffffff}, 0x0) 19:00:01 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x1}}, 0x18) lseek(r0, 0x0, 0x4) close(r0) 19:00:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)={r0}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x400, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8090}, 0x8040) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r5, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 19:00:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xfffff000}, 0x0) 19:00:01 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6c000000]}, 0x3e) 19:00:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xffffff7f}, 0x0) 19:00:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$join(0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 19:00:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155", 0x27b}], 0x1}, 0x0) 19:00:02 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x74000000]}, 0x3e) 19:00:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xffffff9e}, 0x0) 19:00:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x400, 0x0) r2 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x6, 0x181000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000140)={0x0, @speck128}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000180)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1}) syz_open_dev$video4linux(&(0x7f00000001c0)='/dev/v4l-subdev#\x00', 0x2, 0x2000) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r5, 0xc008ae88, &(0x7f0000000000)={0x7b, 0x0, [0x3], [0xc1]}) 19:00:02 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x1}}, 0x18) lseek(r0, 0x0, 0x4) close(r0) 19:00:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xfffffff0}, 0x0) 19:00:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:02 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7a000000]}, 0x3e) 19:00:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xfffffffc}, 0x0) 19:00:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 19:00:02 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x3e) 19:00:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x27b}], 0x1}, 0x0) 19:00:03 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 19:00:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x40030000000000}, 0x0) 19:00:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:03 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x3e) 19:00:03 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x1}}, 0x18) lseek(r0, 0x0, 0x4) close(r0) 19:00:03 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x3e) 19:00:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 19:00:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000200)={0x16, 0x6, 0x7f}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x7fff, 0x402001) ioctl$VIDIOC_G_DV_TIMINGS(r5, 0xc0845658, &(0x7f0000000100)={0x0, @reserved}) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 19:00:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x100000000000000}, 0x0) 19:00:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) [ 716.124787] net_ratelimit: 24 callbacks suppressed [ 716.124797] protocol 88fb is buggy, dev hsr_slave_0 [ 716.134956] protocol 88fb is buggy, dev hsr_slave_1 19:00:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155", 0x27b}], 0x1}, 0x0) 19:00:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x200000000000000}, 0x0) 19:00:04 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x3e) 19:00:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 19:00:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:04 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x1}}, 0x18) lseek(r0, 0x0, 0x4) 19:00:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x300000000000000}, 0x0) 19:00:04 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x3e) 19:00:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:04 executing program 5: socketpair$unix(0x1, 0x200000000000009, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x1) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 19:00:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x400000000000000}, 0x0) 19:00:04 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x3e) [ 717.094807] protocol 88fb is buggy, dev hsr_slave_0 [ 717.099998] protocol 88fb is buggy, dev hsr_slave_1 19:00:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2a8}], 0x1}, 0x0) 19:00:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xa00000000000000}, 0x0) 19:00:05 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x3e) 19:00:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x8, 0x40000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) 19:00:05 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x1}}, 0x18) lseek(r0, 0x0, 0x4) 19:00:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xe00000000000000}, 0x0) 19:00:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x2000000000002, 0x2) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r0, r1, 0x0, 0x20000102000007) 19:00:05 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x3e) [ 717.404783] protocol 88fb is buggy, dev hsr_slave_0 [ 717.409919] protocol 88fb is buggy, dev hsr_slave_1 [ 717.484791] protocol 88fb is buggy, dev hsr_slave_0 [ 717.489942] protocol 88fb is buggy, dev hsr_slave_1 19:00:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:05 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x3e) 19:00:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xf00000000000000}, 0x0) [ 717.644823] protocol 88fb is buggy, dev hsr_slave_0 [ 717.649958] protocol 88fb is buggy, dev hsr_slave_1 19:00:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2a8}], 0x1}, 0x0) 19:00:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x2000000000002, 0x2) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r0, r1, 0x0, 0x20000102000007) 19:00:06 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x3e) 19:00:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x1805000000000000}, 0x0) 19:00:06 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x1}}, 0x18) lseek(r0, 0x0, 0x4) 19:00:06 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x3e) 19:00:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x3f00000000000000}, 0x0) 19:00:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x2000000000002, 0x2) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r0, r1, 0x0, 0x20000102000007) 19:00:06 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3203000000000000]}, 0x3e) 19:00:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x6000000000000000}, 0x0) 19:00:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2a8}], 0x1}, 0x0) 19:00:06 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_int(r0, 0x28, 0x6, 0x0, &(0x7f0000000140)) 19:00:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x9effffff00000000}, 0x0) 19:00:06 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x3e) 19:00:06 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:07 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, 0x0) 19:00:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 19:00:07 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x3e) 19:00:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea01", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xfcffffff00000000}, 0x0) 19:00:07 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}, 0x3e) 19:00:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c", 0x2bf}], 0x1}, 0x0) 19:00:07 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x3e) 19:00:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea01", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xffffff7f00000000}, 0x0) 19:00:07 executing program 5: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_unix(0x0, 0x0, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) write$9p(r1, &(0x7f0000000040)="7f8890dc96d6b15c0e7af26c50de23fdb81c953311", 0x15) 19:00:07 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) socket$inet_udp(0x2, 0x2, 0x0) lseek(r0, 0x0, 0x4) close(r0) 19:00:07 executing program 5: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x1) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x18, 0x0, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback, 0x2}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000100), 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x44) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) 19:00:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xffffffff00000000}, 0x0) 19:00:07 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}, 0x3e) 19:00:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea01", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0xfffffffffffff000}, 0x0) [ 720.236538] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 19:00:08 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x3e) [ 720.622086] audit: type=1800 audit(1563476408.440:94): pid=27307 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=17735 res=0 19:00:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2bf}], 0x1}, 0x0) 19:00:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x2}, 0x0) 19:00:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x19, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a7", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:08 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x3e) 19:00:08 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009007f00000085680c1baba20500ff7e", 0x24}], 0x1}, 0x0) 19:00:08 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) socket$inet_udp(0x2, 0x2, 0x0) lseek(r0, 0x0, 0x4) close(r0) 19:00:08 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x3e) [ 720.926057] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 19:00:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x3}, 0x0) 19:00:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x19, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a7", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x4}, 0x0) 19:00:08 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x3e) [ 721.244791] net_ratelimit: 16 callbacks suppressed [ 721.244800] protocol 88fb is buggy, dev hsr_slave_0 [ 721.254966] protocol 88fb is buggy, dev hsr_slave_1 [ 721.564789] protocol 88fb is buggy, dev hsr_slave_0 [ 721.570105] protocol 88fb is buggy, dev hsr_slave_1 [ 721.654779] protocol 88fb is buggy, dev hsr_slave_0 [ 721.659913] protocol 88fb is buggy, dev hsr_slave_1 19:00:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2bf}], 0x1}, 0x0) 19:00:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:09 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x3e) 19:00:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x19, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a7", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xa}, 0x0) 19:00:09 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) socket$inet_udp(0x2, 0x2, 0x0) lseek(r0, 0x0, 0x4) close(r0) 19:00:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xe}, 0x0) [ 721.814779] protocol 88fb is buggy, dev hsr_slave_0 [ 721.819973] protocol 88fb is buggy, dev hsr_slave_1 [ 721.825149] protocol 88fb is buggy, dev hsr_slave_0 [ 721.830337] protocol 88fb is buggy, dev hsr_slave_1 19:00:09 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3e) 19:00:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x1d, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xf}, 0x0) 19:00:09 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x3e) 19:00:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2ca}], 0x1}, 0x0) 19:00:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) dup3(r1, r0, 0x0) 19:00:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x60}, 0x0) 19:00:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x1d, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:10 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3e) 19:00:10 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:10 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x3e) 19:00:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xf0}, 0x0) 19:00:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) dup3(r1, r0, 0x0) 19:00:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x1d, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:10 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x3e) 19:00:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x300}, 0x0) 19:00:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1", 0x2ca}], 0x1}, 0x0) 19:00:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x1f, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c874", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x518}, 0x0) 19:00:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) dup3(r1, r0, 0x0) 19:00:11 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x3e) 19:00:11 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:11 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x3e) 19:00:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 19:00:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8955, &(0x7f0000000000)=0x2) dup3(0xffffffffffffffff, r0, 0x0) 19:00:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x1f, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c874", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:11 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x3e) 19:00:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 19:00:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2ca}], 0x1}, 0x0) 19:00:12 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x3e) 19:00:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8955, &(0x7f0000000000)=0x2) dup3(0xffffffffffffffff, r0, 0x0) 19:00:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x1f, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c874", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xf00}, 0x0) 19:00:12 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x1805}, 0x0) 19:00:12 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x3e) 19:00:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8955, &(0x7f0000000000)=0x2) dup3(0xffffffffffffffff, r0, 0x0) 19:00:12 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x3e) 19:00:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x3f00}, 0x0) 19:00:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d0}], 0x1}, 0x0) 19:00:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:13 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x3e) 19:00:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 19:00:13 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:13 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:13 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x3e) 19:00:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 19:00:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:13 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x332]}, 0x3e) 19:00:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d0}], 0x1}, 0x0) 19:00:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x34000}, 0x0) 19:00:14 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:14 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x3e) 19:00:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:14 executing program 1: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x4) close(0xffffffffffffffff) 19:00:14 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x3e) 19:00:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x400300}, 0x0) 19:00:14 executing program 1: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x4) close(0xffffffffffffffff) 19:00:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) [ 726.524802] net_ratelimit: 24 callbacks suppressed [ 726.524811] protocol 88fb is buggy, dev hsr_slave_0 [ 726.534931] protocol 88fb is buggy, dev hsr_slave_1 19:00:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f8842", 0x2d0}], 0x1}, 0x0) 19:00:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 19:00:14 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x3e) 19:00:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:14 executing program 1: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x4) close(0xffffffffffffffff) 19:00:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:15 executing program 1: r0 = creat(0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:15 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x3e) 19:00:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) 19:00:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:15 executing program 1: r0 = creat(0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) [ 727.494774] protocol 88fb is buggy, dev hsr_slave_0 [ 727.499928] protocol 88fb is buggy, dev hsr_slave_1 [ 727.804790] protocol 88fb is buggy, dev hsr_slave_0 [ 727.809878] protocol 88fb is buggy, dev hsr_slave_1 [ 727.894768] protocol 88fb is buggy, dev hsr_slave_0 [ 727.899908] protocol 88fb is buggy, dev hsr_slave_1 19:00:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d3}], 0x1}, 0x0) 19:00:15 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3203]}, 0x3e) 19:00:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) 19:00:15 executing program 1: r0 = creat(0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) [ 728.044768] protocol 88fb is buggy, dev hsr_slave_0 [ 728.050018] protocol 88fb is buggy, dev hsr_slave_1 19:00:15 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x3e) 19:00:15 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x3000000}, 0x0) 19:00:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r1, 0x0) 19:00:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d3}], 0x1}, 0x0) 19:00:16 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x3e) 19:00:16 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) 19:00:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000000)=0x2) dup3(r0, 0xffffffffffffffff, 0x0) 19:00:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, 0x0) dup3(r2, r1, 0x0) 19:00:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000000)=0x2) dup3(r0, 0xffffffffffffffff, 0x0) 19:00:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xa000000}, 0x0) 19:00:16 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x3e) 19:00:16 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, 0x0) dup3(r2, r1, 0x0) 19:00:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xe000000}, 0x0) 19:00:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d3}], 0x1}, 0x0) 19:00:17 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000000)=0x2) dup3(r0, 0xffffffffffffffff, 0x0) 19:00:17 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}, 0x3e) 19:00:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, 0x0) dup3(r2, r1, 0x0) 19:00:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) 19:00:17 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}, 0x3e) 19:00:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x18050000}, 0x0) 19:00:17 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)) dup3(r2, r1, 0x0) 19:00:17 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x3e) 19:00:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d4}], 0x1}, 0x0) 19:00:18 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 19:00:18 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x3e) 19:00:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)) dup3(r2, r1, 0x0) 19:00:18 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:18 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x3e) 19:00:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) 19:00:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)) dup3(r2, r1, 0x0) 19:00:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d4}], 0x1}, 0x0) 19:00:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 19:00:19 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3e) 19:00:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(0xffffffffffffffff, r1, 0x0) 19:00:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:19 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) [ 731.644815] net_ratelimit: 16 callbacks suppressed [ 731.644824] protocol 88fb is buggy, dev hsr_slave_0 [ 731.649896] protocol 88fb is buggy, dev hsr_slave_1 19:00:19 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x3e) 19:00:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 19:00:19 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x3e) 19:00:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(0xffffffffffffffff, r1, 0x0) 19:00:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) [ 731.964800] protocol 88fb is buggy, dev hsr_slave_0 [ 731.969947] protocol 88fb is buggy, dev hsr_slave_1 [ 732.044772] protocol 88fb is buggy, dev hsr_slave_0 [ 732.049903] protocol 88fb is buggy, dev hsr_slave_1 [ 732.204799] protocol 88fb is buggy, dev hsr_slave_0 [ 732.210028] protocol 88fb is buggy, dev hsr_slave_1 [ 732.215232] protocol 88fb is buggy, dev hsr_slave_0 [ 732.220329] protocol 88fb is buggy, dev hsr_slave_1 19:00:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d4}], 0x1}, 0x0) 19:00:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xfcffffff}, 0x0) 19:00:20 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x3e) 19:00:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(0xffffffffffffffff, r1, 0x0) 19:00:20 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 19:00:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:20 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x3e) 19:00:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, 0xffffffffffffffff, 0x0) 19:00:20 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x3e) 19:00:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 19:00:21 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) lseek(r0, 0x0, 0x4) close(r0) 19:00:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:21 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x3e) 19:00:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, 0xffffffffffffffff, 0x0) 19:00:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 19:00:21 executing program 0: 19:00:21 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x3e) 19:00:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 19:00:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, 0xffffffffffffffff, 0x0) 19:00:21 executing program 0: 19:00:21 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x32030000]}, 0x3e) 19:00:21 executing program 0: 19:00:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xfffffffc}, 0x0) 19:00:21 executing program 4: 19:00:21 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) lseek(r0, 0x0, 0x4) close(r0) 19:00:21 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x3e) 19:00:21 executing program 4: 19:00:21 executing program 0: 19:00:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x40030000000000}, 0x0) 19:00:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:22 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000]}, 0x3e) 19:00:22 executing program 0: 19:00:22 executing program 4: 19:00:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:22 executing program 0: 19:00:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xf0ffffffffffff}, 0x0) 19:00:22 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) lseek(r0, 0x0, 0x4) close(r0) 19:00:22 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}, 0x3e) 19:00:22 executing program 4: 19:00:22 executing program 0: 19:00:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) 19:00:22 executing program 0: 19:00:22 executing program 4: 19:00:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 19:00:22 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000]}, 0x3e) 19:00:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x15, 0x10, 0x3, 0x0, 0x4}, 0x2c) 19:00:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:23 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}, 0x3e) 19:00:23 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x4) close(r0) 19:00:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x300000000000000}, 0x0) 19:00:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000000c80)={0x8, "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", 0xf05}, 0x1006) sendfile(r1, r1, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f0000000340)='./file0\x00', 0x0) 19:00:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setlease(r0, 0x400, 0x3) 19:00:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:23 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}, 0x3e) 19:00:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)={[{@uid={'uid'}}, {@gid={'gid', 0x3d, r1}}]}) 19:00:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x400000000000000}, 0x0) 19:00:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:23 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x69bb, 0x0, 0x2000000000000c, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 19:00:23 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x3e) 19:00:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xa00000000000000}, 0x0) 19:00:24 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x4) close(r0) 19:00:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890e, &(0x7f00000000c0)="000001000080000000e500") r1 = socket$inet6(0xa, 0x2000000080803, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0xb}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) r3 = dup2(r2, r2) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r4, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) ioctl$TIOCSRS485(r3, 0x542f, &(0x7f0000000240)={0x72, 0x8, 0x10001}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x4}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x1, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x2b, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0xffffff94, 0x4}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) close(0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) 19:00:24 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:24 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x3e) 19:00:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @rand_addr="e70dc070f62f2b7ba87a1720fab58803"}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) 19:00:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xe00000000000000}, 0x0) 19:00:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 19:00:24 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x3e) 19:00:24 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xf00000000000000}, 0x0) 19:00:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x5c, r1, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}]}}]}, 0x5c}}, 0x0) 19:00:24 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x4) close(r0) 19:00:24 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x3e) 19:00:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x1805000000000000}, 0x0) 19:00:24 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:24 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) [ 736.763028] audit: type=1400 audit(1563476424.580:95): avc: denied { ioctl } for pid=28092 comm="syz-executor.0" path="socket:[130231]" dev="sockfs" ino=130231 ioctlcmd=0x8933 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 736.802400] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 19:00:24 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x3e) 19:00:24 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x3f00000000000000}, 0x0) 19:00:24 executing program 0: r0 = memfd_create(&(0x7f0000000140)='y\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$P9_RMKNOD(r0, &(0x7f0000000040)={0x14}, 0x14) dup3(r1, r0, 0x0) [ 736.934779] net_ratelimit: 24 callbacks suppressed [ 736.934789] protocol 88fb is buggy, dev hsr_slave_0 [ 736.944961] protocol 88fb is buggy, dev hsr_slave_1 19:00:24 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") read(r0, &(0x7f0000367fe4)=""/91, 0x275) 19:00:24 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x3e) 19:00:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x6000000000000000}, 0x0) 19:00:25 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) close(r0) 19:00:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000040), 0x8) listen(r1, 0x0) 19:00:25 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca500864905e46bf070") sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0x107}], 0x4}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x9, r1, 0x0, 0x0) 19:00:25 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x3e) 19:00:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x9effffff00000000}, 0x0) 19:00:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca500864905e46bf070") sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfe}], 0x4}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x9, r1, 0x0, 0x0) 19:00:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xf0ffffff00000000}, 0x0) 19:00:25 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x3e) 19:00:25 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:25 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xfcffffff00000000}, 0x0) [ 737.787101] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 737.884779] protocol 88fb is buggy, dev hsr_slave_0 [ 737.889917] protocol 88fb is buggy, dev hsr_slave_1 19:00:25 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x3e) 19:00:25 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 19:00:25 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) close(r0) 19:00:25 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:26 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x3e) [ 738.214788] protocol 88fb is buggy, dev hsr_slave_0 [ 738.219962] protocol 88fb is buggy, dev hsr_slave_1 [ 738.237156] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 738.284789] protocol 88fb is buggy, dev hsr_slave_0 [ 738.289919] protocol 88fb is buggy, dev hsr_slave_1 [ 738.444783] protocol 88fb is buggy, dev hsr_slave_0 [ 738.449949] protocol 88fb is buggy, dev hsr_slave_1 19:00:28 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000030207031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 19:00:28 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xffffffff00000000}, 0x0) 19:00:28 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x3e) 19:00:28 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:28 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) close(r0) 19:00:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xfffffffffffff000}, 0x0) 19:00:28 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3203000000000000]}, 0x3e) 19:00:28 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x1f3, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) close(0xffffffffffffffff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000200)="b9800000c00f3235000100000f3048b8568b929eb42e3b020f23c00f21f835010003000f23f8440f01ca66b858008ec00f20d835200000000f22d866bad004ec650f01cf66baf80cb8bb6e038fef66bafc0cec363e450f3066b85e008ed8"}], 0x8b, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x1040000004, 0x0, 0x0, 0x0, 0x4cc]}) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'TPROXY\x00'}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 740.826891] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:00:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:28 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x3e) 19:00:28 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 741.094964] kvm [28249]: vcpu0, guest rIP: 0x205 Hyper-V unhandled rdmsr: 0x4000008a 19:00:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:28 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) [ 741.150814] kvm [28249]: vcpu0, guest rIP: 0x205 Hyper-V unhandled rdmsr: 0x40000014 19:00:29 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x3e) [ 741.200314] kvm [28249]: vcpu0, guest rIP: 0x205 Hyper-V unhandled rdmsr: 0x4000001e [ 741.258566] kvm [28249]: vcpu0, guest rIP: 0x205 Hyper-V unhandled rdmsr: 0x4000002c [ 741.312257] kvm [28249]: vcpu0, guest rIP: 0x205 Hyper-V unhandled rdmsr: 0x4000006e [ 741.345092] kvm [28249]: vcpu0, guest rIP: 0x205 Hyper-V unhandled rdmsr: 0x4000008c [ 741.358162] kvm [28249]: vcpu0, guest rIP: 0x205 Hyper-V unhandled rdmsr: 0x4000000c [ 741.376208] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 741.381261] kvm [28249]: vcpu0, guest rIP: 0x205 Hyper-V unhandled rdmsr: 0x4000000c [ 741.429347] kvm [28249]: vcpu0, guest rIP: 0x205 Hyper-V unhandled rdmsr: 0x4000000c [ 741.461759] kvm [28249]: vcpu0, guest rIP: 0x205 Hyper-V unhandled rdmsr: 0x4000000c 19:00:29 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(0xffffffffffffffff) 19:00:29 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}, 0x3e) 19:00:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66576c6510c597b6384bf631f83dfb68e9d6867fe7c0eb8b100576987a7dfaa8a1fed461069ecc"], 0x2c) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [], 0xa, "39980cfd42119cc4e1040300"/25}, 0x24) 19:00:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea01", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:29 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x3e) [ 741.773992] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:00:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_RMID(0x0, 0x0) 19:00:29 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}, 0x3e) 19:00:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 742.054785] net_ratelimit: 16 callbacks suppressed [ 742.054793] protocol 88fb is buggy, dev hsr_slave_0 [ 742.059880] protocol 88fb is buggy, dev hsr_slave_1 19:00:30 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(0xffffffffffffffff) 19:00:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea01", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:30 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x28, 0x6, 0x0, &(0x7f0000000000)=0xffffffffffffff42) 19:00:30 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x3e) 19:00:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 742.310933] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:00:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)="b2a34828e4a8ccabf4ec2efe9757a9b9c9713abd7c2d049e62b53816756fb289e9792408c942d77b3bdf99d84605c667d25e8dfd464df1f2e8072217") setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e60853167377400000100000000004300000000e403000000e901040000000000408000000000001b2300000503000018030000cc000000ac0300000000006952db7dbf6522af916bd282e0f34f8dfac0dc1695c4"], 0x1) [ 742.364770] protocol 88fb is buggy, dev hsr_slave_0 [ 742.369936] protocol 88fb is buggy, dev hsr_slave_1 19:00:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:30 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x3e) 19:00:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea01", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) [ 742.444785] protocol 88fb is buggy, dev hsr_slave_0 [ 742.449906] protocol 88fb is buggy, dev hsr_slave_1 19:00:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 742.604846] protocol 88fb is buggy, dev hsr_slave_0 [ 742.609972] protocol 88fb is buggy, dev hsr_slave_1 [ 742.615149] protocol 88fb is buggy, dev hsr_slave_0 [ 742.620564] protocol 88fb is buggy, dev hsr_slave_1 [ 742.701712] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:00:30 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(0xffffffffffffffff) 19:00:30 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x3e) 19:00:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x9, 0x4000000000000800, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000040), &(0x7f0000002180)=""/4096}, 0x18) 19:00:30 executing program 0: open(0x0, 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x19, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a7", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:30 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x3e) 19:00:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 743.077887] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:00:31 executing program 0: open(0x0, 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x19, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a7", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x24}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) 19:00:31 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x3e) [ 743.458923] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:00:31 executing program 4: setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x4e) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, 0x0) gettid() getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0xf7, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) tkill(0x0, 0x0) inotify_init() 19:00:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x19, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a7", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:31 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3e) 19:00:31 executing program 0: open(0x0, 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:00:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:31 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141044, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x81012, r0, 0x0) 19:00:31 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x3e) [ 743.836026] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:00:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x1d, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:31 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:31 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3e) 19:00:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:32 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="0f34"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'rose0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="37005a01ffa621898329290000ff20c6bf"]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 19:00:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x1d, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) [ 744.204780] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:00:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:32 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x3e) 19:00:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:00:34 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) 19:00:34 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x3e) 19:00:34 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x1d, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:35 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x3e) [ 747.222583] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:00:35 executing program 4: unshare(0x40000000) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 19:00:35 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 747.324764] net_ratelimit: 24 callbacks suppressed [ 747.324772] protocol 88fb is buggy, dev hsr_slave_0 [ 747.329818] protocol 88fb is buggy, dev hsr_slave_1 19:00:35 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x1f, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c874", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:35 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x3e) [ 747.398629] IPVS: ftp: loaded support on port[0] = 21 [ 747.552454] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 747.672220] IPVS: ftp: loaded support on port[0] = 21 [ 748.284857] protocol 88fb is buggy, dev hsr_slave_0 [ 748.290035] protocol 88fb is buggy, dev hsr_slave_1 [ 748.604789] protocol 88fb is buggy, dev hsr_slave_0 [ 748.609929] protocol 88fb is buggy, dev hsr_slave_1 [ 748.684767] protocol 88fb is buggy, dev hsr_slave_0 [ 748.689902] protocol 88fb is buggy, dev hsr_slave_1 [ 748.844776] protocol 88fb is buggy, dev hsr_slave_0 [ 748.849989] protocol 88fb is buggy, dev hsr_slave_1 19:00:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:00:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:38 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x3e) 19:00:38 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x1f, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c874", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:38 executing program 4: 19:00:38 executing program 4: 19:00:38 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x3e) 19:00:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x1f, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c874", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:38 executing program 4: 19:00:38 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:00:38 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x3e) 19:00:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:38 executing program 4: 19:00:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:38 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:39 executing program 4: 19:00:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:39 executing program 4: 19:00:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:39 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', 0x0, 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:39 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x3e) 19:00:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ftruncate(r1, 0x0) 19:00:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:39 executing program 4: 19:00:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:39 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', 0x0, 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:39 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x3e) 19:00:39 executing program 4: 19:00:39 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x3e) 19:00:39 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', 0x0, 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:40 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:40 executing program 4: [ 752.444798] net_ratelimit: 16 callbacks suppressed [ 752.444806] protocol 88fb is buggy, dev hsr_slave_0 [ 752.454925] protocol 88fb is buggy, dev hsr_slave_1 19:00:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ftruncate(r1, 0x0) 19:00:40 executing program 4: 19:00:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:40 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x332]}, 0x3e) 19:00:40 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:40 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) [ 752.764791] protocol 88fb is buggy, dev hsr_slave_0 [ 752.769922] protocol 88fb is buggy, dev hsr_slave_1 19:00:40 executing program 4: [ 752.811451] FAT-fs (loop0): bogus number of reserved sectors [ 752.844776] protocol 88fb is buggy, dev hsr_slave_0 [ 752.849977] protocol 88fb is buggy, dev hsr_slave_1 [ 752.854194] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:40 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x3e) 19:00:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:40 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:40 executing program 4: 19:00:40 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 753.016006] protocol 88fb is buggy, dev hsr_slave_0 [ 753.021134] protocol 88fb is buggy, dev hsr_slave_1 [ 753.026315] protocol 88fb is buggy, dev hsr_slave_0 [ 753.031407] protocol 88fb is buggy, dev hsr_slave_1 [ 753.158725] FAT-fs (loop0): bogus number of reserved sectors [ 753.180097] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ftruncate(r1, 0x0) 19:00:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:41 executing program 4: 19:00:41 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x3e) 19:00:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:41 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:41 executing program 4: 19:00:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 753.555516] FAT-fs (loop0): bogus number of reserved sectors 19:00:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:41 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x3e) [ 753.629938] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:41 executing program 4: 19:00:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:00:41 executing program 4: 19:00:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:41 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x3e) 19:00:41 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x0, 0x0, 0x0, 0x0) 19:00:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:42 executing program 4: 19:00:42 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3203]}, 0x3e) 19:00:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 754.255200] FAT-fs (loop0): bogus number of reserved sectors [ 754.282474] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, 0x0) dup3(r1, r0, 0x0) 19:00:42 executing program 4: 19:00:42 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x0, 0x0, 0x0, 0x0) [ 754.582464] FAT-fs (loop0): bogus number of reserved sectors [ 754.610243] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:00:42 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x3e) 19:00:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, 0x0) dup3(r1, r0, 0x0) 19:00:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:42 executing program 4: 19:00:42 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x0, 0x0, 0x0, 0x0) 19:00:42 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x3e) 19:00:42 executing program 4: [ 754.941253] FAT-fs (loop0): bogus number of reserved sectors [ 754.962365] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, 0x0) dup3(r1, r0, 0x0) 19:00:42 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x0, &(0x7f0000000040), 0x0, 0x0) 19:00:42 executing program 4: [ 755.223278] FAT-fs (loop0): bogus number of reserved sectors [ 755.229594] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:00:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:43 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x3e) 19:00:43 executing program 4: 19:00:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)) dup3(r1, r0, 0x0) 19:00:43 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x0, &(0x7f0000000040), 0x0, 0x0) 19:00:43 executing program 4: 19:00:43 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}, 0x3e) 19:00:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 755.666853] FAT-fs (loop0): bogus number of reserved sectors [ 755.700096] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:43 executing program 4: 19:00:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)) dup3(r1, r0, 0x0) 19:00:43 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x0, &(0x7f0000000040), 0x0, 0x0) [ 756.041707] FAT-fs (loop0): bogus number of reserved sectors [ 756.062277] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:00:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:44 executing program 4: 19:00:44 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}, 0x3e) 19:00:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)) dup3(r1, r0, 0x0) 19:00:44 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) 19:00:44 executing program 4: 19:00:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:44 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x3e) 19:00:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(0xffffffffffffffff, r0, 0x0) [ 756.424417] FAT-fs (loop0): bogus number of reserved sectors [ 756.451745] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:00:44 executing program 4: 19:00:44 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) 19:00:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:44 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x3e) 19:00:44 executing program 4: 19:00:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(0xffffffffffffffff, r0, 0x0) 19:00:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:44 executing program 4: [ 756.737847] FAT-fs (loop0): bogus number of reserved sectors [ 756.773590] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:00:44 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x3e) 19:00:44 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) 19:00:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(0xffffffffffffffff, r0, 0x0) 19:00:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:44 executing program 4: 19:00:44 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3e) 19:00:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x6) ftruncate(r1, 0x0) [ 757.105634] FAT-fs (loop0): bogus number of reserved sectors [ 757.111491] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:45 executing program 4: 19:00:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:45 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x3e) 19:00:45 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)}], 0x0, 0x0) 19:00:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, 0xffffffffffffffff, 0x0) 19:00:45 executing program 4: 19:00:45 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x3e) 19:00:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 757.435066] FAT-fs (loop0): bogus number of reserved sectors [ 757.469113] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, 0xffffffffffffffff, 0x0) 19:00:45 executing program 4: 19:00:45 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)}], 0x0, 0x0) [ 757.724803] net_ratelimit: 24 callbacks suppressed [ 757.724811] protocol 88fb is buggy, dev hsr_slave_0 [ 757.734967] protocol 88fb is buggy, dev hsr_slave_1 [ 757.756077] FAT-fs (loop0): bogus number of reserved sectors [ 757.767649] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x6) ftruncate(r1, 0x0) 19:00:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:45 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x3e) 19:00:45 executing program 4: 19:00:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, 0xffffffffffffffff, 0x0) 19:00:45 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)}], 0x0, 0x0) 19:00:45 executing program 4: 19:00:45 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x3e) [ 758.108434] FAT-fs (loop0): bogus number of reserved sectors [ 758.143893] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:46 executing program 5: 19:00:46 executing program 5: 19:00:46 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e6661740002044100050007", 0x13}], 0x0, 0x0) [ 758.517549] FAT-fs (loop0): invalid media value (0x00) [ 758.522880] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x6) ftruncate(r1, 0x0) 19:00:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xf, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x56, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f]}, 0x48) 19:00:46 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x3e) 19:00:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="3a88534a97a8762a515dec93baf4a98161978016df6ec750ae029bc63789b59ee60ceccefa40735c25107d52d18753b4bc561d382db5fa9b1390c0a64f7b4e33e1a4131c48b5acee0e0aba3093af5ec45dd5c0ecf516dd1bb340d0bde4794e1392eae89f3612b0e10096c79414a50ccd3624bac5dfa0133f99ebb6a40afc17d30e5169614ad41c11e997701e94179cce66ebcb3c7d260fdb837e6814d2f3d93a", 0xa0}], 0x4}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1a) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x9, r1, 0x0, 0x0) 19:00:46 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e6661740002044100050007", 0x13}], 0x0, 0x0) [ 758.684804] protocol 88fb is buggy, dev hsr_slave_0 [ 758.689997] protocol 88fb is buggy, dev hsr_slave_1 19:00:46 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x3e) 19:00:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca500864905e46bf070") sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfd}], 0x4}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 758.795384] FAT-fs (loop0): invalid media value (0x00) [ 758.821879] FAT-fs (loop0): Can't find a valid FAT filesystem 19:00:46 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e6661740002044100050007", 0x13}], 0x0, 0x0) 19:00:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket(0x0, 0x0, 0x0) openat$cgroup_type(r0, 0x0, 0x2, 0x0) 19:00:46 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x3e) [ 759.004779] protocol 88fb is buggy, dev hsr_slave_0 [ 759.009963] protocol 88fb is buggy, dev hsr_slave_1 [ 759.069499] FAT-fs (loop0): invalid media value (0x00) [ 759.084779] protocol 88fb is buggy, dev hsr_slave_0 [ 759.089948] protocol 88fb is buggy, dev hsr_slave_1 [ 759.110718] FAT-fs (loop0): Can't find a valid FAT filesystem [ 759.254784] protocol 88fb is buggy, dev hsr_slave_0 [ 759.259926] protocol 88fb is buggy, dev hsr_slave_1 19:00:47 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32030000]}, 0x3e) 19:00:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:47 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8c", 0x1c}], 0x0, 0x0) 19:00:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:00:49 executing program 5 (fault-call:6 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) io_setup(0xfe, &(0x7f00000001c0)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000300)={0x5, 0xff, 0x100, 0x800, 0x59, 0x7}) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x4, 0x202a41) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000180)={0x100000001, 0x2, 0x40}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r4 = getpgrp(0x0) sched_setaffinity(r4, 0x8, &(0x7f0000000340)=0x3) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x404000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="c574a204374e67be733e0d84398ea96aafe001330123a5fd0fac4038ad2a873872ee8b6fb804019bb54e6953786e09a1", @ANYRES16=r3, @ANYBLOB="040428bd70003f96c18d05564ef1b17cbe47c8515f00000064000200080005007f000000000000bb14000100fe800000000000000000000033450015080006000600000008000008000b000a00000008000e004e2200060000000000000000000000000000000000200000000b8f6e41169b006072aee13a0817e915768d8c"], 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x5) ioctl$KVM_ENABLE_CAP_CPU(r5, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) prctl$PR_SVE_SET_VL(0x32, 0x17199) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/member\x00', 0x2, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 19:00:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:49 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x3e) 19:00:49 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8c", 0x1c}], 0x0, 0x0) 19:00:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:00:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:49 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000]}, 0x3e) 19:00:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) io_setup(0xfe, &(0x7f00000001c0)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000300)={0x5, 0xff, 0x100, 0x800, 0x59, 0x7}) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x4, 0x202a41) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000180)={0x100000001, 0x2, 0x40}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r4 = getpgrp(0x0) sched_setaffinity(r4, 0x8, &(0x7f0000000340)=0x3) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x404000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="c574a204374e67be733e0d84398ea96aafe001330123a5fd0fac4038ad2a873872ee8b6fb804019bb54e6953786e09a1", @ANYRES16=r3, @ANYBLOB="040428bd70003f96c18d05564ef1b17cbe47c8515f00000064000200080005007f000000000000bb14000100fe800000000000000000000033450015080006000600000008000008000b000a00000008000e004e2200060000000000000000000000000000000000200000000b8f6e41169b006072aee13a0817e915768d8c"], 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x5) ioctl$KVM_ENABLE_CAP_CPU(r5, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x176], [0xc1]}) prctl$PR_SVE_SET_VL(0x32, 0x17199) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/member\x00', 0x2, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) [ 761.906473] FAULT_INJECTION: forcing a failure. [ 761.906473] name failslab, interval 1, probability 0, space 0, times 0 [ 761.961926] CPU: 1 PID: 29143 Comm: syz-executor.5 Not tainted 4.19.59 #32 [ 761.968989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.978357] Call Trace: [ 761.980977] dump_stack+0x172/0x1f0 [ 761.984637] should_fail.cold+0xa/0x1b [ 761.988555] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 761.993685] ? lock_downgrade+0x810/0x810 [ 761.997869] ? ___might_sleep+0x163/0x280 [ 762.002058] __should_failslab+0x121/0x190 [ 762.006312] should_failslab+0x9/0x14 [ 762.010121] kmem_cache_alloc_trace+0x2cc/0x760 [ 762.014806] ? find_held_lock+0x35/0x130 [ 762.018980] ? dev_map_notification+0x31b/0x450 [ 762.023828] netdevice_event+0x1c8/0x7e0 [ 762.027910] ? update_gid_event_work_handler+0xc0/0xc0 [ 762.033182] ? _roce_del_all_netdev_gids+0x30/0x30 [ 762.038128] ? roce_gid_type_mask_support+0x100/0x100 [ 762.043496] ? ip_vs_dst_event+0x262/0x680 [ 762.047763] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 762.052977] notifier_call_chain+0xc2/0x230 [ 762.057353] raw_notifier_call_chain+0x2e/0x40 [ 762.061958] call_netdevice_notifiers_info+0x3f/0x90 [ 762.067351] rollback_registered_many+0x993/0xf90 [ 762.072211] ? generic_xdp_install+0x3d0/0x3d0 [ 762.076800] ? mark_held_locks+0xb1/0x100 [ 762.081018] ? linkwatch_schedule_work+0x13c/0x170 [ 762.085946] ? queue_delayed_work_on+0xe6/0x200 [ 762.090614] ? lockdep_hardirqs_on+0x415/0x5d0 [ 762.095195] rollback_registered+0x109/0x1d0 [ 762.099593] ? rollback_registered_many+0xf90/0xf90 [ 762.104606] unregister_netdevice_queue+0x1ee/0x2c0 [ 762.109680] __tun_detach+0xd8a/0x1040 [ 762.113566] ? __tun_detach+0x1040/0x1040 [ 762.117704] tun_chr_close+0xe0/0x180 [ 762.121495] __fput+0x2dd/0x8b0 [ 762.124859] ____fput+0x16/0x20 [ 762.128302] task_work_run+0x145/0x1c0 [ 762.132186] exit_to_usermode_loop+0x273/0x2c0 [ 762.136774] do_syscall_64+0x53d/0x620 [ 762.140660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.145851] RIP: 0033:0x459819 [ 762.149390] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 762.168712] RSP: 002b:00007fe7aa712c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000124 [ 762.176409] RAX: 0000000000000003 RBX: 00007fe7aa712c90 RCX: 0000000000459819 [ 762.184109] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 762.191458] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 762.198812] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe7aa7136d4 [ 762.206070] R13: 00000000004bfea1 R14: 00000000004d1b40 R15: 0000000000000005 19:00:50 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}, 0x3e) 19:00:50 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8c", 0x1c}], 0x0, 0x0) 19:00:50 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000]}, 0x3e) 19:00:50 executing program 5 (fault-call:6 fault-nth:1): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:50 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9", 0x21}], 0x0, 0x0) 19:00:50 executing program 4 (fault-call:4 fault-nth:0): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:50 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}, 0x3e) [ 762.596430] FAULT_INJECTION: forcing a failure. [ 762.596430] name failslab, interval 1, probability 0, space 0, times 0 [ 762.617094] CPU: 0 PID: 29181 Comm: syz-executor.5 Not tainted 4.19.59 #32 [ 762.624325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 762.624332] Call Trace: [ 762.624356] dump_stack+0x172/0x1f0 [ 762.624379] should_fail.cold+0xa/0x1b [ 762.624394] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 762.624408] ? lock_downgrade+0x810/0x810 [ 762.624425] ? ___might_sleep+0x163/0x280 [ 762.658074] __should_failslab+0x121/0x190 [ 762.662330] should_failslab+0x9/0x14 [ 762.666249] kmem_cache_alloc_node+0x26c/0x710 [ 762.670853] ? lock_downgrade+0x810/0x810 [ 762.675042] __alloc_skb+0xd5/0x5f0 [ 762.678684] ? skb_scrub_packet+0x490/0x490 [ 762.683096] ? kfree+0x170/0x220 [ 762.686643] ? __devinet_sysctl_unregister.isra.0+0x6b/0xb0 [ 762.692364] ? kfree+0x170/0x220 [ 762.695754] ? lockdep_hardirqs_on+0x415/0x5d0 [ 762.700456] inet_netconf_notify_devconf+0xea/0x260 [ 762.705579] __devinet_sysctl_unregister.isra.0+0x85/0xb0 [ 762.711148] devinet_sysctl_unregister+0x92/0xf0 [ 762.715996] inetdev_event+0xa02/0x1230 [ 762.719996] ? lock_downgrade+0x810/0x810 [ 762.724172] ? kasan_check_read+0x11/0x20 [ 762.728345] ? inetdev_init+0x470/0x470 [ 762.732339] ? up_read+0x1a/0x110 [ 762.735812] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 762.741129] notifier_call_chain+0xc2/0x230 [ 762.745599] ? notifier_call_chain+0xc2/0x230 [ 762.750126] raw_notifier_call_chain+0x2e/0x40 [ 762.754718] call_netdevice_notifiers_info+0x3f/0x90 [ 762.754735] rollback_registered_many+0x993/0xf90 [ 762.754750] ? generic_xdp_install+0x3d0/0x3d0 [ 762.754769] ? mark_held_locks+0xb1/0x100 [ 762.754785] ? linkwatch_schedule_work+0x13c/0x170 [ 762.754804] ? queue_delayed_work_on+0xe6/0x200 [ 762.764720] ? lockdep_hardirqs_on+0x415/0x5d0 [ 762.764739] rollback_registered+0x109/0x1d0 [ 762.764753] ? rollback_registered_many+0xf90/0xf90 [ 762.764775] unregister_netdevice_queue+0x1ee/0x2c0 [ 762.764794] __tun_detach+0xd8a/0x1040 [ 762.764817] ? __tun_detach+0x1040/0x1040 [ 762.764830] tun_chr_close+0xe0/0x180 [ 762.764847] __fput+0x2dd/0x8b0 [ 762.817276] ____fput+0x16/0x20 [ 762.820578] task_work_run+0x145/0x1c0 [ 762.824491] exit_to_usermode_loop+0x273/0x2c0 [ 762.829109] do_syscall_64+0x53d/0x620 [ 762.833035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.838241] RIP: 0033:0x459819 [ 762.841443] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 762.860358] RSP: 002b:00007fe7aa712c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000124 [ 762.868438] RAX: 0000000000000003 RBX: 00007fe7aa712c90 RCX: 0000000000459819 [ 762.875900] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 762.883456] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:00:50 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}, 0x3e) 19:00:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) [ 762.890916] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe7aa7136d4 [ 762.898305] R13: 00000000004bfea1 R14: 00000000004d1b40 R15: 0000000000000005 [ 762.905908] net_ratelimit: 16 callbacks suppressed [ 762.905914] protocol 88fb is buggy, dev hsr_slave_0 [ 762.916016] protocol 88fb is buggy, dev hsr_slave_1 19:00:50 executing program 5 (fault-call:6 fault-nth:2): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:00:50 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9", 0x21}], 0x0, 0x0) 19:00:50 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x3e) 19:00:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:51 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) [ 763.164773] protocol 88fb is buggy, dev hsr_slave_0 [ 763.169949] protocol 88fb is buggy, dev hsr_slave_1 19:00:51 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x3e) [ 763.244764] protocol 88fb is buggy, dev hsr_slave_0 [ 763.249950] protocol 88fb is buggy, dev hsr_slave_1 [ 763.353211] FAULT_INJECTION: forcing a failure. [ 763.353211] name fail_futex, interval 1, probability 0, space 0, times 1 [ 763.387547] CPU: 1 PID: 29188 Comm: syz-executor.4 Not tainted 4.19.59 #32 [ 763.394682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.394688] Call Trace: [ 763.394708] dump_stack+0x172/0x1f0 [ 763.394727] should_fail.cold+0xa/0x1b [ 763.394744] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 763.394761] ? mark_held_locks+0x100/0x100 [ 763.394845] get_futex_key+0xb9a/0x1690 [ 763.394884] ? process_measurement+0xd5d/0x1560 [ 763.423965] ? find_held_lock+0x35/0x130 [ 763.436735] ? futex_lock_pi_atomic+0x2e0/0x2e0 [ 763.441451] futex_wake+0xf9/0x4d0 [ 763.445131] ? get_futex_key+0x1690/0x1690 [ 763.449401] ? __lock_acquire+0x6eb/0x48f0 [ 763.453666] do_futex+0x358/0x1d90 [ 763.457231] ? mark_held_locks+0x100/0x100 [ 763.461484] ? __might_fault+0x12b/0x1e0 [ 763.465571] ? exit_robust_list+0x2c0/0x2c0 [ 763.469993] ? __might_fault+0x12b/0x1e0 [ 763.474081] ? find_held_lock+0x35/0x130 [ 763.478154] ? __might_fault+0x12b/0x1e0 [ 763.482237] ? lock_downgrade+0x810/0x810 [ 763.486488] mm_release+0x33d/0x490 [ 763.490131] do_exit+0x42f/0x2fa0 [ 763.493601] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 763.499151] ? get_signal+0x384/0x1fc0 [ 763.503144] ? find_held_lock+0x35/0x130 [ 763.507226] ? mm_update_next_owner+0x660/0x660 [ 763.511928] ? _raw_spin_unlock_irq+0x28/0x90 [ 763.516441] ? get_signal+0x384/0x1fc0 [ 763.520342] ? _raw_spin_unlock_irq+0x28/0x90 [ 763.524864] do_group_exit+0x135/0x370 [ 763.528772] get_signal+0x3ec/0x1fc0 [ 763.532588] ? ext4_iomap_end+0x46/0x640 [ 763.536684] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 763.542245] ? __f_unlock_pos+0x19/0x20 [ 763.546242] do_signal+0x95/0x1960 [ 763.549812] ? setup_sigcontext+0x7d0/0x7d0 [ 763.554154] ? ext4_llseek+0x202/0x2d0 [ 763.558068] ? kasan_check_write+0x14/0x20 [ 763.562315] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 763.567179] ? wait_for_completion+0x440/0x440 [ 763.571792] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 763.576825] ? exit_to_usermode_loop+0x43/0x2c0 [ 763.581514] ? do_syscall_64+0x53d/0x620 [ 763.585588] ? exit_to_usermode_loop+0x43/0x2c0 [ 763.590284] ? lockdep_hardirqs_on+0x415/0x5d0 [ 763.594885] ? trace_hardirqs_on+0x67/0x220 [ 763.599230] exit_to_usermode_loop+0x244/0x2c0 [ 763.603833] do_syscall_64+0x53d/0x620 [ 763.607835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.613035] RIP: 0033:0x459819 [ 763.616253] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 763.635154] RSP: 002b:00007f07e3682c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 763.635169] RAX: 0000000000903000 RBX: 00007f07e3682c90 RCX: 0000000000459819 [ 763.635176] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 [ 763.635184] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 763.635191] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07e36836d4 [ 763.635203] R13: 00000000004c5a8b R14: 00000000004da0c0 R15: 0000000000000004 [ 763.657749] protocol 88fb is buggy, dev hsr_slave_0 [ 763.657810] protocol 88fb is buggy, dev hsr_slave_1 [ 763.657911] protocol 88fb is buggy, dev hsr_slave_0 [ 763.657961] protocol 88fb is buggy, dev hsr_slave_1 19:00:51 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:00:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:51 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x3e) 19:00:51 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9", 0x21}], 0x0, 0x0) 19:00:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:00:51 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x3e) 19:00:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:51 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x2) 19:00:51 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed", 0x23}], 0x0, 0x0) 19:00:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:00:51 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x3e) 19:00:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x3) 19:00:52 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x3e) 19:00:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:00:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:52 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed", 0x23}], 0x0, 0x0) 19:00:52 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0xc6, 0x4) close(r0) 19:00:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ftruncate(0xffffffffffffffff, 0x0) 19:00:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 19:00:52 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x3e) 19:00:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x4) 19:00:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ftruncate(0xffffffffffffffff, 0x0) 19:00:52 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed", 0x23}], 0x0, 0x0) 19:00:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ftruncate(0xffffffffffffffff, 0x0) 19:00:52 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x3e) 19:00:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x2) 19:00:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ftruncate(r0, 0x0) 19:00:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x5) 19:00:53 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0xc7, 0x4) close(r0) 19:00:53 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b", 0x24}], 0x0, 0x0) 19:00:53 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x3e) 19:00:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x3) 19:00:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x6) 19:00:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ftruncate(r0, 0x0) 19:00:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x4) 19:00:53 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x3e) 19:00:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x7) 19:00:53 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b", 0x24}], 0x0, 0x0) 19:00:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xa) 19:00:53 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x3e) 19:00:54 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x3f00, 0x4) close(r0) 19:00:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x8) 19:00:54 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b", 0x24}], 0x0, 0x0) 19:00:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xe) 19:00:54 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3203000000000000]}, 0x3e) 19:00:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ftruncate(r0, 0x0) 19:00:54 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x3e) 19:00:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xf) 19:00:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0xa) 19:00:54 executing program 0 (fault-call:1 fault-nth:0): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 767.052775] FAULT_INJECTION: forcing a failure. [ 767.052775] name failslab, interval 1, probability 0, space 0, times 0 [ 767.095960] CPU: 0 PID: 29428 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 767.103026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.112392] Call Trace: [ 767.115014] dump_stack+0x172/0x1f0 [ 767.118665] should_fail.cold+0xa/0x1b [ 767.122570] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 767.122589] ? lock_downgrade+0x810/0x810 [ 767.122605] ? ___might_sleep+0x163/0x280 [ 767.122626] __should_failslab+0x121/0x190 [ 767.136003] should_failslab+0x9/0x14 [ 767.136017] __kmalloc+0x2e2/0x750 [ 767.136035] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 767.136049] ? fput+0x128/0x1a0 [ 767.136064] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 767.136082] ? strnlen_user+0x15f/0x1e0 [ 767.136097] ? __x64_sys_memfd_create+0x13c/0x470 [ 767.136114] __x64_sys_memfd_create+0x13c/0x470 [ 767.136130] ? memfd_fcntl+0x1a50/0x1a50 [ 767.136144] ? do_syscall_64+0x26/0x620 [ 767.136159] ? lockdep_hardirqs_on+0x415/0x5d0 [ 767.136177] ? trace_hardirqs_on+0x67/0x220 [ 767.194456] do_syscall_64+0xfd/0x620 [ 767.198287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.203493] RIP: 0033:0x459819 [ 767.206697] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 767.225778] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 767.233505] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459819 19:00:55 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x3e) 19:00:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x60) [ 767.241256] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be72c [ 767.248550] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 767.255837] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd1a442f6d4 [ 767.263117] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:00:55 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0xc600, 0x4) close(r0) 19:00:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x48) 19:00:55 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}, 0x3e) 19:00:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xf0) 19:00:55 executing program 0 (fault-call:1 fault-nth:1): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 767.686654] FAULT_INJECTION: forcing a failure. [ 767.686654] name failslab, interval 1, probability 0, space 0, times 0 [ 767.725785] CPU: 1 PID: 29455 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 767.732839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.732852] Call Trace: [ 767.744836] dump_stack+0x172/0x1f0 [ 767.748515] should_fail.cold+0xa/0x1b [ 767.752433] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 767.757761] ? lock_downgrade+0x810/0x810 [ 767.757779] ? ___might_sleep+0x163/0x280 [ 767.757802] __should_failslab+0x121/0x190 [ 767.766124] should_failslab+0x9/0x14 [ 767.766138] kmem_cache_alloc+0x2ae/0x700 [ 767.766152] ? __alloc_fd+0x44d/0x560 [ 767.766167] ? shmem_destroy_callback+0xc0/0xc0 [ 767.766181] shmem_alloc_inode+0x1c/0x50 [ 767.778362] alloc_inode+0x64/0x190 [ 767.778380] new_inode_pseudo+0x19/0xf0 [ 767.778397] new_inode+0x1f/0x40 [ 767.778410] shmem_get_inode+0x84/0x780 [ 767.778428] __shmem_file_setup.part.0+0x7e/0x2b0 [ 767.790954] shmem_file_setup+0x66/0x90 [ 767.790976] __x64_sys_memfd_create+0x2a2/0x470 [ 767.790993] ? memfd_fcntl+0x1a50/0x1a50 [ 767.791010] ? do_syscall_64+0x26/0x620 [ 767.802142] ? lockdep_hardirqs_on+0x415/0x5d0 [ 767.811320] ? trace_hardirqs_on+0x67/0x220 [ 767.823999] do_syscall_64+0xfd/0x620 [ 767.824022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.836880] RIP: 0033:0x459819 [ 767.845861] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 767.868022] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 767.868038] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459819 [ 767.868045] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be72c [ 767.868053] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 767.868060] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd1a442f6d4 [ 767.868068] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 768.124773] net_ratelimit: 24 callbacks suppressed [ 768.124782] protocol 88fb is buggy, dev hsr_slave_0 [ 768.134945] protocol 88fb is buggy, dev hsr_slave_1 [ 769.084791] protocol 88fb is buggy, dev hsr_slave_0 [ 769.089914] protocol 88fb is buggy, dev hsr_slave_1 [ 769.404779] protocol 88fb is buggy, dev hsr_slave_0 [ 769.409905] protocol 88fb is buggy, dev hsr_slave_1 [ 769.485006] protocol 88fb is buggy, dev hsr_slave_0 [ 769.490086] protocol 88fb is buggy, dev hsr_slave_1 [ 769.884796] protocol 88fb is buggy, dev hsr_slave_0 [ 769.889906] protocol 88fb is buggy, dev hsr_slave_1 19:00:57 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ftruncate(r0, 0x0) 19:00:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x300) 19:00:57 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x3e) 19:00:57 executing program 0 (fault-call:1 fault-nth:2): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x4c) 19:00:57 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0xc700, 0x4) close(r0) 19:00:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x518) [ 770.122792] FAULT_INJECTION: forcing a failure. [ 770.122792] name failslab, interval 1, probability 0, space 0, times 0 [ 770.172240] CPU: 0 PID: 29482 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 770.179423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.188979] Call Trace: [ 770.191616] dump_stack+0x172/0x1f0 [ 770.195283] should_fail.cold+0xa/0x1b [ 770.199202] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 770.204334] ? percpu_ref_put_many+0x94/0x190 [ 770.208855] ? ___might_sleep+0x163/0x280 [ 770.208879] __should_failslab+0x121/0x190 [ 770.217237] should_failslab+0x9/0x14 19:00:58 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}, 0x3e) [ 770.217249] kmem_cache_alloc+0x2ae/0x700 [ 770.217335] ? map_id_range_down+0x1ee/0x370 [ 770.217353] ? __put_user_ns+0x70/0x70 [ 770.233583] selinux_inode_alloc_security+0xb6/0x2a0 [ 770.238715] security_inode_alloc+0x8a/0xd0 [ 770.243103] inode_init_always+0x56e/0xb40 [ 770.247360] alloc_inode+0x81/0x190 [ 770.251010] new_inode_pseudo+0x19/0xf0 [ 770.255005] new_inode+0x1f/0x40 [ 770.258391] shmem_get_inode+0x84/0x780 [ 770.262389] __shmem_file_setup.part.0+0x7e/0x2b0 [ 770.267248] shmem_file_setup+0x66/0x90 [ 770.267274] __x64_sys_memfd_create+0x2a2/0x470 [ 770.267291] ? memfd_fcntl+0x1a50/0x1a50 [ 770.280082] ? do_syscall_64+0x26/0x620 [ 770.284093] ? lockdep_hardirqs_on+0x415/0x5d0 [ 770.288695] ? trace_hardirqs_on+0x67/0x220 [ 770.288716] do_syscall_64+0xfd/0x620 [ 770.296840] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.302144] RIP: 0033:0x459819 19:00:58 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x3e) [ 770.305355] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 770.324280] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 770.332013] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459819 [ 770.339390] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be72c [ 770.346682] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 770.353971] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd1a442f6d4 [ 770.361270] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:00:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xa00) 19:00:58 executing program 0 (fault-call:1 fault-nth:3): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:00:58 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ftruncate(r0, 0x0) 19:00:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x68) [ 770.508875] FAULT_INJECTION: forcing a failure. [ 770.508875] name failslab, interval 1, probability 0, space 0, times 0 [ 770.553964] CPU: 0 PID: 29505 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 770.561212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.570588] Call Trace: [ 770.573188] dump_stack+0x172/0x1f0 [ 770.573216] should_fail.cold+0xa/0x1b [ 770.580745] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 770.585871] ? lock_downgrade+0x810/0x810 [ 770.590026] ? ___might_sleep+0x163/0x280 [ 770.594189] __should_failslab+0x121/0x190 [ 770.598431] should_failslab+0x9/0x14 [ 770.598446] kmem_cache_alloc+0x2ae/0x700 [ 770.598525] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 770.598545] ? lockdep_hardirqs_on+0x415/0x5d0 [ 770.616338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 770.621892] ? timespec64_trunc+0xf0/0x180 [ 770.621911] __d_alloc+0x2e/0x9c0 [ 770.621926] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 770.621943] d_alloc_pseudo+0x1e/0x70 [ 770.638610] alloc_file_pseudo+0xe2/0x280 [ 770.642776] ? __lockdep_init_map+0x10c/0x5b0 [ 770.647284] ? alloc_file+0x4d0/0x4d0 [ 770.647301] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 770.647319] ? kasan_check_write+0x14/0x20 [ 770.647338] __shmem_file_setup.part.0+0x108/0x2b0 [ 770.647353] shmem_file_setup+0x66/0x90 [ 770.647372] __x64_sys_memfd_create+0x2a2/0x470 [ 770.647387] ? memfd_fcntl+0x1a50/0x1a50 [ 770.647402] ? do_syscall_64+0x26/0x620 [ 770.647418] ? lockdep_hardirqs_on+0x415/0x5d0 [ 770.647434] ? trace_hardirqs_on+0x67/0x220 [ 770.647450] do_syscall_64+0xfd/0x620 [ 770.666007] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.666019] RIP: 0033:0x459819 19:00:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xe00) 19:00:58 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x3e) [ 770.666032] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 770.666040] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 770.666054] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459819 [ 770.666061] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be72c [ 770.666069] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 770.666076] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd1a442f6d4 [ 770.666084] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:00:58 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x3e) 19:00:58 executing program 0 (fault-call:1 fault-nth:4): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 771.009436] FAULT_INJECTION: forcing a failure. [ 771.009436] name failslab, interval 1, probability 0, space 0, times 0 [ 771.056560] CPU: 0 PID: 29536 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 771.063632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 771.073096] Call Trace: [ 771.075717] dump_stack+0x172/0x1f0 [ 771.079376] should_fail.cold+0xa/0x1b [ 771.083294] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 771.088420] ? lock_downgrade+0x810/0x810 [ 771.092589] ? ___might_sleep+0x163/0x280 [ 771.096843] __should_failslab+0x121/0x190 [ 771.101092] should_failslab+0x9/0x14 [ 771.104902] kmem_cache_alloc+0x2ae/0x700 [ 771.109071] __alloc_file+0x27/0x300 [ 771.112794] alloc_empty_file+0x72/0x170 [ 771.116869] alloc_file+0x5e/0x4d0 [ 771.120515] alloc_file_pseudo+0x189/0x280 [ 771.124762] ? alloc_file+0x4d0/0x4d0 [ 771.128578] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 771.134130] ? kasan_check_write+0x14/0x20 [ 771.138381] __shmem_file_setup.part.0+0x108/0x2b0 [ 771.143337] shmem_file_setup+0x66/0x90 [ 771.147338] __x64_sys_memfd_create+0x2a2/0x470 [ 771.152020] ? memfd_fcntl+0x1a50/0x1a50 [ 771.156098] ? do_syscall_64+0x26/0x620 [ 771.160087] ? lockdep_hardirqs_on+0x415/0x5d0 [ 771.164683] ? trace_hardirqs_on+0x67/0x220 [ 771.169037] do_syscall_64+0xfd/0x620 [ 771.172863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.178165] RIP: 0033:0x459819 [ 771.182957] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:00:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xf00) 19:00:59 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x6c) 19:00:59 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x2b300, 0x4) close(r0) 19:00:59 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x3e) [ 771.201967] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 771.209705] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459819 [ 771.216991] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be72c [ 771.224279] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 771.231563] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd1a442f6d4 [ 771.238846] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:00:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x1805) 19:00:59 executing program 0 (fault-call:1 fault-nth:5): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 771.571104] FAULT_INJECTION: forcing a failure. [ 771.571104] name failslab, interval 1, probability 0, space 0, times 0 [ 771.588768] CPU: 0 PID: 29562 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 771.595947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 771.605322] Call Trace: [ 771.608024] dump_stack+0x172/0x1f0 [ 771.611696] should_fail.cold+0xa/0x1b [ 771.615613] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 771.620740] ? lock_downgrade+0x810/0x810 [ 771.624919] ? ___might_sleep+0x163/0x280 [ 771.629091] __should_failslab+0x121/0x190 [ 771.633347] should_failslab+0x9/0x14 [ 771.637168] kmem_cache_alloc+0x2ae/0x700 [ 771.641339] ? rcu_read_lock_sched_held+0x110/0x130 [ 771.646375] selinux_file_alloc_security+0xb4/0x190 [ 771.651410] security_file_alloc+0x63/0xa0 [ 771.655665] __alloc_file+0x9d/0x300 [ 771.659658] alloc_empty_file+0x72/0x170 [ 771.663748] alloc_file+0x5e/0x4d0 [ 771.667338] alloc_file_pseudo+0x189/0x280 [ 771.671588] ? alloc_file+0x4d0/0x4d0 [ 771.675416] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 771.680969] ? kasan_check_write+0x14/0x20 [ 771.685222] __shmem_file_setup.part.0+0x108/0x2b0 [ 771.690181] shmem_file_setup+0x66/0x90 [ 771.694175] __x64_sys_memfd_create+0x2a2/0x470 [ 771.698862] ? memfd_fcntl+0x1a50/0x1a50 [ 771.702940] ? do_syscall_64+0x26/0x620 [ 771.706927] ? lockdep_hardirqs_on+0x415/0x5d0 [ 771.711523] ? trace_hardirqs_on+0x67/0x220 [ 771.715862] do_syscall_64+0xfd/0x620 [ 771.719680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.725074] RIP: 0033:0x459819 [ 771.728451] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 771.747368] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 771.755101] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459819 [ 771.762393] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be72c [ 771.769709] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 771.777086] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd1a442f6d4 [ 771.784476] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 773.324860] net_ratelimit: 16 callbacks suppressed [ 773.324869] protocol 88fb is buggy, dev hsr_slave_0 [ 773.334966] protocol 88fb is buggy, dev hsr_slave_1 [ 773.564804] protocol 88fb is buggy, dev hsr_slave_0 [ 773.569943] protocol 88fb is buggy, dev hsr_slave_1 19:01:01 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ftruncate(r0, 0x0) 19:01:01 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x3e) 19:01:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x3f00) 19:01:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x6e) 19:01:01 executing program 0 (fault-call:1 fault-nth:6): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:01 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0xb30200, 0x4) close(r0) [ 773.644787] protocol 88fb is buggy, dev hsr_slave_0 [ 773.649930] protocol 88fb is buggy, dev hsr_slave_1 19:01:01 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3e) 19:01:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x6000) [ 773.709571] FAULT_INJECTION: forcing a failure. [ 773.709571] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 773.754849] CPU: 1 PID: 29576 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 773.761905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 773.771272] Call Trace: [ 773.771307] dump_stack+0x172/0x1f0 [ 773.771329] should_fail.cold+0xa/0x1b [ 773.771348] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 773.771362] ? ___might_sleep+0x163/0x280 [ 773.771376] ? __might_sleep+0x95/0x190 [ 773.771395] __alloc_pages_nodemask+0x1ee/0x760 [ 773.771414] ? lock_downgrade+0x810/0x810 [ 773.804500] ? __alloc_pages_slowpath+0x2870/0x2870 [ 773.809551] ? avc_has_perm_noaudit+0x3b6/0x570 [ 773.814424] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 773.819992] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 773.825560] alloc_pages_vma+0xdd/0x5a0 [ 773.829564] shmem_alloc_page+0xc0/0x180 [ 773.833644] ? shmem_swapin+0x1a0/0x1a0 [ 773.837643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.843219] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 773.848253] ? __vm_enough_memory+0x324/0x5a0 19:01:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xf000) [ 773.852773] shmem_alloc_and_acct_page+0x165/0x970 [ 773.857720] shmem_getpage_gfp+0x44a/0x3960 [ 773.862064] ? shmem_add_to_page_cache+0xd30/0xd30 [ 773.867018] ? current_time+0x6f/0x140 [ 773.870928] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 773.876147] ? lockdep_hardirqs_on+0x415/0x5d0 [ 773.880782] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 773.886341] ? iov_iter_fault_in_readable+0x22c/0x450 [ 773.891577] shmem_write_begin+0x10b/0x1e0 [ 773.895841] generic_perform_write+0x22a/0x520 [ 773.900464] ? page_endio+0x780/0x780 19:01:01 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x3e) [ 773.904372] ? current_time+0x140/0x140 [ 773.908464] ? lock_acquire+0x16f/0x3f0 [ 773.912471] __generic_file_write_iter+0x25e/0x630 [ 773.917437] generic_file_write_iter+0x383/0x730 [ 773.922220] __vfs_write+0x587/0x810 [ 773.926038] ? kernel_read+0x120/0x120 [ 773.929963] ? rcu_read_lock_sched_held+0x110/0x130 [ 773.935003] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 773.939783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.945411] ? __sb_start_write+0x1ac/0x360 [ 773.949758] vfs_write+0x20c/0x560 [ 773.953319] ksys_pwrite64+0x183/0x1c0 [ 773.957237] ? __ia32_sys_pread64+0xf0/0xf0 [ 773.961661] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 773.966414] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 773.966433] ? do_syscall_64+0x26/0x620 [ 773.966450] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.966461] ? do_syscall_64+0x26/0x620 [ 773.966479] __x64_sys_pwrite64+0x97/0xf0 [ 773.966495] do_syscall_64+0xfd/0x620 [ 773.966512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.966527] RIP: 0033:0x413767 [ 773.975231] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 773.975240] RSP: 002b:00007fd1a442ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 773.975256] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000413767 [ 773.975264] RDX: 0000000000000025 RSI: 00000000200003c0 RDI: 0000000000000005 [ 773.975272] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 19:01:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x34000) [ 773.975279] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005 [ 773.975287] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 774.067042] protocol 88fb is buggy, dev hsr_slave_0 [ 774.072229] protocol 88fb is buggy, dev hsr_slave_1 [ 774.077416] protocol 88fb is buggy, dev hsr_slave_0 [ 774.082499] protocol 88fb is buggy, dev hsr_slave_1 19:01:02 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x74) [ 774.142433] FAT-fs (loop0): bogus number of reserved sectors [ 774.168969] FAT-fs (loop0): Can't find a valid FAT filesystem 19:01:04 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:04 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3e) 19:01:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x400300) 19:01:04 executing program 0 (fault-call:1 fault-nth:7): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x7a) 19:01:04 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0xf0ff00, 0x4) close(r0) [ 776.735925] FAULT_INJECTION: forcing a failure. [ 776.735925] name failslab, interval 1, probability 0, space 0, times 0 [ 776.791672] CPU: 0 PID: 29625 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 776.798730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.798736] Call Trace: [ 776.798762] dump_stack+0x172/0x1f0 [ 776.798784] should_fail.cold+0xa/0x1b [ 776.798801] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 776.798817] ? lock_downgrade+0x810/0x810 [ 776.798833] ? ___might_sleep+0x163/0x280 [ 776.798852] __should_failslab+0x121/0x190 [ 776.798868] should_failslab+0x9/0x14 [ 776.798882] kmem_cache_alloc+0x2ae/0x700 [ 776.798897] ? lock_downgrade+0x810/0x810 [ 776.798914] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.798927] ? check_preemption_disabled+0x48/0x290 [ 776.798945] getname_flags+0xd6/0x5b0 [ 776.840354] getname+0x1a/0x20 [ 776.840372] do_sys_open+0x2c9/0x550 [ 776.840389] ? filp_open+0x80/0x80 [ 776.854207] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 776.878165] ? do_syscall_64+0x26/0x620 [ 776.878184] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.878200] ? do_syscall_64+0x26/0x620 19:01:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xf0ffff) 19:01:04 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x3e) [ 776.891508] __x64_sys_open+0x7e/0xc0 [ 776.895333] do_syscall_64+0xfd/0x620 [ 776.899158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.904370] RIP: 0033:0x413701 [ 776.907575] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 776.926925] RSP: 002b:00007fd1a442ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 776.934664] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413701 19:01:04 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x3e) 19:01:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x1000000) [ 776.941947] RDX: 00007fd1a442eb0a RSI: 0000000000000002 RDI: 00007fd1a442eb00 [ 776.949405] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 776.956694] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 776.963969] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:04 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:04 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x3e) 19:01:04 executing program 0 (fault-call:1 fault-nth:8): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x300) 19:01:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x2000000) [ 777.321684] FAULT_INJECTION: forcing a failure. [ 777.321684] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 777.333544] CPU: 0 PID: 29664 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 777.340771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.350141] Call Trace: [ 777.352750] dump_stack+0x172/0x1f0 [ 777.356408] should_fail.cold+0xa/0x1b [ 777.360323] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 777.365454] ? mark_held_locks+0x100/0x100 [ 777.369717] __alloc_pages_nodemask+0x1ee/0x760 [ 777.374400] ? delayacct_end+0x5c/0x100 [ 777.378396] ? __alloc_pages_slowpath+0x2870/0x2870 [ 777.383423] ? find_held_lock+0x35/0x130 [ 777.387520] cache_grow_begin+0x9c/0x8b0 [ 777.391597] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 777.397154] ? check_preemption_disabled+0x48/0x290 [ 777.402193] kmem_cache_alloc+0x63b/0x700 [ 777.406369] getname_flags+0xd6/0x5b0 [ 777.410187] getname+0x1a/0x20 [ 777.413416] do_sys_open+0x2c9/0x550 [ 777.417147] ? filp_open+0x80/0x80 [ 777.420735] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 777.425506] ? do_syscall_64+0x26/0x620 [ 777.429502] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.434883] ? do_syscall_64+0x26/0x620 [ 777.438877] __x64_sys_open+0x7e/0xc0 [ 777.442693] do_syscall_64+0xfd/0x620 [ 777.446514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.451707] RIP: 0033:0x413701 19:01:05 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x3e) [ 777.454906] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 777.473829] RSP: 002b:00007fd1a442ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 777.481657] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413701 [ 777.488944] RDX: 00007fd1a442eb0a RSI: 0000000000000002 RDI: 00007fd1a442eb00 [ 777.496229] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 777.503512] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 777.510969] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x3000000) [ 777.682361] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:01:05 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0xfff000, 0x4) close(r0) 19:01:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x500) 19:01:05 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x3e) 19:01:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x4000000) 19:01:05 executing program 0 (fault-call:1 fault-nth:9): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 777.975071] FAULT_INJECTION: forcing a failure. [ 777.975071] name failslab, interval 1, probability 0, space 0, times 0 [ 777.998537] CPU: 1 PID: 29694 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 778.005610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.014979] Call Trace: [ 778.017587] dump_stack+0x172/0x1f0 [ 778.021332] should_fail.cold+0xa/0x1b [ 778.025236] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 778.030361] ? lock_downgrade+0x810/0x810 [ 778.034534] ? ___might_sleep+0x163/0x280 [ 778.038698] __should_failslab+0x121/0x190 [ 778.043034] should_failslab+0x9/0x14 [ 778.046848] kmem_cache_alloc+0x2ae/0x700 [ 778.051056] ? __save_stack_trace+0x99/0x100 [ 778.055483] __alloc_file+0x27/0x300 [ 778.059204] alloc_empty_file+0x72/0x170 [ 778.063383] path_openat+0xef/0x4690 [ 778.067114] ? __lock_acquire+0x6eb/0x48f0 [ 778.071356] ? getname+0x1a/0x20 [ 778.074731] ? do_sys_open+0x2c9/0x550 [ 778.078622] ? __x64_sys_open+0x7e/0xc0 [ 778.082605] ? do_syscall_64+0xfd/0x620 [ 778.086594] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.091986] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 778.096682] ? __lock_is_held+0xb6/0x140 [ 778.100947] ? __alloc_fd+0x44d/0x560 [ 778.104776] do_filp_open+0x1a1/0x280 [ 778.108594] ? may_open_dev+0x100/0x100 [ 778.112587] ? lock_downgrade+0x810/0x810 [ 778.116753] ? kasan_check_read+0x11/0x20 [ 778.120916] ? do_raw_spin_unlock+0x57/0x270 [ 778.125341] ? _raw_spin_unlock+0x2d/0x50 [ 778.129502] ? __alloc_fd+0x44d/0x560 [ 778.133329] do_sys_open+0x3fe/0x550 [ 778.137068] ? filp_open+0x80/0x80 [ 778.140627] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 778.145393] ? do_syscall_64+0x26/0x620 [ 778.149373] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.154737] ? do_syscall_64+0x26/0x620 [ 778.158707] __x64_sys_open+0x7e/0xc0 [ 778.162623] do_syscall_64+0xfd/0x620 [ 778.166424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.171688] RIP: 0033:0x413701 [ 778.174999] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 778.193909] RSP: 002b:00007fd1a442ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 778.201635] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413701 [ 778.208925] RDX: 00007fd1a442eb0a RSI: 0000000000000002 RDI: 00007fd1a442eb00 [ 778.216216] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 778.223500] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 778.230765] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 778.524782] net_ratelimit: 24 callbacks suppressed [ 778.529764] protocol 88fb is buggy, dev hsr_slave_0 [ 778.534923] protocol 88fb is buggy, dev hsr_slave_1 [ 779.574877] protocol 88fb is buggy, dev hsr_slave_0 [ 779.580052] protocol 88fb is buggy, dev hsr_slave_1 [ 779.804788] protocol 88fb is buggy, dev hsr_slave_0 [ 779.809873] protocol 88fb is buggy, dev hsr_slave_1 [ 779.884792] protocol 88fb is buggy, dev hsr_slave_0 [ 779.889902] protocol 88fb is buggy, dev hsr_slave_1 19:01:07 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:07 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x1000000, 0x4) close(r0) 19:01:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xa000000) 19:01:07 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x3e) 19:01:07 executing program 0 (fault-call:1 fault-nth:10): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x600) 19:01:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xe000000) 19:01:08 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x3e) [ 780.222606] FAULT_INJECTION: forcing a failure. [ 780.222606] name failslab, interval 1, probability 0, space 0, times 0 [ 780.284774] protocol 88fb is buggy, dev hsr_slave_0 [ 780.285918] CPU: 1 PID: 29717 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 780.289888] protocol 88fb is buggy, dev hsr_slave_1 [ 780.296858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 780.296864] Call Trace: [ 780.296890] dump_stack+0x172/0x1f0 [ 780.296917] should_fail.cold+0xa/0x1b [ 780.321470] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 780.326605] ? lock_downgrade+0x810/0x810 [ 780.330909] ? ___might_sleep+0x163/0x280 [ 780.335088] __should_failslab+0x121/0x190 [ 780.339344] should_failslab+0x9/0x14 [ 780.343163] kmem_cache_alloc+0x2ae/0x700 [ 780.347431] ? rcu_read_lock_sched_held+0x110/0x130 [ 780.352578] selinux_file_alloc_security+0xb4/0x190 [ 780.357620] security_file_alloc+0x63/0xa0 [ 780.361884] __alloc_file+0x9d/0x300 [ 780.365618] alloc_empty_file+0x72/0x170 [ 780.369702] path_openat+0xef/0x4690 [ 780.373444] ? __lock_acquire+0x6eb/0x48f0 [ 780.377692] ? getname+0x1a/0x20 [ 780.381072] ? do_sys_open+0x2c9/0x550 [ 780.384973] ? __x64_sys_open+0x7e/0xc0 [ 780.388964] ? do_syscall_64+0xfd/0x620 [ 780.392953] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.398347] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 780.403040] ? __lock_is_held+0xb6/0x140 [ 780.407218] ? __alloc_fd+0x44d/0x560 [ 780.411220] do_filp_open+0x1a1/0x280 [ 780.415043] ? may_open_dev+0x100/0x100 [ 780.419035] ? lock_downgrade+0x810/0x810 [ 780.423211] ? kasan_check_read+0x11/0x20 [ 780.427374] ? do_raw_spin_unlock+0x57/0x270 [ 780.431801] ? _raw_spin_unlock+0x2d/0x50 [ 780.435964] ? __alloc_fd+0x44d/0x560 [ 780.439809] do_sys_open+0x3fe/0x550 [ 780.443550] ? filp_open+0x80/0x80 [ 780.447112] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 780.451885] ? do_syscall_64+0x26/0x620 [ 780.456398] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.461783] ? do_syscall_64+0x26/0x620 [ 780.465788] __x64_sys_open+0x7e/0xc0 [ 780.469607] do_syscall_64+0xfd/0x620 [ 780.473518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.478722] RIP: 0033:0x413701 [ 780.481933] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 780.501461] RSP: 002b:00007fd1a442ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 780.509195] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413701 [ 780.516485] RDX: 00007fd1a442eb0a RSI: 0000000000000002 RDI: 00007fd1a442eb00 [ 780.523771] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 780.531063] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 780.538346] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:08 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x3e) 19:01:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x700) 19:01:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xf000000) 19:01:08 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x3e) 19:01:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ftruncate(r0, 0x0) 19:01:09 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x3f000000, 0x4) close(r0) 19:01:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0xa00) 19:01:09 executing program 0 (fault-call:1 fault-nth:11): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x18050000) 19:01:09 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x3e) [ 781.256855] FAULT_INJECTION: forcing a failure. [ 781.256855] name failslab, interval 1, probability 0, space 0, times 0 [ 781.277852] CPU: 1 PID: 29767 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 781.284915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.294287] Call Trace: [ 781.296906] dump_stack+0x172/0x1f0 [ 781.300569] should_fail.cold+0xa/0x1b [ 781.304486] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 781.309619] ? lock_downgrade+0x810/0x810 [ 781.313808] ? ___might_sleep+0x163/0x280 [ 781.317986] __should_failslab+0x121/0x190 [ 781.322243] should_failslab+0x9/0x14 [ 781.326057] kmem_cache_alloc_trace+0x2cc/0x760 [ 781.330839] ? __lockdep_init_map+0x10c/0x5b0 [ 781.335444] ? loop_info64_to_compat+0x6d0/0x6d0 [ 781.340219] __kthread_create_on_node+0xf2/0x460 [ 781.345078] ? lock_acquire+0x16f/0x3f0 [ 781.349068] ? kthread_parkme+0xb0/0xb0 [ 781.353065] ? lo_ioctl+0x1c4/0x20e0 [ 781.356791] ? lock_downgrade+0x810/0x810 [ 781.361125] ? mutex_trylock+0x1e0/0x1e0 [ 781.365206] ? loop_info64_to_compat+0x6d0/0x6d0 [ 781.369975] kthread_create_on_node+0xbb/0xf0 [ 781.374483] ? __kthread_create_on_node+0x460/0x460 [ 781.379515] ? __lockdep_init_map+0x10c/0x5b0 [ 781.384032] ? __lockdep_init_map+0x10c/0x5b0 [ 781.388555] lo_ioctl+0xaf2/0x20e0 [ 781.392114] ? lo_rw_aio_complete+0x350/0x350 [ 781.396717] blkdev_ioctl+0xc38/0x1ac0 [ 781.400624] ? blkpg_ioctl+0xa90/0xa90 [ 781.404524] ? find_held_lock+0x35/0x130 [ 781.408631] ? debug_check_no_obj_freed+0x200/0x464 [ 781.413663] ? __fget+0x340/0x540 [ 781.417128] ? ___might_sleep+0x163/0x280 [ 781.421356] block_ioctl+0xee/0x130 [ 781.424998] ? blkdev_fallocate+0x410/0x410 [ 781.429329] do_vfs_ioctl+0xd5f/0x1380 [ 781.433232] ? selinux_file_ioctl+0x46f/0x5e0 [ 781.437756] ? selinux_file_ioctl+0x125/0x5e0 [ 781.442268] ? ioctl_preallocate+0x210/0x210 [ 781.446728] ? selinux_file_mprotect+0x620/0x620 [ 781.451508] ? iterate_fd+0x360/0x360 [ 781.455325] ? do_sys_open+0x31d/0x550 [ 781.459235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 781.464866] ? security_file_ioctl+0x8d/0xc0 [ 781.469288] ksys_ioctl+0xab/0xd0 [ 781.472760] __x64_sys_ioctl+0x73/0xb0 [ 781.476667] do_syscall_64+0xfd/0x620 [ 781.480490] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 781.485691] RIP: 0033:0x459687 [ 781.488902] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:01:09 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x332]}, 0x3e) 19:01:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x3f000000) [ 781.507812] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 781.515570] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459687 [ 781.522854] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 781.530146] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 781.537430] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 781.544713] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:09 executing program 0 (fault-call:1 fault-nth:12): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:09 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x3e) 19:01:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0xe0e) 19:01:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x60000000) [ 781.881453] FAULT_INJECTION: forcing a failure. [ 781.881453] name failslab, interval 1, probability 0, space 0, times 0 [ 781.921017] CPU: 0 PID: 29795 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 781.928079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.937456] Call Trace: [ 781.940072] dump_stack+0x172/0x1f0 [ 781.943723] should_fail.cold+0xa/0x1b [ 781.947638] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 781.952768] ? lock_downgrade+0x810/0x810 [ 781.956935] ? ___might_sleep+0x163/0x280 [ 781.961105] __should_failslab+0x121/0x190 [ 781.965353] should_failslab+0x9/0x14 [ 781.969156] kmem_cache_alloc+0x2ae/0x700 [ 781.973317] ? __schedule+0x137a/0x1c70 [ 781.977380] __kernfs_new_node+0xef/0x680 [ 781.981543] ? _raw_spin_unlock_irq+0x28/0x90 [ 781.986053] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 781.990858] ? __lock_acquire+0x6eb/0x48f0 [ 781.995106] ? _raw_spin_unlock_irq+0x5e/0x90 [ 781.999611] ? __schedule+0x137a/0x1c70 [ 782.003597] ? __lock_is_held+0xb6/0x140 [ 782.007718] kernfs_new_node+0x99/0x130 [ 782.012236] kernfs_create_dir_ns+0x52/0x160 [ 782.016661] internal_create_group+0x1cb/0xc30 [ 782.021255] ? bd_set_size+0x89/0xb0 [ 782.024989] ? remove_files.isra.0+0x190/0x190 [ 782.029592] sysfs_create_group+0x20/0x30 [ 782.033750] lo_ioctl+0xf8f/0x20e0 [ 782.037481] ? lo_rw_aio_complete+0x350/0x350 [ 782.041995] blkdev_ioctl+0xc38/0x1ac0 [ 782.045895] ? blkpg_ioctl+0xa90/0xa90 [ 782.049794] ? find_held_lock+0x35/0x130 [ 782.053871] ? debug_check_no_obj_freed+0x200/0x464 [ 782.059168] ? __fget+0x340/0x540 [ 782.062631] ? ___might_sleep+0x163/0x280 [ 782.066798] block_ioctl+0xee/0x130 [ 782.070427] ? blkdev_fallocate+0x410/0x410 [ 782.074744] do_vfs_ioctl+0xd5f/0x1380 [ 782.078628] ? selinux_file_ioctl+0x46f/0x5e0 [ 782.083113] ? selinux_file_ioctl+0x125/0x5e0 [ 782.087599] ? ioctl_preallocate+0x210/0x210 [ 782.092171] ? selinux_file_mprotect+0x620/0x620 [ 782.096941] ? iterate_fd+0x360/0x360 [ 782.100745] ? do_sys_open+0x31d/0x550 [ 782.104990] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.110527] ? security_file_ioctl+0x8d/0xc0 [ 782.114936] ksys_ioctl+0xab/0xd0 [ 782.118385] __x64_sys_ioctl+0x73/0xb0 [ 782.122373] do_syscall_64+0xfd/0x620 [ 782.126185] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.131370] RIP: 0033:0x459687 [ 782.134568] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 782.153556] RSP: 002b:00007fd1a440da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 782.161577] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459687 [ 782.168855] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 19:01:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ftruncate(r0, 0x0) [ 782.176122] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 782.183404] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 782.190667] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 782.221595] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:01:10 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0xc6000000, 0x4) close(r0) 19:01:10 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x3e) 19:01:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x9effffff) 19:01:10 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x1f00) 19:01:10 executing program 0 (fault-call:1 fault-nth:13): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xf0ffffff) [ 782.553099] FAULT_INJECTION: forcing a failure. [ 782.553099] name failslab, interval 1, probability 0, space 0, times 0 [ 782.574489] CPU: 1 PID: 29819 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 782.581546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.591082] Call Trace: [ 782.593694] dump_stack+0x172/0x1f0 [ 782.597350] should_fail.cold+0xa/0x1b [ 782.601265] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 782.606398] ? lock_downgrade+0x810/0x810 [ 782.610562] ? ___might_sleep+0x163/0x280 [ 782.614732] __should_failslab+0x121/0x190 [ 782.618984] should_failslab+0x9/0x14 [ 782.622889] kmem_cache_alloc+0x2ae/0x700 [ 782.627053] ? find_held_lock+0x35/0x130 [ 782.631134] ? kernfs_activate+0x192/0x1f0 [ 782.635391] __kernfs_new_node+0xef/0x680 [ 782.639561] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 782.644340] ? lock_downgrade+0x810/0x810 [ 782.648505] ? kasan_check_write+0x14/0x20 [ 782.652755] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 782.657622] ? wait_for_completion+0x440/0x440 [ 782.662230] kernfs_new_node+0x99/0x130 [ 782.666222] __kernfs_create_file+0x51/0x340 [ 782.670656] sysfs_add_file_mode_ns+0x222/0x560 [ 782.675358] internal_create_group+0x383/0xc30 [ 782.679966] ? bd_set_size+0x89/0xb0 [ 782.683704] ? remove_files.isra.0+0x190/0x190 [ 782.688311] sysfs_create_group+0x20/0x30 [ 782.692483] lo_ioctl+0xf8f/0x20e0 [ 782.696133] ? lo_rw_aio_complete+0x350/0x350 [ 782.700648] blkdev_ioctl+0xc38/0x1ac0 [ 782.704546] ? blkpg_ioctl+0xa90/0xa90 [ 782.708445] ? find_held_lock+0x35/0x130 [ 782.712516] ? debug_check_no_obj_freed+0x200/0x464 [ 782.717541] ? __fget+0x340/0x540 [ 782.721015] ? ___might_sleep+0x163/0x280 [ 782.725180] block_ioctl+0xee/0x130 [ 782.728810] ? blkdev_fallocate+0x410/0x410 [ 782.733145] do_vfs_ioctl+0xd5f/0x1380 [ 782.737043] ? selinux_file_ioctl+0x46f/0x5e0 [ 782.741544] ? selinux_file_ioctl+0x125/0x5e0 [ 782.746232] ? ioctl_preallocate+0x210/0x210 19:01:10 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x3e) [ 782.750672] ? selinux_file_mprotect+0x620/0x620 [ 782.755437] ? iterate_fd+0x360/0x360 [ 782.759253] ? do_sys_open+0x31d/0x550 [ 782.763168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.768726] ? security_file_ioctl+0x8d/0xc0 [ 782.773151] ksys_ioctl+0xab/0xd0 [ 782.776628] __x64_sys_ioctl+0x73/0xb0 [ 782.780539] do_syscall_64+0xfd/0x620 [ 782.784358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.789557] RIP: 0033:0x459687 [ 782.792757] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 782.811688] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 782.819422] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459687 [ 782.826706] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 782.833990] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 782.841278] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 782.848562] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 782.873604] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:01:10 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x2000) 19:01:10 executing program 0 (fault-call:1 fault-nth:14): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xfcffffff) 19:01:10 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x3e) [ 783.131429] FAULT_INJECTION: forcing a failure. [ 783.131429] name failslab, interval 1, probability 0, space 0, times 0 [ 783.143247] CPU: 0 PID: 29844 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 783.150277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.159639] Call Trace: [ 783.162246] dump_stack+0x172/0x1f0 [ 783.165899] should_fail.cold+0xa/0x1b [ 783.169951] ? is_bpf_text_address+0xd3/0x170 [ 783.174481] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 783.181454] ? __lock_is_held+0xb6/0x140 [ 783.185542] __should_failslab+0x121/0x190 [ 783.189803] should_failslab+0x9/0x14 [ 783.193616] kmem_cache_alloc+0x47/0x700 [ 783.197700] ? save_stack+0xa9/0xd0 [ 783.201354] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 783.207001] idr_get_free+0x50f/0xa20 [ 783.210832] idr_alloc_u32+0x1d6/0x390 [ 783.214745] ? __fprop_inc_percpu_max+0x230/0x230 [ 783.219605] ? __lock_is_held+0xb6/0x140 [ 783.223683] ? should_fail+0x14d/0x85c [ 783.227595] ? __lock_is_held+0xb6/0x140 [ 783.231680] idr_alloc_cyclic+0x132/0x270 [ 783.235850] ? idr_alloc+0x150/0x150 [ 783.239581] ? kasan_check_write+0x14/0x20 [ 783.243919] ? do_raw_spin_lock+0xc8/0x240 [ 783.248261] __kernfs_new_node+0x171/0x680 [ 783.252517] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 783.257292] ? __lock_acquire+0x6eb/0x48f0 [ 783.261542] ? _raw_spin_unlock_irq+0x5e/0x90 [ 783.266055] ? __schedule+0x137a/0x1c70 [ 783.270044] ? __lock_is_held+0xb6/0x140 [ 783.274235] kernfs_new_node+0x99/0x130 [ 783.278259] kernfs_create_dir_ns+0x52/0x160 [ 783.282697] internal_create_group+0x1cb/0xc30 [ 783.287296] ? bd_set_size+0x89/0xb0 [ 783.291133] ? remove_files.isra.0+0x190/0x190 [ 783.295745] sysfs_create_group+0x20/0x30 [ 783.299903] lo_ioctl+0xf8f/0x20e0 [ 783.303460] ? lo_rw_aio_complete+0x350/0x350 [ 783.307983] blkdev_ioctl+0xc38/0x1ac0 [ 783.311885] ? blkpg_ioctl+0xa90/0xa90 [ 783.315785] ? find_held_lock+0x35/0x130 [ 783.319862] ? debug_check_no_obj_freed+0x200/0x464 [ 783.324901] ? __fget+0x340/0x540 [ 783.328373] ? ___might_sleep+0x163/0x280 [ 783.332549] block_ioctl+0xee/0x130 [ 783.336196] ? blkdev_fallocate+0x410/0x410 [ 783.340532] do_vfs_ioctl+0xd5f/0x1380 [ 783.344426] ? selinux_file_ioctl+0x46f/0x5e0 [ 783.349017] ? selinux_file_ioctl+0x125/0x5e0 [ 783.353523] ? ioctl_preallocate+0x210/0x210 [ 783.357944] ? selinux_file_mprotect+0x620/0x620 [ 783.362709] ? iterate_fd+0x360/0x360 [ 783.366523] ? do_sys_open+0x31d/0x550 [ 783.370426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.376155] ? security_file_ioctl+0x8d/0xc0 [ 783.380579] ksys_ioctl+0xab/0xd0 [ 783.384129] __x64_sys_ioctl+0x73/0xb0 [ 783.388027] do_syscall_64+0xfd/0x620 [ 783.391852] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 783.397047] RIP: 0033:0x459687 [ 783.400251] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 783.419945] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 783.427674] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459687 [ 783.434956] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 783.442235] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 783.449516] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 783.456795] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 783.485610] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 783.724818] net_ratelimit: 16 callbacks suppressed [ 783.724824] protocol 88fb is buggy, dev hsr_slave_0 [ 783.734900] protocol 88fb is buggy, dev hsr_slave_1 [ 783.964809] protocol 88fb is buggy, dev hsr_slave_0 [ 783.969892] protocol 88fb is buggy, dev hsr_slave_1 [ 784.054780] protocol 88fb is buggy, dev hsr_slave_0 [ 784.059943] protocol 88fb is buggy, dev hsr_slave_1 [ 784.444805] protocol 88fb is buggy, dev hsr_slave_0 [ 784.449943] protocol 88fb is buggy, dev hsr_slave_1 [ 784.455132] protocol 88fb is buggy, dev hsr_slave_0 [ 784.460175] protocol 88fb is buggy, dev hsr_slave_1 19:01:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ftruncate(r0, 0x0) 19:01:13 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3203]}, 0x3e) 19:01:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xfffff000) 19:01:13 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0xc7000000, 0x4) close(r0) 19:01:13 executing program 0 (fault-call:1 fault-nth:15): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x3f00) 19:01:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xffffff7f) 19:01:13 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x3e) [ 785.326183] FAULT_INJECTION: forcing a failure. [ 785.326183] name failslab, interval 1, probability 0, space 0, times 0 [ 785.358834] CPU: 1 PID: 29868 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 785.365902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.375270] Call Trace: [ 785.377879] dump_stack+0x172/0x1f0 [ 785.381539] should_fail.cold+0xa/0x1b [ 785.385454] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 785.390580] ? lock_downgrade+0x810/0x810 [ 785.394750] ? ___might_sleep+0x163/0x280 [ 785.398921] __should_failslab+0x121/0x190 [ 785.403177] should_failslab+0x9/0x14 [ 785.406994] kmem_cache_alloc+0x2ae/0x700 [ 785.411336] ? find_held_lock+0x35/0x130 [ 785.415415] ? kernfs_activate+0x192/0x1f0 [ 785.419667] __kernfs_new_node+0xef/0x680 [ 785.423833] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 785.428604] ? lock_downgrade+0x810/0x810 [ 785.432769] ? kasan_check_write+0x14/0x20 [ 785.437017] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 785.441877] ? wait_for_completion+0x440/0x440 [ 785.446481] kernfs_new_node+0x99/0x130 [ 785.450478] __kernfs_create_file+0x51/0x340 [ 785.454900] sysfs_add_file_mode_ns+0x222/0x560 [ 785.459594] internal_create_group+0x383/0xc30 [ 785.464189] ? bd_set_size+0x89/0xb0 [ 785.467921] ? remove_files.isra.0+0x190/0x190 [ 785.472528] sysfs_create_group+0x20/0x30 [ 785.476688] lo_ioctl+0xf8f/0x20e0 [ 785.480244] ? lo_rw_aio_complete+0x350/0x350 [ 785.484756] blkdev_ioctl+0xc38/0x1ac0 [ 785.488658] ? blkpg_ioctl+0xa90/0xa90 [ 785.492561] ? find_held_lock+0x35/0x130 [ 785.496653] ? debug_check_no_obj_freed+0x200/0x464 [ 785.501792] ? __fget+0x340/0x540 [ 785.505258] ? ___might_sleep+0x163/0x280 [ 785.509423] block_ioctl+0xee/0x130 [ 785.513072] ? blkdev_fallocate+0x410/0x410 [ 785.517410] do_vfs_ioctl+0xd5f/0x1380 [ 785.521320] ? selinux_file_ioctl+0x46f/0x5e0 [ 785.525825] ? selinux_file_ioctl+0x125/0x5e0 [ 785.530594] ? ioctl_preallocate+0x210/0x210 [ 785.535021] ? selinux_file_mprotect+0x620/0x620 [ 785.539794] ? iterate_fd+0x360/0x360 [ 785.543611] ? do_sys_open+0x31d/0x550 [ 785.547523] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.553072] ? security_file_ioctl+0x8d/0xc0 [ 785.557496] ksys_ioctl+0xab/0xd0 [ 785.560971] __x64_sys_ioctl+0x73/0xb0 [ 785.564880] do_syscall_64+0xfd/0x620 [ 785.568696] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.573894] RIP: 0033:0x459687 [ 785.577106] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 785.596018] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 785.603747] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459687 [ 785.611041] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 785.618323] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 785.625615] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 785.632988] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x4000) 19:01:13 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x3e) [ 785.680153] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:01:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xffffff9e) 19:01:13 executing program 0 (fault-call:1 fault-nth:16): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 785.931341] FAULT_INJECTION: forcing a failure. [ 785.931341] name failslab, interval 1, probability 0, space 0, times 0 [ 785.969493] CPU: 0 PID: 29899 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 785.976555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.985920] Call Trace: [ 785.988531] dump_stack+0x172/0x1f0 [ 785.992203] should_fail.cold+0xa/0x1b [ 785.996112] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 786.001237] ? lock_downgrade+0x810/0x810 [ 786.005406] ? ___might_sleep+0x163/0x280 [ 786.009573] __should_failslab+0x121/0x190 [ 786.013833] should_failslab+0x9/0x14 [ 786.017653] kmem_cache_alloc+0x2ae/0x700 [ 786.021832] ? lock_downgrade+0x810/0x810 [ 786.026017] __kernfs_new_node+0xef/0x680 [ 786.030180] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 786.034957] ? wait_for_completion+0x440/0x440 [ 786.039561] ? mutex_unlock+0xd/0x10 [ 786.043290] ? kernfs_activate+0x192/0x1f0 [ 786.047562] kernfs_new_node+0x99/0x130 [ 786.051556] __kernfs_create_file+0x51/0x340 [ 786.055979] sysfs_add_file_mode_ns+0x222/0x560 [ 786.060852] internal_create_group+0x383/0xc30 [ 786.065536] ? bd_set_size+0x89/0xb0 [ 786.069271] ? remove_files.isra.0+0x190/0x190 [ 786.074064] sysfs_create_group+0x20/0x30 [ 786.078227] lo_ioctl+0xf8f/0x20e0 [ 786.081777] ? lo_rw_aio_complete+0x350/0x350 [ 786.086374] blkdev_ioctl+0xc38/0x1ac0 [ 786.090448] ? blkpg_ioctl+0xa90/0xa90 [ 786.094354] ? find_held_lock+0x35/0x130 [ 786.098440] ? debug_check_no_obj_freed+0x200/0x464 [ 786.103482] ? __fget+0x340/0x540 [ 786.106949] ? ___might_sleep+0x163/0x280 [ 786.111116] block_ioctl+0xee/0x130 [ 786.114758] ? blkdev_fallocate+0x410/0x410 [ 786.119090] do_vfs_ioctl+0xd5f/0x1380 [ 786.123074] ? selinux_file_ioctl+0x46f/0x5e0 [ 786.127587] ? selinux_file_ioctl+0x125/0x5e0 [ 786.132096] ? ioctl_preallocate+0x210/0x210 [ 786.136516] ? selinux_file_mprotect+0x620/0x620 [ 786.141286] ? iterate_fd+0x360/0x360 [ 786.145099] ? do_sys_open+0x31d/0x550 [ 786.149003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.154548] ? security_file_ioctl+0x8d/0xc0 [ 786.158972] ksys_ioctl+0xab/0xd0 [ 786.162435] __x64_sys_ioctl+0x73/0xb0 [ 786.166340] do_syscall_64+0xfd/0x620 [ 786.170151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.175344] RIP: 0033:0x459687 [ 786.178549] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 786.197457] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 786.205263] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459687 [ 786.212537] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 786.219818] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 786.227099] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 786.234405] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 786.251178] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:01:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ftruncate(r0, 0x0) 19:01:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xfffffff0) 19:01:16 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x3e) 19:01:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x4800) 19:01:16 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0xb3020000000000, 0x4) close(r0) 19:01:16 executing program 0 (fault-call:1 fault-nth:17): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 788.342175] FAULT_INJECTION: forcing a failure. [ 788.342175] name failslab, interval 1, probability 0, space 0, times 0 [ 788.342198] CPU: 0 PID: 29915 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 788.360431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 788.369801] Call Trace: [ 788.372412] dump_stack+0x172/0x1f0 [ 788.376063] should_fail.cold+0xa/0x1b [ 788.380066] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 788.385186] ? lock_downgrade+0x810/0x810 [ 788.389353] ? ___might_sleep+0x163/0x280 [ 788.393531] __should_failslab+0x121/0x190 [ 788.397785] should_failslab+0x9/0x14 [ 788.401619] kmem_cache_alloc+0x2ae/0x700 [ 788.405795] ? lock_downgrade+0x810/0x810 [ 788.409977] __kernfs_new_node+0xef/0x680 [ 788.414158] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 788.419023] ? wait_for_completion+0x440/0x440 [ 788.423723] ? mutex_unlock+0xd/0x10 [ 788.427459] ? kernfs_activate+0x192/0x1f0 [ 788.431723] kernfs_new_node+0x99/0x130 [ 788.435721] __kernfs_create_file+0x51/0x340 [ 788.440321] sysfs_add_file_mode_ns+0x222/0x560 [ 788.445013] internal_create_group+0x383/0xc30 [ 788.449619] ? bd_set_size+0x89/0xb0 [ 788.453355] ? remove_files.isra.0+0x190/0x190 [ 788.458076] sysfs_create_group+0x20/0x30 [ 788.462240] lo_ioctl+0xf8f/0x20e0 [ 788.465804] ? lo_rw_aio_complete+0x350/0x350 [ 788.470324] blkdev_ioctl+0xc38/0x1ac0 [ 788.474231] ? blkpg_ioctl+0xa90/0xa90 [ 788.478223] ? find_held_lock+0x35/0x130 [ 788.482478] ? debug_check_no_obj_freed+0x200/0x464 [ 788.487527] ? __fget+0x340/0x540 [ 788.491001] ? ___might_sleep+0x163/0x280 [ 788.495171] block_ioctl+0xee/0x130 [ 788.498808] ? blkdev_fallocate+0x410/0x410 [ 788.503153] do_vfs_ioctl+0xd5f/0x1380 [ 788.507063] ? selinux_file_ioctl+0x46f/0x5e0 [ 788.511579] ? selinux_file_ioctl+0x125/0x5e0 [ 788.516129] ? ioctl_preallocate+0x210/0x210 [ 788.520561] ? selinux_file_mprotect+0x620/0x620 [ 788.525342] ? iterate_fd+0x360/0x360 [ 788.529161] ? do_sys_open+0x31d/0x550 [ 788.533111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 788.538661] ? security_file_ioctl+0x8d/0xc0 [ 788.543094] ksys_ioctl+0xab/0xd0 [ 788.546567] __x64_sys_ioctl+0x73/0xb0 [ 788.550511] do_syscall_64+0xfd/0x620 [ 788.554329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 788.559528] RIP: 0033:0x459687 [ 788.562730] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 788.581668] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 19:01:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xfffffffc) 19:01:16 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}, 0x3e) [ 788.589403] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459687 [ 788.596686] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 788.603972] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 788.611254] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 788.618538] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 788.639393] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:01:16 executing program 0 (fault-call:1 fault-nth:18): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x40030000000000) 19:01:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x4c00) [ 788.832871] FAULT_INJECTION: forcing a failure. [ 788.832871] name failslab, interval 1, probability 0, space 0, times 0 [ 788.850280] CPU: 0 PID: 29939 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 788.857346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 788.866713] Call Trace: [ 788.869353] dump_stack+0x172/0x1f0 [ 788.873010] should_fail.cold+0xa/0x1b [ 788.876935] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 788.882061] ? lock_downgrade+0x810/0x810 [ 788.886232] ? ___might_sleep+0x163/0x280 [ 788.890404] __should_failslab+0x121/0x190 [ 788.894654] should_failslab+0x9/0x14 [ 788.898464] kmem_cache_alloc+0x2ae/0x700 [ 788.902627] ? lock_downgrade+0x810/0x810 [ 788.906796] __kernfs_new_node+0xef/0x680 [ 788.910969] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 788.915741] ? wait_for_completion+0x440/0x440 [ 788.920349] ? mutex_unlock+0xd/0x10 [ 788.924078] ? kernfs_activate+0x192/0x1f0 [ 788.928331] kernfs_new_node+0x99/0x130 [ 788.932324] __kernfs_create_file+0x51/0x340 [ 788.936751] sysfs_add_file_mode_ns+0x222/0x560 [ 788.941441] internal_create_group+0x383/0xc30 [ 788.946043] ? bd_set_size+0x89/0xb0 [ 788.949779] ? remove_files.isra.0+0x190/0x190 [ 788.954391] sysfs_create_group+0x20/0x30 [ 788.958559] lo_ioctl+0xf8f/0x20e0 [ 788.962117] ? lo_rw_aio_complete+0x350/0x350 [ 788.966625] blkdev_ioctl+0xc38/0x1ac0 [ 788.970532] ? blkpg_ioctl+0xa90/0xa90 [ 788.974438] ? find_held_lock+0x35/0x130 [ 788.978515] ? debug_check_no_obj_freed+0x200/0x464 [ 788.983561] ? __fget+0x340/0x540 [ 788.987029] ? ___might_sleep+0x163/0x280 [ 788.991294] block_ioctl+0xee/0x130 [ 788.994934] ? blkdev_fallocate+0x410/0x410 [ 788.999280] do_vfs_ioctl+0xd5f/0x1380 [ 789.003176] ? selinux_file_ioctl+0x46f/0x5e0 [ 789.007709] ? selinux_file_ioctl+0x125/0x5e0 [ 789.014734] ? ioctl_preallocate+0x210/0x210 [ 789.019161] ? selinux_file_mprotect+0x620/0x620 [ 789.023951] ? iterate_fd+0x360/0x360 [ 789.027769] ? do_sys_open+0x31d/0x550 [ 789.031682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 789.037234] ? security_file_ioctl+0x8d/0xc0 [ 789.041660] ksys_ioctl+0xab/0xd0 [ 789.045133] __x64_sys_ioctl+0x73/0xb0 [ 789.049035] do_syscall_64+0xfd/0x620 [ 789.052857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 789.058055] RIP: 0033:0x459687 [ 789.061260] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:01:16 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}, 0x3e) [ 789.080176] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 789.087908] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459687 [ 789.095282] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 789.102652] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 789.109940] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 789.117243] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 789.124827] net_ratelimit: 24 callbacks suppressed [ 789.124835] protocol 88fb is buggy, dev hsr_slave_0 [ 789.134936] protocol 88fb is buggy, dev hsr_slave_1 [ 789.191883] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 789.964827] protocol 88fb is buggy, dev hsr_slave_0 [ 789.969946] protocol 88fb is buggy, dev hsr_slave_1 [ 790.204830] protocol 88fb is buggy, dev hsr_slave_0 [ 790.209962] protocol 88fb is buggy, dev hsr_slave_1 [ 790.284744] protocol 88fb is buggy, dev hsr_slave_0 [ 790.289835] protocol 88fb is buggy, dev hsr_slave_1 [ 790.684758] protocol 88fb is buggy, dev hsr_slave_0 [ 790.689863] protocol 88fb is buggy, dev hsr_slave_1 19:01:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x6800) 19:01:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xf0ffffffffffff) 19:01:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ftruncate(r0, 0x0) 19:01:19 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x3e) 19:01:19 executing program 0 (fault-call:1 fault-nth:19): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:19 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0xf0ff0000000000, 0x4) close(r0) [ 791.455415] FAULT_INJECTION: forcing a failure. [ 791.455415] name failslab, interval 1, probability 0, space 0, times 0 [ 791.484890] CPU: 1 PID: 29963 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 791.492038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 791.501409] Call Trace: [ 791.504080] dump_stack+0x172/0x1f0 [ 791.507733] should_fail.cold+0xa/0x1b [ 791.511645] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 791.516771] ? lock_downgrade+0x810/0x810 [ 791.520955] ? ___might_sleep+0x163/0x280 [ 791.525128] __should_failslab+0x121/0x190 [ 791.529458] should_failslab+0x9/0x14 [ 791.533294] kmem_cache_alloc+0x2ae/0x700 [ 791.537481] ? lock_downgrade+0x810/0x810 [ 791.541655] __kernfs_new_node+0xef/0x680 [ 791.545828] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 791.550594] ? wait_for_completion+0x440/0x440 19:01:19 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x3e) [ 791.555196] ? mutex_unlock+0xd/0x10 [ 791.558925] ? kernfs_activate+0x192/0x1f0 [ 791.563180] kernfs_new_node+0x99/0x130 [ 791.567195] __kernfs_create_file+0x51/0x340 [ 791.571624] sysfs_add_file_mode_ns+0x222/0x560 [ 791.576316] internal_create_group+0x383/0xc30 [ 791.580914] ? bd_set_size+0x89/0xb0 [ 791.584651] ? remove_files.isra.0+0x190/0x190 [ 791.589259] sysfs_create_group+0x20/0x30 [ 791.593410] lo_ioctl+0xf8f/0x20e0 [ 791.596972] ? lo_rw_aio_complete+0x350/0x350 [ 791.596989] blkdev_ioctl+0xc38/0x1ac0 [ 791.597003] ? blkpg_ioctl+0xa90/0xa90 [ 791.597018] ? find_held_lock+0x35/0x130 [ 791.597035] ? debug_check_no_obj_freed+0x200/0x464 [ 791.597051] ? __fget+0x340/0x540 [ 791.597067] ? ___might_sleep+0x163/0x280 [ 791.618541] block_ioctl+0xee/0x130 [ 791.618558] ? blkdev_fallocate+0x410/0x410 [ 791.634506] do_vfs_ioctl+0xd5f/0x1380 [ 791.638399] ? selinux_file_ioctl+0x46f/0x5e0 [ 791.638415] ? selinux_file_ioctl+0x125/0x5e0 [ 791.647383] ? ioctl_preallocate+0x210/0x210 [ 791.647395] ? selinux_file_mprotect+0x620/0x620 [ 791.647414] ? iterate_fd+0x360/0x360 [ 791.647431] ? do_sys_open+0x31d/0x550 [ 791.647453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.647467] ? security_file_ioctl+0x8d/0xc0 [ 791.647483] ksys_ioctl+0xab/0xd0 [ 791.647500] __x64_sys_ioctl+0x73/0xb0 [ 791.647515] do_syscall_64+0xfd/0x620 [ 791.647535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.677729] RIP: 0033:0x459687 [ 791.677744] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 791.677751] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 791.677765] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459687 [ 791.677774] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 791.677782] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 791.677789] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 791.677797] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x100000000000000) [ 791.789091] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:01:19 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x3e) 19:01:19 executing program 0 (fault-call:1 fault-nth:20): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x200000000000000) 19:01:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x6c00) 19:01:19 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3e) 19:01:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x300000000000000) [ 792.201433] FAULT_INJECTION: forcing a failure. [ 792.201433] name failslab, interval 1, probability 0, space 0, times 0 [ 792.230077] CPU: 0 PID: 30003 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 792.237321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 792.246873] Call Trace: [ 792.249483] dump_stack+0x172/0x1f0 [ 792.253125] should_fail.cold+0xa/0x1b [ 792.253146] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 792.262135] ? lock_downgrade+0x810/0x810 [ 792.266305] ? ___might_sleep+0x163/0x280 [ 792.270486] __should_failslab+0x121/0x190 [ 792.270505] should_failslab+0x9/0x14 [ 792.278520] kmem_cache_alloc_trace+0x2cc/0x760 [ 792.283192] kobject_uevent_env+0x387/0x101d [ 792.287624] kobject_uevent+0x20/0x26 [ 792.291434] lo_ioctl+0x100b/0x20e0 [ 792.295062] ? lo_rw_aio_complete+0x350/0x350 [ 792.295081] blkdev_ioctl+0xc38/0x1ac0 [ 792.295097] ? blkpg_ioctl+0xa90/0xa90 [ 792.295115] ? find_held_lock+0x35/0x130 [ 792.311416] ? debug_check_no_obj_freed+0x200/0x464 [ 792.311434] ? __fget+0x340/0x540 [ 792.319887] ? ___might_sleep+0x163/0x280 [ 792.324153] block_ioctl+0xee/0x130 [ 792.327782] ? blkdev_fallocate+0x410/0x410 [ 792.327800] do_vfs_ioctl+0xd5f/0x1380 [ 792.327818] ? selinux_file_ioctl+0x46f/0x5e0 [ 792.340481] ? selinux_file_ioctl+0x125/0x5e0 [ 792.340500] ? ioctl_preallocate+0x210/0x210 [ 792.349378] ? selinux_file_mprotect+0x620/0x620 [ 792.354140] ? iterate_fd+0x360/0x360 [ 792.354160] ? do_sys_open+0x31d/0x550 [ 792.361837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 792.367377] ? security_file_ioctl+0x8d/0xc0 [ 792.367396] ksys_ioctl+0xab/0xd0 [ 792.367412] __x64_sys_ioctl+0x73/0xb0 [ 792.367431] do_syscall_64+0xfd/0x620 [ 792.379144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 792.388094] RIP: 0033:0x459687 [ 792.391287] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 792.391295] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 792.391314] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459687 [ 792.425161] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 792.425170] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 792.425177] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 792.425185] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 792.505315] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:01:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ftruncate(r0, 0x0) 19:01:22 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x3e) 19:01:22 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x100000000000000, 0x4) close(r0) 19:01:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x400000000000000) 19:01:22 executing program 0 (fault-call:1 fault-nth:21): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x6e00) [ 794.444764] net_ratelimit: 18 callbacks suppressed [ 794.444771] protocol 88fb is buggy, dev hsr_slave_0 [ 794.454853] protocol 88fb is buggy, dev hsr_slave_1 [ 794.459968] protocol 88fb is buggy, dev hsr_slave_0 [ 794.465097] protocol 88fb is buggy, dev hsr_slave_1 [ 794.507679] FAULT_INJECTION: forcing a failure. [ 794.507679] name failslab, interval 1, probability 0, space 0, times 0 [ 794.536938] CPU: 0 PID: 30022 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 794.543995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 794.553361] Call Trace: [ 794.555971] dump_stack+0x172/0x1f0 [ 794.559622] should_fail.cold+0xa/0x1b [ 794.563546] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 794.568760] ? lock_downgrade+0x810/0x810 [ 794.572933] ? ___might_sleep+0x163/0x280 [ 794.577108] __should_failslab+0x121/0x190 [ 794.581359] should_failslab+0x9/0x14 [ 794.585174] kmem_cache_alloc_node+0x26c/0x710 [ 794.589770] ? find_held_lock+0x35/0x130 [ 794.593852] __alloc_skb+0xd5/0x5f0 [ 794.597492] ? skb_scrub_packet+0x490/0x490 [ 794.601829] ? kasan_check_read+0x11/0x20 [ 794.606000] alloc_uevent_skb+0x83/0x1e2 [ 794.610085] kobject_uevent_env+0xaa3/0x101d [ 794.614526] kobject_uevent+0x20/0x26 [ 794.618341] lo_ioctl+0x100b/0x20e0 [ 794.621982] ? lo_rw_aio_complete+0x350/0x350 [ 794.626494] blkdev_ioctl+0xc38/0x1ac0 [ 794.630391] ? blkpg_ioctl+0xa90/0xa90 [ 794.634288] ? find_held_lock+0x35/0x130 [ 794.638362] ? debug_check_no_obj_freed+0x200/0x464 [ 794.643394] ? __fget+0x340/0x540 [ 794.646862] ? ___might_sleep+0x163/0x280 [ 794.651112] block_ioctl+0xee/0x130 [ 794.654747] ? blkdev_fallocate+0x410/0x410 [ 794.659179] do_vfs_ioctl+0xd5f/0x1380 [ 794.663080] ? selinux_file_ioctl+0x46f/0x5e0 [ 794.667587] ? selinux_file_ioctl+0x125/0x5e0 [ 794.672094] ? ioctl_preallocate+0x210/0x210 [ 794.676522] ? selinux_file_mprotect+0x620/0x620 [ 794.681299] ? iterate_fd+0x360/0x360 [ 794.685114] ? do_sys_open+0x31d/0x550 [ 794.689022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 794.694576] ? security_file_ioctl+0x8d/0xc0 [ 794.699017] ksys_ioctl+0xab/0xd0 [ 794.702496] __x64_sys_ioctl+0x73/0xb0 [ 794.706398] do_syscall_64+0xfd/0x620 [ 794.710212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 794.715405] RIP: 0033:0x459687 [ 794.718611] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 794.737614] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 794.745353] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459687 19:01:22 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x3e) [ 794.752643] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 794.759926] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 794.767212] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 794.774492] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xa00000000000000) [ 794.822708] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 794.844781] protocol 88fb is buggy, dev hsr_slave_0 [ 794.849910] protocol 88fb is buggy, dev hsr_slave_1 [ 794.855095] protocol 88fb is buggy, dev hsr_slave_0 [ 794.860190] protocol 88fb is buggy, dev hsr_slave_1 19:01:22 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x3e) 19:01:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xe00000000000000) 19:01:22 executing program 0 (fault-call:1 fault-nth:22): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x7400) [ 795.108065] FAULT_INJECTION: forcing a failure. [ 795.108065] name failslab, interval 1, probability 0, space 0, times 0 [ 795.136122] CPU: 0 PID: 30054 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 795.143175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 795.143188] Call Trace: [ 795.155146] dump_stack+0x172/0x1f0 [ 795.158802] should_fail.cold+0xa/0x1b [ 795.162714] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 795.167833] ? lock_downgrade+0x810/0x810 [ 795.172091] ? ___might_sleep+0x163/0x280 [ 795.176257] __should_failslab+0x121/0x190 [ 795.182344] should_failslab+0x9/0x14 [ 795.186158] __kmalloc+0x2e2/0x750 [ 795.189721] ? rcu_read_lock_sched_held+0x110/0x130 [ 795.194758] ? kobject_get_path+0xc4/0x1b0 [ 795.199093] kobject_get_path+0xc4/0x1b0 [ 795.203164] kobject_uevent_env+0x3ab/0x101d [ 795.203190] kobject_uevent+0x20/0x26 [ 795.211474] lo_ioctl+0x100b/0x20e0 [ 795.215120] ? lo_rw_aio_complete+0x350/0x350 [ 795.219624] blkdev_ioctl+0xc38/0x1ac0 [ 795.223520] ? blkpg_ioctl+0xa90/0xa90 [ 795.223536] ? find_held_lock+0x35/0x130 [ 795.223555] ? debug_check_no_obj_freed+0x200/0x464 [ 795.236500] ? __fget+0x340/0x540 [ 795.239966] ? ___might_sleep+0x163/0x280 [ 795.244128] block_ioctl+0xee/0x130 [ 795.244146] ? blkdev_fallocate+0x410/0x410 [ 795.252084] do_vfs_ioctl+0xd5f/0x1380 [ 795.255984] ? selinux_file_ioctl+0x46f/0x5e0 [ 795.260485] ? selinux_file_ioctl+0x125/0x5e0 [ 795.264985] ? ioctl_preallocate+0x210/0x210 [ 795.264998] ? selinux_file_mprotect+0x620/0x620 [ 795.265016] ? iterate_fd+0x360/0x360 [ 795.265032] ? do_sys_open+0x31d/0x550 [ 795.265054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 795.265067] ? security_file_ioctl+0x8d/0xc0 [ 795.265082] ksys_ioctl+0xab/0xd0 [ 795.292260] __x64_sys_ioctl+0x73/0xb0 [ 795.292276] do_syscall_64+0xfd/0x620 [ 795.292296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 795.308563] RIP: 0033:0x459687 [ 795.308579] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 795.308590] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 [ 795.330656] ORIG_RAX: 0000000000000010 [ 795.330666] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459687 [ 795.330674] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 795.330680] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 795.330686] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 795.330693] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 795.330841] protocol 88fb is buggy, dev hsr_slave_0 [ 795.330893] protocol 88fb is buggy, dev hsr_slave_1 [ 795.448884] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:01:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:25 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x3e) 19:01:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xf00000000000000) 19:01:25 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x3f00000000000000, 0x4) close(r0) 19:01:25 executing program 0 (fault-call:1 fault-nth:23): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:25 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x7a00) [ 797.855609] FAULT_INJECTION: forcing a failure. [ 797.855609] name failslab, interval 1, probability 0, space 0, times 0 [ 797.880738] CPU: 1 PID: 30073 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 797.887795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 797.897201] Call Trace: [ 797.899820] dump_stack+0x172/0x1f0 [ 797.903466] should_fail.cold+0xa/0x1b [ 797.907371] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 797.907390] ? lock_downgrade+0x810/0x810 [ 797.907407] ? ___might_sleep+0x163/0x280 [ 797.907426] __should_failslab+0x121/0x190 [ 797.925032] should_failslab+0x9/0x14 [ 797.928850] kmem_cache_alloc_node+0x26c/0x710 [ 797.933451] ? find_held_lock+0x35/0x130 [ 797.937578] __alloc_skb+0xd5/0x5f0 [ 797.941223] ? skb_scrub_packet+0x490/0x490 [ 797.945568] ? kasan_check_read+0x11/0x20 [ 797.949744] alloc_uevent_skb+0x83/0x1e2 [ 797.953837] kobject_uevent_env+0xaa3/0x101d [ 797.958284] kobject_uevent+0x20/0x26 [ 797.962099] lo_ioctl+0x100b/0x20e0 [ 797.965749] ? lo_rw_aio_complete+0x350/0x350 [ 797.970265] blkdev_ioctl+0xc38/0x1ac0 [ 797.974169] ? blkpg_ioctl+0xa90/0xa90 [ 797.978069] ? find_held_lock+0x35/0x130 [ 797.982152] ? debug_check_no_obj_freed+0x200/0x464 [ 797.987219] ? __fget+0x340/0x540 [ 797.990697] ? ___might_sleep+0x163/0x280 [ 797.994869] block_ioctl+0xee/0x130 [ 797.998515] ? blkdev_fallocate+0x410/0x410 [ 798.002857] do_vfs_ioctl+0xd5f/0x1380 [ 798.006769] ? selinux_file_ioctl+0x46f/0x5e0 [ 798.011284] ? selinux_file_ioctl+0x125/0x5e0 [ 798.015853] ? ioctl_preallocate+0x210/0x210 [ 798.020276] ? selinux_file_mprotect+0x620/0x620 [ 798.025055] ? iterate_fd+0x360/0x360 [ 798.028882] ? do_sys_open+0x31d/0x550 [ 798.032799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 798.039831] ? security_file_ioctl+0x8d/0xc0 [ 798.045917] ksys_ioctl+0xab/0xd0 [ 798.049391] __x64_sys_ioctl+0x73/0xb0 [ 798.053298] do_syscall_64+0xfd/0x620 [ 798.057124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 798.062338] RIP: 0033:0x459687 [ 798.065544] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 798.084559] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 798.092378] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459687 19:01:25 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x3e) [ 798.099663] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 798.106948] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 798.114237] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 798.121523] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 798.132506] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:01:26 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x3e) 19:01:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x1805000000000000) 19:01:26 executing program 0 (fault-call:1 fault-nth:24): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x40000) [ 798.356560] FAULT_INJECTION: forcing a failure. [ 798.356560] name failslab, interval 1, probability 0, space 0, times 0 [ 798.390122] CPU: 0 PID: 30101 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 798.397180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 798.406546] Call Trace: [ 798.409157] dump_stack+0x172/0x1f0 [ 798.412812] should_fail.cold+0xa/0x1b [ 798.416721] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 798.421841] ? lock_downgrade+0x810/0x810 [ 798.426003] ? ___might_sleep+0x163/0x280 [ 798.430166] __should_failslab+0x121/0x190 [ 798.434413] should_failslab+0x9/0x14 [ 798.438231] kmem_cache_alloc_node_trace+0x274/0x720 [ 798.443344] ? __alloc_skb+0xd5/0x5f0 [ 798.447164] __kmalloc_node_track_caller+0x3d/0x80 [ 798.452106] __kmalloc_reserve.isra.0+0x40/0xf0 [ 798.456798] __alloc_skb+0x10b/0x5f0 [ 798.460527] ? skb_scrub_packet+0x490/0x490 [ 798.464861] ? kasan_check_read+0x11/0x20 [ 798.469022] alloc_uevent_skb+0x83/0x1e2 [ 798.473096] kobject_uevent_env+0xaa3/0x101d [ 798.477523] kobject_uevent+0x20/0x26 [ 798.481333] lo_ioctl+0x100b/0x20e0 [ 798.484990] ? lo_rw_aio_complete+0x350/0x350 [ 798.489501] blkdev_ioctl+0xc38/0x1ac0 [ 798.493404] ? blkpg_ioctl+0xa90/0xa90 [ 798.497303] ? find_held_lock+0x35/0x130 [ 798.501386] ? debug_check_no_obj_freed+0x200/0x464 [ 798.506432] ? __fget+0x340/0x540 [ 798.509897] ? ___might_sleep+0x163/0x280 [ 798.514072] block_ioctl+0xee/0x130 [ 798.517725] ? blkdev_fallocate+0x410/0x410 [ 798.522059] do_vfs_ioctl+0xd5f/0x1380 [ 798.525958] ? selinux_file_ioctl+0x46f/0x5e0 [ 798.530504] ? selinux_file_ioctl+0x125/0x5e0 [ 798.535020] ? ioctl_preallocate+0x210/0x210 [ 798.539439] ? selinux_file_mprotect+0x620/0x620 [ 798.544214] ? iterate_fd+0x360/0x360 [ 798.548031] ? do_sys_open+0x31d/0x550 [ 798.551964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 19:01:26 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0xc600000000000000, 0x4) close(r0) [ 798.557517] ? security_file_ioctl+0x8d/0xc0 [ 798.561946] ksys_ioctl+0xab/0xd0 [ 798.565413] __x64_sys_ioctl+0x73/0xb0 [ 798.569314] do_syscall_64+0xfd/0x620 [ 798.573172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 798.578456] RIP: 0033:0x459687 [ 798.581655] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 798.600570] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 798.608298] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459687 [ 798.615584] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 798.623299] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 798.630753] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 798.638036] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 798.668989] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 799.484814] net_ratelimit: 22 callbacks suppressed [ 799.489816] protocol 88fb is buggy, dev hsr_slave_0 [ 799.495069] protocol 88fb is buggy, dev hsr_slave_1 [ 800.364818] protocol 88fb is buggy, dev hsr_slave_0 [ 800.369953] protocol 88fb is buggy, dev hsr_slave_1 [ 800.685133] protocol 88fb is buggy, dev hsr_slave_0 [ 800.690254] protocol 88fb is buggy, dev hsr_slave_1 [ 800.695431] protocol 88fb is buggy, dev hsr_slave_0 [ 800.700537] protocol 88fb is buggy, dev hsr_slave_1 [ 801.084823] protocol 88fb is buggy, dev hsr_slave_0 [ 801.089925] protocol 88fb is buggy, dev hsr_slave_1 19:01:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:29 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x3e) 19:01:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x3f00000000000000) 19:01:29 executing program 0 (fault-call:1 fault-nth:25): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x1000000) 19:01:29 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0xc700000000000000, 0x4) close(r0) [ 801.235494] FAULT_INJECTION: forcing a failure. [ 801.235494] name failslab, interval 1, probability 0, space 0, times 0 [ 801.247125] CPU: 0 PID: 30127 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 801.255543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 801.265100] Call Trace: [ 801.267717] dump_stack+0x172/0x1f0 [ 801.271380] should_fail.cold+0xa/0x1b [ 801.275490] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 801.280653] ? __sigqueue_alloc+0x173/0x4d0 19:01:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x6000000000000000) [ 801.285003] ? find_held_lock+0x35/0x130 [ 801.289110] __should_failslab+0x121/0x190 [ 801.293378] should_failslab+0x9/0x14 [ 801.297203] kmem_cache_alloc+0x47/0x700 [ 801.301288] ? kasan_check_read+0x11/0x20 [ 801.305468] __sigqueue_alloc+0x268/0x4d0 [ 801.309663] __send_signal+0x20f/0x14a0 [ 801.314087] ? lock_acquire+0x16f/0x3f0 [ 801.318089] send_signal+0x49/0xd0 [ 801.321649] force_sig_info+0x251/0x310 [ 801.325757] force_sig_info_fault.constprop.0+0x215/0x360 [ 801.331329] ? is_prefetch.isra.0+0x470/0x470 19:01:29 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32030000]}, 0x3e) [ 801.335845] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 801.341729] ? trace_hardirqs_on+0x67/0x220 [ 801.346256] __bad_area_nosemaphore+0x2db/0x3f0 [ 801.350957] ? vmacache_find+0x65/0x310 [ 801.354966] bad_area+0x69/0x80 [ 801.358281] __do_page_fault+0xae1/0xe90 [ 801.362371] ? do_mkdirat+0x1a2/0x2a0 [ 801.366210] ? vmalloc_fault+0x740/0x740 [ 801.370840] ? trace_hardirqs_off_caller+0x65/0x220 [ 801.375883] ? trace_hardirqs_on_caller+0x6a/0x220 [ 801.380928] ? page_fault+0x8/0x30 [ 801.384501] do_page_fault+0x71/0x57d [ 801.388337] ? page_fault+0x8/0x30 [ 801.391907] page_fault+0x1e/0x30 [ 801.395378] RIP: 0033:0x45341f [ 801.398622] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 801.417627] RSP: 002b:00007fd1a442ea88 EFLAGS: 00010283 [ 801.423015] RAX: 00007fd1a442eb40 RBX: 0000000020000068 RCX: 0000000000000000 19:01:29 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x3e) [ 801.430301] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fd1a442eb40 [ 801.437591] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 801.444952] R10: 0000000000000075 R11: 00000000004e4dc0 R12: 0000000000000005 [ 801.452224] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 801.516318] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:01:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x9effffff00000000) 19:01:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x2000000) 19:01:29 executing program 0 (fault-call:1 fault-nth:26): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 802.000630] FAULT_INJECTION: forcing a failure. [ 802.000630] name failslab, interval 1, probability 0, space 0, times 0 [ 802.044337] CPU: 0 PID: 30163 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 802.051668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 802.061047] Call Trace: [ 802.063870] dump_stack+0x172/0x1f0 [ 802.067535] should_fail.cold+0xa/0x1b [ 802.071454] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 802.076593] ? lock_downgrade+0x810/0x810 [ 802.080857] ? ___might_sleep+0x163/0x280 [ 802.085132] __should_failslab+0x121/0x190 [ 802.089394] should_failslab+0x9/0x14 [ 802.093210] kmem_cache_alloc+0x2ae/0x700 [ 802.097555] getname_flags+0xd6/0x5b0 [ 802.101388] do_mkdirat+0xa0/0x2a0 [ 802.104944] ? __ia32_sys_mknod+0xb0/0xb0 [ 802.109108] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 802.113878] ? do_syscall_64+0x26/0x620 [ 802.117876] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 802.123253] ? do_syscall_64+0x26/0x620 [ 802.127244] ? lockdep_hardirqs_on+0x415/0x5d0 [ 802.131851] __x64_sys_mkdir+0x5c/0x80 [ 802.135783] do_syscall_64+0xfd/0x620 [ 802.139623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 802.144990] RIP: 0033:0x458c37 [ 802.148202] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 802.168081] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 802.175901] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c37 [ 802.183362] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200000c0 [ 802.190912] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 802.198191] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 802.205481] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 802.221646] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:01:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:32 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000]}, 0x3e) 19:01:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xf0ffffff00000000) 19:01:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x3000000) 19:01:32 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0xffffffff00000000, 0x4) close(r0) 19:01:32 executing program 0 (fault-call:1 fault-nth:27): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 804.294391] FAULT_INJECTION: forcing a failure. [ 804.294391] name failslab, interval 1, probability 0, space 0, times 0 [ 804.344884] CPU: 1 PID: 30178 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 804.351945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 804.361314] Call Trace: [ 804.363936] dump_stack+0x172/0x1f0 [ 804.368045] should_fail.cold+0xa/0x1b [ 804.371958] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 804.377085] ? lock_downgrade+0x810/0x810 [ 804.381264] ? ___might_sleep+0x163/0x280 [ 804.385440] __should_failslab+0x121/0x190 [ 804.389699] should_failslab+0x9/0x14 [ 804.393520] __kmalloc_track_caller+0x2de/0x750 [ 804.398208] ? strndup_user+0x77/0xd0 [ 804.402026] memdup_user+0x26/0xb0 [ 804.405579] strndup_user+0x77/0xd0 [ 804.409218] ksys_mount+0x3c/0x150 [ 804.412773] __x64_sys_mount+0xbe/0x150 [ 804.416860] do_syscall_64+0xfd/0x620 [ 804.420678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 804.425893] RIP: 0033:0x45c26a 19:01:32 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}, 0x3e) 19:01:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xfcffffff00000000) [ 804.429094] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 804.448011] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 804.455746] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 804.463034] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 804.470408] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 804.477781] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 804.485071] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 804.524780] net_ratelimit: 16 callbacks suppressed [ 804.524788] protocol 88fb is buggy, dev hsr_slave_0 [ 804.534947] protocol 88fb is buggy, dev hsr_slave_1 19:01:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xffffff7f00000000) 19:01:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x4000000) 19:01:32 executing program 0 (fault-call:1 fault-nth:28): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:32 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000]}, 0x3e) [ 804.780895] FAULT_INJECTION: forcing a failure. [ 804.780895] name failslab, interval 1, probability 0, space 0, times 0 [ 804.806919] CPU: 1 PID: 30211 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 804.813985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 804.823354] Call Trace: [ 804.825963] dump_stack+0x172/0x1f0 [ 804.829609] should_fail.cold+0xa/0x1b [ 804.829631] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 804.829655] ? lock_downgrade+0x810/0x810 [ 804.838640] ? ___might_sleep+0x163/0x280 [ 804.838662] __should_failslab+0x121/0x190 [ 804.838678] should_failslab+0x9/0x14 [ 804.838690] __kmalloc_track_caller+0x2de/0x750 [ 804.838711] ? strndup_user+0x77/0xd0 [ 804.838727] memdup_user+0x26/0xb0 [ 804.838743] strndup_user+0x77/0xd0 [ 804.870682] ksys_mount+0x3c/0x150 [ 804.874431] __x64_sys_mount+0xbe/0x150 [ 804.878424] do_syscall_64+0xfd/0x620 [ 804.882243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 804.887436] RIP: 0033:0x45c26a [ 804.890637] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 804.909897] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 804.917633] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 804.924919] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 804.932201] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 804.939496] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 804.946783] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 804.954306] protocol 88fb is buggy, dev hsr_slave_0 [ 804.959451] protocol 88fb is buggy, dev hsr_slave_1 [ 804.964603] protocol 88fb is buggy, dev hsr_slave_0 [ 804.969748] protocol 88fb is buggy, dev hsr_slave_1 [ 805.244822] protocol 88fb is buggy, dev hsr_slave_0 [ 805.249929] protocol 88fb is buggy, dev hsr_slave_1 [ 805.255103] protocol 88fb is buggy, dev hsr_slave_0 [ 805.260154] protocol 88fb is buggy, dev hsr_slave_1 19:01:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(0x0, 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:35 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}, 0x3e) 19:01:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xffffffff00000000) 19:01:35 executing program 0 (fault-call:1 fault-nth:29): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:35 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x5000000) 19:01:35 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) close(r0) 19:01:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(0x0, 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0xfffffffffffff000) 19:01:35 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}, 0x3e) [ 807.325082] FAULT_INJECTION: forcing a failure. [ 807.325082] name failslab, interval 1, probability 0, space 0, times 0 [ 807.369965] CPU: 1 PID: 30228 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 807.377016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 807.377023] Call Trace: [ 807.377044] dump_stack+0x172/0x1f0 [ 807.377066] should_fail.cold+0xa/0x1b [ 807.377084] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 807.377100] ? lock_downgrade+0x810/0x810 [ 807.377118] ? ___might_sleep+0x163/0x280 [ 807.377138] __should_failslab+0x121/0x190 [ 807.377155] should_failslab+0x9/0x14 [ 807.377168] kmem_cache_alloc_trace+0x2cc/0x760 [ 807.377187] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 807.377201] ? _copy_from_user+0xdd/0x150 [ 807.377220] copy_mount_options+0x5c/0x3a0 [ 807.377235] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 807.377252] ksys_mount+0xa7/0x150 [ 807.377270] __x64_sys_mount+0xbe/0x150 [ 807.410140] do_syscall_64+0xfd/0x620 [ 807.428446] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 807.428461] RIP: 0033:0x45c26a [ 807.442349] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 807.480991] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 807.488814] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 807.496107] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 807.503399] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 807.510686] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 807.517977] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:35 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x3e) 19:01:35 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x6000000) 19:01:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890f, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r2, &(0x7f0000000080)="91e9ecf9a93a6cc9d13c909fa6c5372431039b8db89c2472d38cbfce2a89ca296dd8"}, 0x10) 19:01:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(0x0, 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:35 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x3e) 19:01:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x13, 0x805, 0x20) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$inet6(r1, &(0x7f0000001680)={&(0x7f0000000000)={0xa, 0x4e22, 0x14, @loopback, 0xff}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000100)="3db04db26bf8d118c7e37b7705a5ba9af997850c0a0d35c8534f754813a6f2fc701bad2c587f927f1ba8b6ef0cad12ce3ebce0c28191", 0x36}, {&(0x7f0000000140)="443bfdd6e2489c4d3dfdd32ef86dc2129e1a19bcfb4bb28dfcee8b83058c8116596793779c217e0bf0f3ea2979856d737a9c86019efd972d7692866c6bcb260473ea4f9f670e92109cf61235fd022070b67f4045a44c4084864c9f4779a631913b", 0x61}, {&(0x7f0000000200)="e4b73dcdbf74a42cecc5b5366461c8cc4321a2830df9454372f9c02c919a2875d751837b3b66f89a987efabdabeb5e50c224c32ce19bb837aa7c393265c26e6232719829301a8440192eeb9b78b9a71350c9d7d2f6c404368f65e2b3c1488c33a69fff45c0342e4927e92c4e0b98e1472de6dcc68927bf986040930e3b2798876e357c70504cec9e6ae885c2abeb6aa6300d8262c316775e7c28702b82088c2d6ba4c5b9674ad872b8204765f7ebb5cc069130da8421c1798250d1de19c162346849b70bf144b280ef0bfb312c", 0xcd}], 0x3, &(0x7f00000003c0)=[@hopopts_2292={{0x1020, 0x29, 0x36, {0x5e, 0x200, [], [@generic={0x6, 0x1000, "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"}, @pad1]}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty, r2}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x400000000000}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x101}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4}}, @hopopts_2292={{0xa0, 0x29, 0x36, {0x3f6774e5b8052408, 0x10, [], [@hao={0xc9, 0x10, @local}, @jumbo={0xc2, 0x4, 0x5}, @generic={0x4f, 0x6a, "67867b42f4c8947ae86cda79e866ef42de0677c58beab7f60fcded1e3985890a74da92de3aeed02891972dc427038eee79f83d44a177d1bc150a118f1177af8a4ab630f661661a9a839753711c3213c6c82fa6a0bcd68c5436f786ebbeb25453051ea53c72e8ccf66e03"}]}}}, @rthdrdstopts={{0xc0, 0x29, 0x37, {0x6c, 0x14, [], [@generic={0x80, 0xa1, "29104ce3f116c2a39e016e3370f41541996d96e7892a967667558eff7627b5e9aff6388be65cb9492e0c3480b6df67d1304760e3d4ad24d5e115e57292fc12056daf2d122f3fff86284ac643327303ccb79bb55a748a838d3990318b26bbaf5b74226347910190d4ba5cdc60c5c32da9745f3ab81e0250bbf5688bebfb86d98cebc353944b7dc031c9165ca37bff5dac4570f39a73a7c74ada42848b08b5bbe331"}]}}}, @hopopts_2292={{0x80, 0x29, 0x36, {0x2e, 0xc, [], [@calipso={0x7, 0x58, {0x9, 0x14, 0x1, 0x2, [0x0, 0x0, 0x4, 0xfffffffffffffffb, 0x0, 0x7f, 0x9, 0x7fffffff, 0x80000, 0x1000]}}, @pad1, @jumbo={0xc2, 0x4, 0x2d}]}}}], 0x1288}, 0x44) r3 = socket$inet(0x10, 0x80002000b, 0xff) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="24000000250007031dfffd946fa2830020200a0109000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:35 executing program 0 (fault-call:1 fault-nth:30): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) [ 808.067675] FAULT_INJECTION: forcing a failure. [ 808.067675] name failslab, interval 1, probability 0, space 0, times 0 [ 808.093350] CPU: 0 PID: 30289 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 808.100420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 808.109958] Call Trace: [ 808.112562] dump_stack+0x172/0x1f0 [ 808.116206] should_fail.cold+0xa/0x1b [ 808.120112] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 808.125228] ? lock_downgrade+0x810/0x810 [ 808.129389] ? ___might_sleep+0x163/0x280 [ 808.133636] __should_failslab+0x121/0x190 [ 808.137880] should_failslab+0x9/0x14 [ 808.141686] kmem_cache_alloc_trace+0x2cc/0x760 [ 808.146364] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 808.151928] ? _copy_from_user+0xdd/0x150 [ 808.156087] copy_mount_options+0x5c/0x3a0 [ 808.160324] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 808.165881] ksys_mount+0xa7/0x150 [ 808.169451] __x64_sys_mount+0xbe/0x150 [ 808.173455] do_syscall_64+0xfd/0x620 [ 808.177279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 808.182475] RIP: 0033:0x45c26a [ 808.185703] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 808.204623] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 19:01:36 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) read$rfkill(r0, &(0x7f00000000c0), 0x8) lseek(r0, 0x0, 0x4) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000000)) close(r0) 19:01:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x7000000) 19:01:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0xfffffffffffffffd, 0x8001) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x7) fcntl$notify(r0, 0x402, 0x80000004) openat$cgroup_ro(r2, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) 19:01:36 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x3e) 19:01:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) [ 808.212351] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 808.219634] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 808.226917] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 808.234205] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 808.241491] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:36 executing program 0 (fault-call:1 fault-nth:31): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:36 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x3e) [ 808.463482] FAULT_INJECTION: forcing a failure. [ 808.463482] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 808.475329] CPU: 0 PID: 30316 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 808.482357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 808.491723] Call Trace: [ 808.494332] dump_stack+0x172/0x1f0 [ 808.498011] should_fail.cold+0xa/0x1b [ 808.501920] ? kernel_text_address+0x73/0xf0 [ 808.506361] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 808.511487] ? mark_held_locks+0x100/0x100 [ 808.515741] __alloc_pages_nodemask+0x1ee/0x760 [ 808.520434] ? __alloc_pages_slowpath+0x2870/0x2870 [ 808.525467] ? find_held_lock+0x35/0x130 [ 808.529572] cache_grow_begin+0x9c/0x8b0 [ 808.533736] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 808.539386] ? check_preemption_disabled+0x48/0x290 [ 808.544425] kmem_cache_alloc+0x63b/0x700 [ 808.548598] getname_flags+0xd6/0x5b0 [ 808.552422] user_path_at_empty+0x2f/0x50 [ 808.556587] do_mount+0x150/0x2bc0 [ 808.560146] ? rcu_read_lock_sched_held+0x110/0x130 [ 808.565188] ? copy_mount_string+0x40/0x40 [ 808.569441] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 808.575000] ? _copy_from_user+0xdd/0x150 [ 808.579189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 808.584742] ? copy_mount_options+0x280/0x3a0 [ 808.589263] ksys_mount+0xdb/0x150 [ 808.592827] __x64_sys_mount+0xbe/0x150 [ 808.596824] do_syscall_64+0xfd/0x620 [ 808.600645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 808.605847] RIP: 0033:0x45c26a [ 808.609136] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 808.628062] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 808.635799] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 808.643108] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 808.650396] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 19:01:36 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x3e) 19:01:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) [ 808.657682] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 808.665051] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1a200, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0xffffffffffffff2e) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000440)={0x0, 0x0, 0x8, 0x0, [], [{0x80, 0x55ec, 0x2, 0x80, 0x3, 0x80}, {0x2, 0x338, 0x9, 0x4, 0x1, 0x100}], [[], [], [], [], [], [], [], []]}) bind$bt_hci(r2, &(0x7f0000000200)={0x1f, r3, 0x2}, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r4 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$KDSKBLED(r4, 0x4b65, 0x1) ioctl$VIDIOC_SUBDEV_S_CROP(r4, 0xc038563c, &(0x7f0000000080)={0x0, 0x0, {0x2, 0x7f, 0x3, 0x1ff}}) [ 808.706734] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:01:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:36 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) recvmsg$kcm(r0, &(0x7f0000001640)={&(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000100)=""/162, 0xa2}, {&(0x7f0000000280)=""/152, 0x98}, {&(0x7f00000001c0)=""/121, 0x79}, {&(0x7f0000000340)=""/200, 0xc8}, {&(0x7f0000000440)=""/148, 0x94}, {&(0x7f0000000500)=""/132, 0x84}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x7, &(0x7f0000000000)=""/59, 0x3b}, 0x1) close(r0) 19:01:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x8000000) 19:01:36 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x3e) 19:01:36 executing program 0 (fault-call:1 fault-nth:32): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000100)={0x8, 0x3f, 0xfff, 'queue0\x00', 0x8}) r2 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") statx(r0, &(0x7f0000000000)='./file0\x00', 0x2000, 0x10, &(0x7f0000000200)) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'team0\x00', {0x2, 0x4e21, @multicast1}}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000100)={[0x2, 0x0, 0x2, 0xfffffffffffffff7, 0x6, 0xabe4, 0x4, 0x1b7, 0xffffffffffffeaf9, 0x73a4, 0x9, 0xa6a, 0x0, 0xc3, 0x3, 0x5], 0x5000, 0x20104}) r1 = socket$inet(0x10, 0x3, 0x1000000000000046) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}, &(0x7f0000000340)=0x10) 19:01:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:36 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x3e) 19:01:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000000)={@remote, @multicast1}, &(0x7f0000000080)=0xc) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x0, 0x1000000000000002) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:37 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0xa000000) 19:01:37 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x3e) [ 809.292001] FAULT_INJECTION: forcing a failure. [ 809.292001] name failslab, interval 1, probability 0, space 0, times 0 [ 809.380788] CPU: 1 PID: 30373 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 809.387854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 809.397256] Call Trace: [ 809.399870] dump_stack+0x172/0x1f0 [ 809.403530] should_fail.cold+0xa/0x1b [ 809.407449] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 809.412578] ? lock_downgrade+0x810/0x810 [ 809.416746] ? ___might_sleep+0x163/0x280 [ 809.420914] __should_failslab+0x121/0x190 [ 809.425175] should_failslab+0x9/0x14 [ 809.429083] kmem_cache_alloc+0x2ae/0x700 [ 809.433250] ? find_held_lock+0x35/0x130 [ 809.437342] ? fs_reclaim_acquire+0x20/0x20 [ 809.441687] getname_flags+0xd6/0x5b0 [ 809.445517] user_path_at_empty+0x2f/0x50 [ 809.449677] do_mount+0x150/0x2bc0 [ 809.453231] ? rcu_read_lock_sched_held+0x110/0x130 [ 809.458264] ? copy_mount_string+0x40/0x40 [ 809.462522] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 809.468080] ? _copy_from_user+0xdd/0x150 [ 809.472252] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 809.477805] ? copy_mount_options+0x280/0x3a0 [ 809.482321] ksys_mount+0xdb/0x150 [ 809.485894] __x64_sys_mount+0xbe/0x150 [ 809.489886] do_syscall_64+0xfd/0x620 [ 809.493707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 809.498911] RIP: 0033:0x45c26a [ 809.502113] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 809.521027] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 809.528771] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 809.536059] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 809.543349] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 809.550633] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 809.557916] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:37 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) mknod$loop(&(0x7f0000000000)='./file0\x00', 0xe002, 0x1) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000040)={0x9, 0x1ff}) close(r0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000a004e240000001f00000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a004e227233f8f501db0c00000009ff01000000000000000000000000000000000000000000000000000000000000000000004233ca084fb22ee7000000000000000000000000000000000000004a0000000000000000000000000000000000000000000000000000000000000000000024adafebb36677e200"/288], 0x110) 19:01:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) bind$ax25(r0, &(0x7f0000000100)={{0x3, @null, 0x825}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:37 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x3e) 19:01:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:37 executing program 0 (fault-call:1 fault-nth:33): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:37 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0xe0e0000) [ 809.884768] net_ratelimit: 24 callbacks suppressed [ 809.884775] protocol 88fb is buggy, dev hsr_slave_0 [ 809.894907] protocol 88fb is buggy, dev hsr_slave_1 19:01:37 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x3e) 19:01:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x12000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000200)={{0x7, 0x2920}, 0x1, 0x1, 0xdd53, {0x2, 0x9}, 0x100000000, 0xfffffffffffffffb}) r2 = socket$inet(0x10, 0x3, 0x7f) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r3, 0x800443d2, &(0x7f0000000080)={0x2, &(0x7f0000000140)=[{}, {}]}) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 810.004343] FAULT_INJECTION: forcing a failure. [ 810.004343] name failslab, interval 1, probability 0, space 0, times 0 19:01:37 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x1f000000) [ 810.137507] CPU: 0 PID: 30411 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 810.144573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 810.153943] Call Trace: [ 810.156554] dump_stack+0x172/0x1f0 [ 810.160208] should_fail.cold+0xa/0x1b [ 810.164126] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 810.169257] ? lock_downgrade+0x810/0x810 [ 810.173513] ? ___might_sleep+0x163/0x280 [ 810.177685] __should_failslab+0x121/0x190 [ 810.181935] should_failslab+0x9/0x14 [ 810.185748] kmem_cache_alloc+0x2ae/0x700 [ 810.189912] ? find_held_lock+0x35/0x130 [ 810.193985] ? fs_reclaim_acquire+0x20/0x20 [ 810.198321] getname_flags+0xd6/0x5b0 [ 810.202141] user_path_at_empty+0x2f/0x50 [ 810.206394] do_mount+0x150/0x2bc0 [ 810.209953] ? rcu_read_lock_sched_held+0x110/0x130 [ 810.214984] ? copy_mount_string+0x40/0x40 [ 810.219235] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 810.224784] ? _copy_from_user+0xdd/0x150 [ 810.228959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 810.234508] ? copy_mount_options+0x280/0x3a0 [ 810.239152] ksys_mount+0xdb/0x150 [ 810.242731] __x64_sys_mount+0xbe/0x150 [ 810.246724] do_syscall_64+0xfd/0x620 [ 810.250538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 810.255731] RIP: 0033:0x45c26a [ 810.258928] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 810.277841] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 19:01:38 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x3e) 19:01:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0xffffffffffffffff, 0x3, 0x81, 0x1, 0x1}}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x218800) [ 810.285569] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 810.292859] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 810.300492] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 810.307778] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 810.315062] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:38 executing program 0 (fault-call:1 fault-nth:34): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 810.565838] FAULT_INJECTION: forcing a failure. [ 810.565838] name failslab, interval 1, probability 0, space 0, times 0 [ 810.589949] CPU: 1 PID: 30443 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 810.597007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 810.606376] Call Trace: [ 810.609087] dump_stack+0x172/0x1f0 [ 810.612917] should_fail.cold+0xa/0x1b [ 810.616837] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 810.621966] ? lock_downgrade+0x810/0x810 [ 810.626134] ? ___might_sleep+0x163/0x280 [ 810.630305] __should_failslab+0x121/0x190 [ 810.634557] should_failslab+0x9/0x14 [ 810.638371] kmem_cache_alloc+0x2ae/0x700 [ 810.642541] ? lock_downgrade+0x810/0x810 [ 810.646710] alloc_vfsmnt+0x28/0x780 [ 810.650499] vfs_kern_mount.part.0+0x2a/0x410 [ 810.655017] do_mount+0x53e/0x2bc0 [ 810.658583] ? copy_mount_string+0x40/0x40 [ 810.662829] ? _copy_from_user+0xdd/0x150 [ 810.666994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 810.672546] ? copy_mount_options+0x280/0x3a0 [ 810.677057] ksys_mount+0xdb/0x150 [ 810.680612] __x64_sys_mount+0xbe/0x150 [ 810.684596] do_syscall_64+0xfd/0x620 [ 810.688496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 810.693686] RIP: 0033:0x45c26a [ 810.696883] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 810.715878] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 810.723603] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 810.730881] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 810.738160] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 810.745701] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 810.752973] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 810.764804] protocol 88fb is buggy, dev hsr_slave_0 [ 810.769932] protocol 88fb is buggy, dev hsr_slave_1 19:01:38 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000000)={0x4, 0x0, [{0x96, 0x1, 0x0, 0x0, @irqchip={0x2, 0x2}}, {0xfffffffffffffffc, 0x4, 0x0, 0x0, @adapter={0xda4e, 0x8001, 0x40, 0xfffffffffffffff7, 0x24}}, {0xfffffffffffffdf1, 0x3, 0x0, 0x0, @irqchip={0x4, 0x1}}, {0xff, 0x1, 0x0, 0x0, @msi={0x100, 0x401, 0x1}}]}) 19:01:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x184) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000100)=""/91) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet(0x10, 0x3, 0x1000000000000006) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3, 0xffffffffffffffec, 0x0, 0x2, 0xe, 0x11, "0cc46bab6ac4675e2aa027e246d4b3066629406ec0ff1d2ab1d217e9381b1331970165c5da924136460bb3a1358c737c8c8cbd322beb7dba029cfe0ee4539c8d", "dfe3e6574d2088f24abc3a5b8888e261c83f66354e070e374387656e3079cb486030dcd5d1601c7267f91d0f273ab049c54ece44041fff19c4f63234a054b4d6", "a8c1f56255f064376f966b91c37bc717cc1b850734f74213829ecb2f9799edf0", [0x5, 0x20]}) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) write$FUSE_INTERRUPT(r3, &(0x7f0000000180)={0x10, 0x0, 0x2}, 0x10) 19:01:38 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3203000000000000]}, 0x3e) 19:01:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x20000000) 19:01:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:38 executing program 0 (fault-call:1 fault-nth:35): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 810.987602] FAULT_INJECTION: forcing a failure. [ 810.987602] name failslab, interval 1, probability 0, space 0, times 0 [ 811.003233] CPU: 1 PID: 30459 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 811.011821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 811.021189] Call Trace: [ 811.023809] dump_stack+0x172/0x1f0 [ 811.027553] should_fail.cold+0xa/0x1b [ 811.031466] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 811.036595] ? lock_downgrade+0x810/0x810 [ 811.040936] ? ___might_sleep+0x163/0x280 [ 811.045113] ? kill_litter_super+0x60/0x60 [ 811.049367] __should_failslab+0x121/0x190 [ 811.053619] should_failslab+0x9/0x14 [ 811.057432] kmem_cache_alloc_trace+0x2cc/0x760 [ 811.062124] ? kasan_check_read+0x11/0x20 [ 811.066287] ? do_raw_spin_unlock+0x57/0x270 [ 811.070718] ? kill_litter_super+0x60/0x60 [ 811.074970] sget_userns+0x11b/0xd30 [ 811.078697] ? kill_litter_super+0x60/0x60 [ 811.082954] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 811.088503] ? ns_test_super+0x50/0x50 [ 811.092407] ? ns_test_super+0x50/0x50 [ 811.096309] ? kill_litter_super+0x60/0x60 [ 811.100558] sget+0x10c/0x150 [ 811.103682] mount_bdev+0xff/0x3c0 [ 811.108516] ? vfat_mount+0x40/0x40 [ 811.112153] vfat_mount+0x35/0x40 [ 811.115602] mount_fs+0xa8/0x32b [ 811.115639] vfs_kern_mount.part.0+0x6f/0x410 [ 811.115657] do_mount+0x53e/0x2bc0 [ 811.115675] ? copy_mount_string+0x40/0x40 [ 811.115692] ? _copy_from_user+0xdd/0x150 [ 811.115711] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 811.115727] ? copy_mount_options+0x280/0x3a0 [ 811.127765] cgroup: fork rejected by pids controller in [ 811.131346] ksys_mount+0xdb/0x150 [ 811.131365] __x64_sys_mount+0xbe/0x150 [ 811.154673] do_syscall_64+0xfd/0x620 [ 811.162440] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.167642] RIP: 0033:0x45c26a [ 811.170850] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 811.190249] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 811.190265] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 811.190272] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 811.190280] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 811.190286] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 811.190293] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:39 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x3e) 19:01:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x200000100003, 0x3) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 811.190543] protocol 88fb is buggy, dev hsr_slave_0 [ 811.205586] protocol 88fb is buggy, dev hsr_slave_1 [ 811.240359] protocol 88fb is buggy, dev hsr_slave_0 [ 811.250416] protocol 88fb is buggy, dev hsr_slave_1 [ 811.257304] /syz1 19:01:39 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x3e) 19:01:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xded, 0x400000) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000140)={r2, r3, 0x81}) r4 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:39 executing program 0 (fault-call:1 fault-nth:36): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:39 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}, 0x3e) [ 811.484762] protocol 88fb is buggy, dev hsr_slave_0 [ 811.489943] protocol 88fb is buggy, dev hsr_slave_1 [ 811.511177] FAULT_INJECTION: forcing a failure. [ 811.511177] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 811.535469] CPU: 1 PID: 30571 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 811.542525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 811.551892] Call Trace: [ 811.554502] dump_stack+0x172/0x1f0 [ 811.558153] should_fail.cold+0xa/0x1b [ 811.562059] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 811.567180] ? ___might_sleep+0x163/0x280 [ 811.571347] ? __might_sleep+0x95/0x190 [ 811.575339] __alloc_pages_nodemask+0x1ee/0x760 [ 811.580031] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 811.585598] ? pcpu_alloc+0x144/0x12d0 [ 811.589544] ? __alloc_pages_slowpath+0x2870/0x2870 [ 811.594598] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 811.599368] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 811.604906] alloc_pages_current+0x107/0x210 [ 811.604926] get_zeroed_page+0x14/0x50 [ 811.604940] mount_fs+0x20a/0x32b [ 811.604959] vfs_kern_mount.part.0+0x6f/0x410 [ 811.604976] do_mount+0x53e/0x2bc0 [ 811.604999] ? copy_mount_string+0x40/0x40 [ 811.624747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 811.624762] ? copy_mount_options+0x280/0x3a0 [ 811.624780] ksys_mount+0xdb/0x150 [ 811.624796] __x64_sys_mount+0xbe/0x150 [ 811.624815] do_syscall_64+0xfd/0x620 [ 811.624836] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.646569] RIP: 0033:0x45c26a [ 811.658720] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 811.677634] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 811.685363] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 811.692648] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 811.699935] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 811.707217] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 811.714499] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x3f000000) 19:01:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet(0x10, 0x3, 0x1000000000000006) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x60880006}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)={0x29c, r2, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, [], 0x2b}, 0x3f}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x10000, @mcast1, 0x2}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x84d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xdf}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_BEARER={0x7c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x5, @empty, 0xddd}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x5, @mcast2, 0x20}}}}]}, @TIPC_NLA_BEARER={0x110, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @rand_addr=0x401}}, {0x14, 0x2, @in={0x2, 0x4e23, @loopback}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x1, @remote, 0x2}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x18}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x2, @empty, 0x4}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}]}]}, 0x29c}}, 0x8804) 19:01:39 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x3e) 19:01:39 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xa) lseek(r0, 0x0, 0x4) close(r0) 19:01:39 executing program 0 (fault-call:1 fault-nth:37): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 811.963781] FAULT_INJECTION: forcing a failure. [ 811.963781] name failslab, interval 1, probability 0, space 0, times 0 [ 812.004865] CPU: 1 PID: 30607 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 812.012016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 812.021386] Call Trace: [ 812.024008] dump_stack+0x172/0x1f0 [ 812.027663] should_fail.cold+0xa/0x1b [ 812.031592] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 812.046183] ? lock_downgrade+0x810/0x810 [ 812.050362] ? ___might_sleep+0x163/0x280 [ 812.054539] __should_failslab+0x121/0x190 [ 812.058793] should_failslab+0x9/0x14 [ 812.062608] __kmalloc+0x2e2/0x750 [ 812.066169] ? __lockdep_init_map+0x10c/0x5b0 [ 812.070683] ? prealloc_shrinker+0xdf/0x340 [ 812.075026] prealloc_shrinker+0xdf/0x340 [ 812.079188] sget_userns+0x7ec/0xd30 [ 812.082912] ? kill_litter_super+0x60/0x60 [ 812.087167] ? ns_test_super+0x50/0x50 [ 812.091063] ? ns_test_super+0x50/0x50 [ 812.095049] ? kill_litter_super+0x60/0x60 [ 812.099295] sget+0x10c/0x150 [ 812.102415] mount_bdev+0xff/0x3c0 [ 812.105967] ? vfat_mount+0x40/0x40 [ 812.109611] vfat_mount+0x35/0x40 [ 812.113078] mount_fs+0xa8/0x32b [ 812.116479] vfs_kern_mount.part.0+0x6f/0x410 [ 812.120984] do_mount+0x53e/0x2bc0 [ 812.124531] ? copy_mount_string+0x40/0x40 [ 812.128865] ? _copy_from_user+0xdd/0x150 [ 812.133119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 812.138759] ? copy_mount_options+0x280/0x3a0 [ 812.143275] ksys_mount+0xdb/0x150 [ 812.146831] __x64_sys_mount+0xbe/0x150 [ 812.150821] do_syscall_64+0xfd/0x620 19:01:40 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}, 0x3e) [ 812.154638] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 812.159836] RIP: 0033:0x45c26a [ 812.163038] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 812.181956] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 812.189674] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 812.196946] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 812.196958] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 812.196965] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 812.196973] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x20800, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:40 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x3e) 19:01:40 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x40000000) 19:01:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) accept$inet(r0, &(0x7f0000000240)={0x2, 0x0, @initdev}, &(0x7f0000000080)=0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet(0x10, 0x3, 0x1000000000000006) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @multicast2}, @in=@initdev}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) setxattr$security_smack_transmute(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffe2a, 0x2) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:40 executing program 0 (fault-call:1 fault-nth:38): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:40 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x3e) 19:01:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2000, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r2, 0x4) [ 812.528024] FAULT_INJECTION: forcing a failure. [ 812.528024] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 812.609237] CPU: 0 PID: 30647 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 812.616312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 812.625853] Call Trace: [ 812.628468] dump_stack+0x172/0x1f0 [ 812.632128] should_fail.cold+0xa/0x1b [ 812.636045] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 812.641166] ? ___might_sleep+0x163/0x280 [ 812.645341] ? __might_sleep+0x95/0x190 [ 812.649339] __alloc_pages_nodemask+0x1ee/0x760 [ 812.654028] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 812.659756] ? pcpu_alloc+0x144/0x12d0 [ 812.663666] ? __alloc_pages_slowpath+0x2870/0x2870 [ 812.668709] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 812.673487] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 812.679134] alloc_pages_current+0x107/0x210 [ 812.683566] get_zeroed_page+0x14/0x50 [ 812.687468] mount_fs+0x20a/0x32b [ 812.690943] vfs_kern_mount.part.0+0x6f/0x410 [ 812.695470] do_mount+0x53e/0x2bc0 [ 812.699033] ? copy_mount_string+0x40/0x40 [ 812.703297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 812.708945] ? copy_mount_options+0x280/0x3a0 [ 812.713467] ksys_mount+0xdb/0x150 [ 812.717024] __x64_sys_mount+0xbe/0x150 [ 812.721016] do_syscall_64+0xfd/0x620 [ 812.724838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 812.730032] RIP: 0033:0x45c26a [ 812.733238] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 812.752507] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 812.760235] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 812.767524] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 812.774816] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 812.782117] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 812.789387] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:40 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) 19:01:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000000)={0x3b, @multicast1, 0x4e20, 0x1, 'sed\x00', 0xa, 0x81, 0x34}, 0x2c) socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:40 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x3e) 19:01:40 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x48000000) 19:01:40 executing program 0 (fault-call:1 fault-nth:39): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 813.006628] FAULT_INJECTION: forcing a failure. [ 813.006628] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 813.018960] CPU: 0 PID: 30679 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 813.025987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 813.035362] Call Trace: [ 813.037974] dump_stack+0x172/0x1f0 [ 813.041632] should_fail.cold+0xa/0x1b [ 813.045546] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 813.050836] ? mark_held_locks+0x100/0x100 [ 813.055096] ? avc_has_perm_noaudit+0x3b6/0x570 [ 813.059791] __alloc_pages_nodemask+0x1ee/0x760 [ 813.064496] ? __alloc_pages_slowpath+0x2870/0x2870 [ 813.069552] cache_grow_begin+0x9c/0x8b0 [ 813.073646] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 813.079204] ? check_preemption_disabled+0x48/0x290 [ 813.084243] kmem_cache_alloc_trace+0x685/0x760 [ 813.088938] ? kill_litter_super+0x60/0x60 [ 813.093191] sget_userns+0x11b/0xd30 [ 813.096963] ? kill_litter_super+0x60/0x60 [ 813.101310] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 813.106871] ? ns_test_super+0x50/0x50 [ 813.110776] ? ns_test_super+0x50/0x50 [ 813.114677] ? kill_litter_super+0x60/0x60 [ 813.118930] sget+0x10c/0x150 [ 813.122052] mount_bdev+0xff/0x3c0 [ 813.125601] ? vfat_mount+0x40/0x40 [ 813.129243] vfat_mount+0x35/0x40 [ 813.132707] mount_fs+0xa8/0x32b [ 813.136177] vfs_kern_mount.part.0+0x6f/0x410 [ 813.140704] do_mount+0x53e/0x2bc0 [ 813.144268] ? copy_mount_string+0x40/0x40 [ 813.148622] ? _copy_from_user+0xdd/0x150 [ 813.152794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 813.158357] ? copy_mount_options+0x280/0x3a0 [ 813.162874] ksys_mount+0xdb/0x150 [ 813.166433] __x64_sys_mount+0xbe/0x150 [ 813.170527] do_syscall_64+0xfd/0x620 [ 813.174351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.181289] RIP: 0033:0x45c26a [ 813.184501] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 813.203416] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 813.211582] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 813.218866] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 813.226154] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 813.233441] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 813.240725] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:41 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x3e) [ 813.263463] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:01:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x3ff, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1f, 0x280) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000100)="1ebd2b456ea4d11119a26a9c49942fe4928fbbbb288fe7a53525b5fe8294db230da0de02588b7c1611e5d91763d2ce308c84ab14a34bbdd748c99c5245e1f27a6859fe3530d5dfb60b10eb2a8ec7665360f3c6e6499910dd56268b8a119493bc96d71fd732fcf28c31991524472fdef43161cf5fb5b5b7491ba7fb18916355f52dae145237bac01501e73d3c6d137a8087e3848fa3d8addc7dfdc3e829c99ffb1252", 0xa2}, {&(0x7f0000000200)="ae8d740e6e70a137da36b9ff367b0bcaa9061a5276ec596c27ecbbe7808811e90e5becb7e16d04a574052be6c1117643657ff3b9ee3f0c86d62d099a579081d28fee259c82d5bafe23a6b2ac93150de14af5d2a62dbb9e50c2663f16878ba03d373a03a9373143db8dc2233a323aa80a0950c29f43d61b1a9facf6c8a1994aee22fe41f5442821360065aa7da7fb17", 0x8f}], 0x2) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) fcntl$setstatus(r0, 0x4, 0x40c00) 19:01:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 19:01:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x4c000000) 19:01:41 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x3e) 19:01:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0xffffffffffffffd4, &(0x7f0000000000)=[{&(0x7f0000000200)="eca5455be8d385bfa4b2a83df3b6d0ec2098e94cb2738b3ed613cb95723b4e320a1cee851299f6672a15e95cc653e4043f5edd288824696eb90b892d4287b08280bcc853a1744b1a662b6d8a012ef5d3ac641bb6f8a384fcb50e94a3e09fd403bec436c4871a59495d766a207398911af46ad87c81394f4962016cd0e4de811694d5606b33f6abc4366772ed855b976c62bf9358598bde570a0948a52d2700ac7baf4360615df6c25a4592420c2ca9552f5d6319d12069bdae5ac9e2f4ade11e6f91efebf12414bea229e2870f2a89e34d913f32dc3f246d8650839eda"}], 0x0, 0x0, 0xfffffd37}, 0x4) 19:01:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:41 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3e) 19:01:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x68000000) 19:01:41 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0), 0x0) 19:01:41 executing program 0 (fault-call:1 fault-nth:40): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 813.794566] FAULT_INJECTION: forcing a failure. [ 813.794566] name failslab, interval 1, probability 0, space 0, times 0 [ 813.818719] CPU: 0 PID: 30736 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 813.825778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 813.835229] Call Trace: [ 813.837836] dump_stack+0x172/0x1f0 19:01:41 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x3e) 19:01:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2e2d, 0x8c00) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x1f}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r3, 0x7}, &(0x7f0000000180)=0x8) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 813.841492] should_fail.cold+0xa/0x1b [ 813.845403] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 813.850524] ? lock_downgrade+0x810/0x810 [ 813.854695] ? ___might_sleep+0x163/0x280 [ 813.858859] __should_failslab+0x121/0x190 [ 813.863102] should_failslab+0x9/0x14 [ 813.866911] kmem_cache_alloc+0x2ae/0x700 [ 813.871080] ? trace_hardirqs_on+0x67/0x220 [ 813.875434] ? kasan_check_read+0x11/0x20 [ 813.879592] getname_kernel+0x53/0x370 [ 813.883483] kern_path+0x20/0x40 [ 813.886860] lookup_bdev.part.0+0x7b/0x1b0 [ 813.891196] ? blkdev_open+0x290/0x290 19:01:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) [ 813.895089] ? __free_pages+0x72/0xb0 [ 813.895109] blkdev_get_by_path+0x81/0x130 [ 813.895124] mount_bdev+0x5d/0x3c0 [ 813.895140] ? vfat_mount+0x40/0x40 [ 813.903152] vfat_mount+0x35/0x40 [ 813.913727] mount_fs+0xa8/0x32b [ 813.917110] vfs_kern_mount.part.0+0x6f/0x410 [ 813.921620] do_mount+0x53e/0x2bc0 [ 813.925175] ? copy_mount_string+0x40/0x40 [ 813.929432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 813.934981] ? copy_mount_options+0x280/0x3a0 [ 813.939490] ksys_mount+0xdb/0x150 [ 813.943052] __x64_sys_mount+0xbe/0x150 [ 813.947038] do_syscall_64+0xfd/0x620 [ 813.950841] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.956028] RIP: 0033:0x45c26a [ 813.959231] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 813.978154] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 813.985884] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a 19:01:41 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3e) 19:01:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet(0x10, 0xf, 0xfff) [ 813.993170] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 814.000452] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 814.008871] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 814.016170] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:41 executing program 0 (fault-call:1 fault-nth:41): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x6c000000) 19:01:41 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x3e) 19:01:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$getown(r0, 0x9) sched_setscheduler(r1, 0x3, &(0x7f0000000000)=0xfffffffffffffffa) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 814.221349] FAULT_INJECTION: forcing a failure. [ 814.221349] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 814.233197] CPU: 0 PID: 30818 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 814.240221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 814.249594] Call Trace: [ 814.252201] dump_stack+0x172/0x1f0 [ 814.255866] should_fail.cold+0xa/0x1b [ 814.259780] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 814.264907] ? mark_held_locks+0x100/0x100 19:01:42 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x3e) [ 814.269255] ? avc_has_perm_noaudit+0x3b6/0x570 [ 814.274035] __alloc_pages_nodemask+0x1ee/0x760 [ 814.278736] ? __alloc_pages_slowpath+0x2870/0x2870 [ 814.283786] cache_grow_begin+0x9c/0x8b0 [ 814.287871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 814.293430] ? check_preemption_disabled+0x48/0x290 [ 814.298473] kmem_cache_alloc_trace+0x685/0x760 [ 814.303220] ? kill_litter_super+0x60/0x60 [ 814.307481] sget_userns+0x11b/0xd30 [ 814.311213] ? kill_litter_super+0x60/0x60 [ 814.315470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 814.321025] ? ns_test_super+0x50/0x50 [ 814.324934] ? ns_test_super+0x50/0x50 [ 814.328868] ? kill_litter_super+0x60/0x60 [ 814.333123] sget+0x10c/0x150 [ 814.336253] mount_bdev+0xff/0x3c0 [ 814.339803] ? vfat_mount+0x40/0x40 [ 814.343444] vfat_mount+0x35/0x40 [ 814.346912] mount_fs+0xa8/0x32b [ 814.350295] vfs_kern_mount.part.0+0x6f/0x410 [ 814.354805] do_mount+0x53e/0x2bc0 [ 814.358361] ? copy_mount_string+0x40/0x40 [ 814.362613] ? copy_mount_options+0x1fb/0x3a0 [ 814.367128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 814.372677] ? copy_mount_options+0x280/0x3a0 [ 814.377189] ksys_mount+0xdb/0x150 [ 814.380746] __x64_sys_mount+0xbe/0x150 [ 814.384743] do_syscall_64+0xfd/0x620 [ 814.388564] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 814.393767] RIP: 0033:0x45c26a [ 814.396966] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 814.415966] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 814.423695] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 814.431007] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 814.438293] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 814.445585] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 814.452897] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 814.474932] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 19:01:42 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000000)={0x8, 0x5, 0x0, 0x29, [], [], [], 0x7fffffff, 0xffffffffffffffff, 0x5, 0xfffffffffffffff9, "d19215ee843d883e1d3dfbcef7e710af"}) r1 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="00fbc0040013f317b3d4d6a93984559f429e367fb203c6fd8117e2e1040b1a7a477c1843dfb5bdea92ee07a22de554cb28164ace250080512e44094210450801881ced7541f17e29c670f4bdc100d9e68eb646cfa53759297073c1e284d5b4634320b4b3335e035f4cb5218ac3ce927fe73b8c73a69f0edb9a374d5528ca195bc5fb9fc422b9cc993a71d4da0a32b121b1b4a8722c708d9e789563c0009acb93a75fdbc7d3bd6082ca2b93d8d25b4a7676ad5f75fa0ec980ece00c7a9738e68f8885e152d58c566300"], 0xc0, 0x2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000480)="e43c987f92360318c1f179f9444666d4e588484f740bf16ba49042abe5f760a52f4d5c8743c290f36d82642aa3c02ad8c19d7c2a47747b98827def92ec92064255bf65745dbb1d7f6ff418411bf0060dfb2f3ca15383bbcdbb5e722757ff3f96cbc99482b84e1d071484b607cecad3c94ca74822ec3ce76c1f31775dcd426195c789b535fece0e70c47f5ed89ef38c87d37555cb5cab8213ef1a0125f66e0f5995a22a2e5e9fe56ba84d53d5aeb014b4cb891ff2867d066ef290ec84fd395285c30fde15", 0xc4, 0xfffffffffffffff8) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000140)={0x4, 0x1, 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x2000000000008) lseek(r0, 0x0, 0x4) close(r0) 19:01:42 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000200)=""/179, &(0x7f0000000000)=0xb3) 19:01:42 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x3e) 19:01:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x6e000000) 19:01:42 executing program 0 (fault-call:1 fault-nth:42): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:42 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x3e) 19:01:42 executing program 3: syz_init_net_socket$llc(0x1a, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x74000000) 19:01:42 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x3e) [ 814.924769] net_ratelimit: 16 callbacks suppressed [ 814.924778] protocol 88fb is buggy, dev hsr_slave_0 [ 814.934990] protocol 88fb is buggy, dev hsr_slave_1 [ 814.955367] FAULT_INJECTION: forcing a failure. [ 814.955367] name failslab, interval 1, probability 0, space 0, times 0 [ 815.014947] CPU: 1 PID: 30936 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 815.022012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 815.031380] Call Trace: [ 815.034008] dump_stack+0x172/0x1f0 [ 815.037751] should_fail.cold+0xa/0x1b [ 815.041667] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 815.046807] ? lock_downgrade+0x810/0x810 [ 815.050978] ? ___might_sleep+0x163/0x280 [ 815.055155] __should_failslab+0x121/0x190 [ 815.059408] should_failslab+0x9/0x14 [ 815.063222] kmem_cache_alloc_trace+0x2cc/0x760 [ 815.067909] ? kasan_unpoison_shadow+0x35/0x50 [ 815.072510] ? kasan_kmalloc+0xce/0xf0 [ 815.076425] __memcg_init_list_lru_node+0x8a/0x1e0 [ 815.081378] __list_lru_init+0x402/0x720 [ 815.085462] sget_userns+0x81b/0xd30 [ 815.089217] ? kill_litter_super+0x60/0x60 [ 815.093472] ? ns_test_super+0x50/0x50 [ 815.097371] ? ns_test_super+0x50/0x50 [ 815.101270] ? kill_litter_super+0x60/0x60 [ 815.105516] sget+0x10c/0x150 [ 815.108634] mount_bdev+0xff/0x3c0 [ 815.112185] ? vfat_mount+0x40/0x40 [ 815.115826] vfat_mount+0x35/0x40 [ 815.119291] mount_fs+0xa8/0x32b [ 815.122674] vfs_kern_mount.part.0+0x6f/0x410 [ 815.127181] do_mount+0x53e/0x2bc0 [ 815.130734] ? copy_mount_string+0x40/0x40 [ 815.134984] ? _copy_from_user+0xdd/0x150 [ 815.139145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 815.144693] ? copy_mount_options+0x280/0x3a0 [ 815.149207] ksys_mount+0xdb/0x150 [ 815.152767] __x64_sys_mount+0xbe/0x150 [ 815.156757] do_syscall_64+0xfd/0x620 [ 815.160579] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 815.165770] RIP: 0033:0x45c26a [ 815.168970] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 815.190429] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 815.198167] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 815.205444] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 19:01:43 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x3e) 19:01:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x40, 0x200) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80000, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) ioprio_get$pid(0x3, r4) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x6580, @remote, 0x2}, 0x1c) ioctl$KVM_GET_CPUID2(r3, 0xc008ae91, &(0x7f0000000200)={0x1, 0x0, [{}]}) [ 815.205518] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 815.205525] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 815.205532] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 815.324775] protocol 88fb is buggy, dev hsr_slave_0 [ 815.329897] protocol 88fb is buggy, dev hsr_slave_1 [ 815.404760] protocol 88fb is buggy, dev hsr_slave_0 [ 815.409877] protocol 88fb is buggy, dev hsr_slave_1 19:01:43 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfffffe7d) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:01:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:43 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x3e) 19:01:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000000)={0x1, 0x0, {0x5, 0x7, 0x73, 0x5}}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x7a000000) 19:01:43 executing program 0 (fault-call:1 fault-nth:43): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 815.622976] FAULT_INJECTION: forcing a failure. [ 815.622976] name failslab, interval 1, probability 0, space 0, times 0 [ 815.642254] CPU: 0 PID: 31046 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 815.649309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 815.658679] Call Trace: [ 815.661294] dump_stack+0x172/0x1f0 [ 815.664977] should_fail.cold+0xa/0x1b [ 815.668892] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 815.674022] ? lock_downgrade+0x810/0x810 [ 815.678195] ? ___might_sleep+0x163/0x280 [ 815.682374] __should_failslab+0x121/0x190 [ 815.686631] should_failslab+0x9/0x14 [ 815.690708] __kmalloc+0x2e2/0x750 [ 815.694262] ? __lockdep_init_map+0x10c/0x5b0 [ 815.698779] ? prealloc_shrinker+0xdf/0x340 [ 815.703133] prealloc_shrinker+0xdf/0x340 [ 815.707309] sget_userns+0x7ec/0xd30 [ 815.711042] ? kill_litter_super+0x60/0x60 [ 815.715296] ? ns_test_super+0x50/0x50 [ 815.719220] ? ns_test_super+0x50/0x50 [ 815.723127] ? kill_litter_super+0x60/0x60 [ 815.727381] sget+0x10c/0x150 [ 815.730509] mount_bdev+0xff/0x3c0 [ 815.734064] ? vfat_mount+0x40/0x40 [ 815.737794] vfat_mount+0x35/0x40 [ 815.741365] mount_fs+0xa8/0x32b [ 815.744753] vfs_kern_mount.part.0+0x6f/0x410 [ 815.749272] do_mount+0x53e/0x2bc0 [ 815.752840] ? copy_mount_string+0x40/0x40 [ 815.757092] ? copy_mount_options+0x1fe/0x3a0 [ 815.761613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 815.767166] ? copy_mount_options+0x280/0x3a0 [ 815.771681] ksys_mount+0xdb/0x150 [ 815.775236] __x64_sys_mount+0xbe/0x150 [ 815.779243] do_syscall_64+0xfd/0x620 [ 815.783065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 815.788263] RIP: 0033:0x45c26a [ 815.791464] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 815.810465] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 815.818285] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 815.825570] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 815.832855] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 815.840139] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 815.847506] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 815.855046] protocol 88fb is buggy, dev hsr_slave_0 [ 815.860158] protocol 88fb is buggy, dev hsr_slave_1 [ 815.865359] protocol 88fb is buggy, dev hsr_slave_0 19:01:43 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x3e) 19:01:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x100000000000, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 815.870442] protocol 88fb is buggy, dev hsr_slave_1 19:01:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[], 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:43 executing program 0 (fault-call:1 fault-nth:44): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x480002, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000080)={0x800, 0x100, 0x1}) r2 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:43 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x3e) [ 816.152182] FAULT_INJECTION: forcing a failure. [ 816.152182] name failslab, interval 1, probability 0, space 0, times 0 [ 816.195994] CPU: 1 PID: 31179 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 816.203061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 816.212433] Call Trace: [ 816.215051] dump_stack+0x172/0x1f0 [ 816.218708] should_fail.cold+0xa/0x1b [ 816.222723] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 816.227849] ? lock_downgrade+0x810/0x810 [ 816.232013] ? ___might_sleep+0x163/0x280 [ 816.236186] __should_failslab+0x121/0x190 [ 816.240438] should_failslab+0x9/0x14 [ 816.244251] kmem_cache_alloc_node_trace+0x274/0x720 [ 816.249386] __kmalloc_node+0x3d/0x80 [ 816.253200] kvmalloc_node+0x68/0x100 [ 816.257023] __list_lru_init+0x4d9/0x720 [ 816.261111] sget_userns+0x81b/0xd30 [ 816.264927] ? kill_litter_super+0x60/0x60 [ 816.269178] ? ns_test_super+0x50/0x50 [ 816.273077] ? ns_test_super+0x50/0x50 [ 816.277004] ? kill_litter_super+0x60/0x60 [ 816.281244] sget+0x10c/0x150 [ 816.284387] mount_bdev+0xff/0x3c0 [ 816.284401] ? vfat_mount+0x40/0x40 [ 816.284418] vfat_mount+0x35/0x40 [ 816.295021] mount_fs+0xa8/0x32b [ 816.298410] vfs_kern_mount.part.0+0x6f/0x410 [ 816.302932] do_mount+0x53e/0x2bc0 [ 816.306489] ? copy_mount_string+0x40/0x40 [ 816.310739] ? _copy_from_user+0xdd/0x150 [ 816.314903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 816.320454] ? copy_mount_options+0x280/0x3a0 [ 816.324967] ksys_mount+0xdb/0x150 [ 816.328516] __x64_sys_mount+0xbe/0x150 [ 816.332502] do_syscall_64+0xfd/0x620 [ 816.336317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.341515] RIP: 0033:0x45c26a [ 816.344713] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 816.363628] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 816.371358] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 816.378645] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 816.385934] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 816.393217] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 816.400502] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:44 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x3e) 19:01:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0xfeffffff) 19:01:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40000, 0x0) ioctl$TIOCGSERIAL(r2, 0x541e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/207}) 19:01:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[], 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:44 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xff64) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8, 0x800) 19:01:44 executing program 0 (fault-call:1 fault-nth:45): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:44 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x332]}, 0x3e) 19:01:44 executing program 3: lstat(&(0x7f0000000440)='./file1\x00', &(0x7f0000000480)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0xffffffffffffffda, 0x3, {0x0, 0x1}}, 0x20) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008914, &(0x7f0000000100)="5211fc7a4ce3c3385352af52649dab99fe6b694aa7cbaa305ff1989b1dea57f2b9b99779b905ad38c47f9fd6628015fa2196d1287c") r2 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0xfffffffffffffdc2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r3, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x94, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x8, 0x4}, 0x0, 0x0, &(0x7f0000000240)={0x1, 0x1, 0x2}, &(0x7f0000000280)=0xe4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0xcf6}}, 0x10) [ 816.655770] FAULT_INJECTION: forcing a failure. [ 816.655770] name failslab, interval 1, probability 0, space 0, times 0 19:01:44 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'rdma'}, {0x2b, 'pids'}, {0x2b, 'memory'}, {0x2b, 'memory'}, {0x2f, 'io'}]}, 0x20) [ 816.779087] CPU: 0 PID: 31307 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 816.786145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 816.795527] Call Trace: [ 816.795552] dump_stack+0x172/0x1f0 [ 816.795575] should_fail.cold+0xa/0x1b [ 816.795594] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 816.810945] ? lock_downgrade+0x810/0x810 [ 816.815106] ? ___might_sleep+0x163/0x280 [ 816.815128] __should_failslab+0x121/0x190 [ 816.815143] should_failslab+0x9/0x14 [ 816.815160] kmem_cache_alloc_trace+0x2cc/0x760 [ 816.831987] ? kasan_unpoison_shadow+0x35/0x50 [ 816.832004] ? kasan_kmalloc+0xce/0xf0 [ 816.832037] __memcg_init_list_lru_node+0x8a/0x1e0 [ 816.845424] __list_lru_init+0x402/0x720 [ 816.849500] sget_userns+0x81b/0xd30 [ 816.849515] ? kill_litter_super+0x60/0x60 [ 816.849531] ? ns_test_super+0x50/0x50 [ 816.849547] ? ns_test_super+0x50/0x50 [ 816.857476] ? kill_litter_super+0x60/0x60 [ 816.857492] sget+0x10c/0x150 [ 816.865371] mount_bdev+0xff/0x3c0 19:01:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0xffffff7f) [ 816.872769] ? vfat_mount+0x40/0x40 [ 816.872790] vfat_mount+0x35/0x40 [ 816.872807] mount_fs+0xa8/0x32b [ 816.872826] vfs_kern_mount.part.0+0x6f/0x410 [ 816.879965] do_mount+0x53e/0x2bc0 [ 816.879988] ? copy_mount_string+0x40/0x40 [ 816.880009] ? _copy_from_user+0xdd/0x150 [ 816.880031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 816.886808] ? copy_mount_options+0x280/0x3a0 [ 816.886828] ksys_mount+0xdb/0x150 [ 816.886847] __x64_sys_mount+0xbe/0x150 [ 816.886865] do_syscall_64+0xfd/0x620 19:01:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[], 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) [ 816.886883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.886896] RIP: 0033:0x45c26a [ 816.895025] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 816.895033] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 816.895049] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 816.895058] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 816.895067] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 816.895075] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 816.895082] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:44 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x3e) 19:01:44 executing program 0 (fault-call:1 fault-nth:46): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:45 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x3e) [ 817.221642] FAULT_INJECTION: forcing a failure. [ 817.221642] name failslab, interval 1, probability 0, space 0, times 0 [ 817.269337] CPU: 0 PID: 31545 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 817.276612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 817.285986] Call Trace: [ 817.288607] dump_stack+0x172/0x1f0 [ 817.292257] should_fail.cold+0xa/0x1b [ 817.296165] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 817.301323] ? lock_downgrade+0x810/0x810 [ 817.305491] ? ___might_sleep+0x163/0x280 [ 817.309834] __should_failslab+0x121/0x190 [ 817.314080] should_failslab+0x9/0x14 [ 817.317894] kmem_cache_alloc_trace+0x2cc/0x760 [ 817.322577] ? kasan_unpoison_shadow+0x35/0x50 [ 817.327223] ? kasan_kmalloc+0xce/0xf0 [ 817.331131] __memcg_init_list_lru_node+0x8a/0x1e0 [ 817.336077] __list_lru_init+0x402/0x720 [ 817.340153] sget_userns+0x81b/0xd30 [ 817.343872] ? kill_litter_super+0x60/0x60 [ 817.348212] ? ns_test_super+0x50/0x50 [ 817.352131] ? ns_test_super+0x50/0x50 [ 817.356052] ? kill_litter_super+0x60/0x60 [ 817.360293] sget+0x10c/0x150 [ 817.363411] mount_bdev+0xff/0x3c0 [ 817.366965] ? vfat_mount+0x40/0x40 [ 817.370628] vfat_mount+0x35/0x40 [ 817.374089] mount_fs+0xa8/0x32b [ 817.377481] vfs_kern_mount.part.0+0x6f/0x410 [ 817.381999] do_mount+0x53e/0x2bc0 [ 817.385554] ? copy_mount_string+0x40/0x40 [ 817.389886] ? _copy_from_user+0xdd/0x150 [ 817.394051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 817.399605] ? copy_mount_options+0x280/0x3a0 [ 817.404113] ksys_mount+0xdb/0x150 [ 817.407664] __x64_sys_mount+0xbe/0x150 [ 817.411651] do_syscall_64+0xfd/0x620 19:01:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0xebd9}, 0xc) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r2, 0x4) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) [ 817.415465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 817.420751] RIP: 0033:0x45c26a [ 817.423963] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 817.442875] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 817.442890] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 817.442898] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 817.442905] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 817.442912] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 817.442920] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:45 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x3e) 19:01:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:45 executing program 0 (fault-call:1 fault-nth:47): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0xfffffffe) [ 817.781085] FAULT_INJECTION: forcing a failure. [ 817.781085] name failslab, interval 1, probability 0, space 0, times 0 [ 817.826029] CPU: 1 PID: 31673 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 817.833081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 817.833088] Call Trace: [ 817.833113] dump_stack+0x172/0x1f0 [ 817.833135] should_fail.cold+0xa/0x1b [ 817.852615] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 817.857741] ? lock_downgrade+0x810/0x810 [ 817.861911] ? ___might_sleep+0x163/0x280 [ 817.866089] __should_failslab+0x121/0x190 [ 817.870343] should_failslab+0x9/0x14 [ 817.874165] kmem_cache_alloc_trace+0x2cc/0x760 [ 817.878847] ? kasan_unpoison_shadow+0x35/0x50 [ 817.878861] ? kasan_kmalloc+0xce/0xf0 [ 817.878883] __memcg_init_list_lru_node+0x8a/0x1e0 [ 817.887337] __list_lru_init+0x402/0x720 [ 817.887356] sget_userns+0x81b/0xd30 [ 817.887367] ? kill_litter_super+0x60/0x60 [ 817.887383] ? ns_test_super+0x50/0x50 [ 817.887397] ? ns_test_super+0x50/0x50 [ 817.887407] ? kill_litter_super+0x60/0x60 [ 817.887423] sget+0x10c/0x150 [ 817.887440] mount_bdev+0xff/0x3c0 19:01:45 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x12) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r1, 0x0, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) close(r0) ioctl$sock_ifreq(r1, 0x89b7, &(0x7f0000000000)={'\x00', @ifru_hwaddr}) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000080)={0xffff, 0x5, 0xfffffffffffff801}) 19:01:45 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x3e) 19:01:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x20, 0x200) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000200)=""/177) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x6, 0xb050, 0x200, 0x1}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = socket$inet(0x10, 0x80004, 0x1000000000000007) r4 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUM_FMT(r4, 0xc0405602, &(0x7f0000000180)={0x7, 0xe, 0x2, "5a355b21c78b4d273f158c1a2bc4fc007f202ddc8eab5dffc3ff835f8037a149", 0x77f27f5f}) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) syz_open_dev$vivid(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x2) [ 817.887455] ? vfat_mount+0x40/0x40 [ 817.887471] vfat_mount+0x35/0x40 [ 817.887485] mount_fs+0xa8/0x32b [ 817.887504] vfs_kern_mount.part.0+0x6f/0x410 [ 817.887521] do_mount+0x53e/0x2bc0 [ 817.887542] ? copy_mount_string+0x40/0x40 [ 817.887559] ? _copy_from_user+0xdd/0x150 [ 817.887581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 817.887594] ? copy_mount_options+0x280/0x3a0 [ 817.887613] ksys_mount+0xdb/0x150 [ 817.887631] __x64_sys_mount+0xbe/0x150 [ 817.887650] do_syscall_64+0xfd/0x620 19:01:45 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3203]}, 0x3e) [ 817.887671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 817.887682] RIP: 0033:0x45c26a [ 817.887697] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 817.887704] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 817.887717] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 817.887726] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 817.887734] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 817.887742] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 817.887749] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:45 executing program 0 (fault-call:1 fault-nth:48): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x1000000000000) 19:01:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:46 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x3e) 19:01:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) [ 818.272681] FAULT_INJECTION: forcing a failure. [ 818.272681] name failslab, interval 1, probability 0, space 0, times 0 19:01:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x20000) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 818.355074] CPU: 0 PID: 31786 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 818.362223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 818.362229] Call Trace: [ 818.362256] dump_stack+0x172/0x1f0 [ 818.362283] should_fail.cold+0xa/0x1b [ 818.381745] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 818.386878] ? lock_downgrade+0x810/0x810 [ 818.391052] ? ___might_sleep+0x163/0x280 [ 818.395237] __should_failslab+0x121/0x190 [ 818.399501] should_failslab+0x9/0x14 [ 818.403410] kmem_cache_alloc_trace+0x2cc/0x760 [ 818.408188] ? kasan_unpoison_shadow+0x35/0x50 [ 818.412787] ? kasan_kmalloc+0xce/0xf0 [ 818.416697] __memcg_init_list_lru_node+0x8a/0x1e0 [ 818.421649] __list_lru_init+0x402/0x720 [ 818.425735] sget_userns+0x81b/0xd30 [ 818.429487] ? kill_litter_super+0x60/0x60 [ 818.433745] ? ns_test_super+0x50/0x50 [ 818.437658] ? ns_test_super+0x50/0x50 [ 818.441556] ? kill_litter_super+0x60/0x60 [ 818.445810] sget+0x10c/0x150 [ 818.448939] mount_bdev+0xff/0x3c0 [ 818.452499] ? vfat_mount+0x40/0x40 [ 818.456320] vfat_mount+0x35/0x40 [ 818.459799] mount_fs+0xa8/0x32b [ 818.463188] vfs_kern_mount.part.0+0x6f/0x410 [ 818.467704] do_mount+0x53e/0x2bc0 [ 818.471356] ? copy_mount_string+0x40/0x40 [ 818.475612] ? _copy_from_user+0xdd/0x150 [ 818.479788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 818.485435] ? copy_mount_options+0x280/0x3a0 [ 818.489950] ksys_mount+0xdb/0x150 [ 818.493511] __x64_sys_mount+0xbe/0x150 [ 818.497512] do_syscall_64+0xfd/0x620 [ 818.501337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 818.506536] RIP: 0033:0x45c26a [ 818.509740] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 818.528653] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 818.536384] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 818.543759] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 19:01:46 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x3e) [ 818.551045] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 818.558332] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 818.565616] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:46 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0xf6) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000080)={r0, 0x0, 0x200, 0x64c8, 0x3ff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x4) r2 = geteuid() sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="fc0200002e00080028bd7000ffdbdf251c000000e802430004008e00f522cc897026ac3d0f07e0742b2f98e9dac744d9d44fd664c5816adf33980ece54d32bef9b55282aba653949b9559a4118d3e953e564dc044c4e6d53a865033d6e8d41f280f4072e61bed36ab0bc9d5a578fcdf90d18df40e3742570beaea17b9e9a0019e7c8250e68d3ca01c08a906d5c97666543d8f32cf86633e828a65455d3a8c335f6f9e90eeb9790d55eacb47b1612e674f4c6ebb98c335bf3069dce6a721ba3625c8088c249f4acfe8d1474acb03f54a659639a4f5791a848619747b4c6549c0d9718809a03a40b9c1641273cb9c41a61617abc9d64ff199adf6ed608f8588faa10b7797316dd86975b20f4b41858da13ea9d786c84acf09972e1224f0ebe702771cc46d9a5d0b349aef20d9659e04f5621064b3657f997fad7cf433f1ec826825e4322fecc9832e3c11fe434adcb8ab3df3494f8f98c06a041a78b92dabedb4138869166abbbadc8ef06df3d7526c5bfc8a8020579ba4a2258aec5bf8c8dc7f76a4a1c78702105beb3169ac8d3dde7e0c91dd9cb831fd85aeeda0c008400feffffffff0002000000000000000000000000005193e171d80634832c72e9daa0dd9d9a2d413fe9afa0aee1223d6b53b8fca4913f1c590c0d98532c0d7eca2bb6fc6bf5b17d21165c7dd56372f603197c45b582375ba50f444a092b93eade0b08008800", @ANYRES32=r2, @ANYBLOB="79148e02614078d22d4174e76f4605eff787cdbed8f2cc96a8feee22027846ed95657a8ec6a159d4fb57f2a06d07b9222fc731461896a9509f43e278fb50d779c8a9c3970cf02e410b2be90ab2f4965af9ec2a524a406deab7c4bbb5169b6426bb31be12d269ad9cd303cfd0897731a85333fd1ff39e93db632bbdebb5fcac082fd313864189642806119a2f562384d9ba1a72c2c36adeb22fb885fe005c623f892f26b4b93a39b72b16498895bf4e57e9aceb713ed1134c626c555d00109c4c3ca8e0daeac888760630a53e1ebabc2e21ad79f07373db2c203977305e9e24124a0651c9d99178765e68f0ec2868dc455796075a8b5a"], 0x2fc}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) close(r0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x220800, 0x0) 19:01:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x70}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x381000, 0x0) 19:01:46 executing program 0 (fault-call:1 fault-nth:49): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:46 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x3e) 19:01:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x4000000000000) 19:01:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) [ 818.985686] FAULT_INJECTION: forcing a failure. [ 818.985686] name failslab, interval 1, probability 0, space 0, times 0 [ 819.009975] CPU: 0 PID: 31941 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 819.017026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 819.017032] Call Trace: [ 819.017055] dump_stack+0x172/0x1f0 [ 819.017079] should_fail.cold+0xa/0x1b [ 819.036582] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 819.041713] ? lock_downgrade+0x810/0x810 [ 819.045890] ? ___might_sleep+0x163/0x280 [ 819.050078] __should_failslab+0x121/0x190 [ 819.054345] should_failslab+0x9/0x14 [ 819.058168] kmem_cache_alloc_trace+0x2cc/0x760 [ 819.063039] ? kasan_unpoison_shadow+0x35/0x50 [ 819.067644] ? kasan_kmalloc+0xce/0xf0 [ 819.071560] __memcg_init_list_lru_node+0x8a/0x1e0 [ 819.076520] __list_lru_init+0x402/0x720 [ 819.080608] sget_userns+0x81b/0xd30 19:01:46 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}, 0x3e) [ 819.084336] ? kill_litter_super+0x60/0x60 [ 819.084355] ? ns_test_super+0x50/0x50 [ 819.084369] ? ns_test_super+0x50/0x50 [ 819.084386] ? kill_litter_super+0x60/0x60 [ 819.096382] sget+0x10c/0x150 [ 819.103694] mount_bdev+0xff/0x3c0 [ 819.107262] ? vfat_mount+0x40/0x40 [ 819.110909] vfat_mount+0x35/0x40 [ 819.114365] mount_fs+0xa8/0x32b [ 819.117742] vfs_kern_mount.part.0+0x6f/0x410 [ 819.122262] do_mount+0x53e/0x2bc0 [ 819.125834] ? copy_mount_string+0x40/0x40 [ 819.130101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 819.135657] ? copy_mount_options+0x280/0x3a0 [ 819.140182] ksys_mount+0xdb/0x150 [ 819.143751] __x64_sys_mount+0xbe/0x150 [ 819.147752] do_syscall_64+0xfd/0x620 [ 819.151580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.156789] RIP: 0033:0x45c26a [ 819.160006] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 19:01:47 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}, 0x3e) [ 819.180653] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 819.188384] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 819.195671] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 819.202960] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 819.210249] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 819.217622] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:47 executing program 0 (fault-call:1 fault-nth:50): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x100000000000000) 19:01:47 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x3e) [ 819.534459] FAULT_INJECTION: forcing a failure. [ 819.534459] name failslab, interval 1, probability 0, space 0, times 0 [ 819.560032] CPU: 1 PID: 32119 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 819.567090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 819.576533] Call Trace: [ 819.576559] dump_stack+0x172/0x1f0 [ 819.576582] should_fail.cold+0xa/0x1b [ 819.576601] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 819.576621] ? lock_downgrade+0x810/0x810 [ 819.591820] ? ___might_sleep+0x163/0x280 [ 819.591842] __should_failslab+0x121/0x190 [ 819.604442] should_failslab+0x9/0x14 [ 819.608301] kmem_cache_alloc_trace+0x2cc/0x760 [ 819.613002] ? kasan_unpoison_shadow+0x35/0x50 [ 819.617647] ? kasan_kmalloc+0xce/0xf0 [ 819.621567] __memcg_init_list_lru_node+0x8a/0x1e0 [ 819.626552] __list_lru_init+0x402/0x720 [ 819.630642] sget_userns+0x81b/0xd30 [ 819.634381] ? kill_litter_super+0x60/0x60 [ 819.638628] ? ns_test_super+0x50/0x50 [ 819.642538] ? ns_test_super+0x50/0x50 [ 819.646530] ? kill_litter_super+0x60/0x60 [ 819.650781] sget+0x10c/0x150 [ 819.653944] mount_bdev+0xff/0x3c0 [ 819.657501] ? vfat_mount+0x40/0x40 [ 819.661237] vfat_mount+0x35/0x40 [ 819.664709] mount_fs+0xa8/0x32b [ 819.664730] vfs_kern_mount.part.0+0x6f/0x410 [ 819.664747] do_mount+0x53e/0x2bc0 [ 819.664766] ? copy_mount_string+0x40/0x40 [ 819.664784] ? _copy_from_user+0xdd/0x150 [ 819.672633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 819.672645] ? copy_mount_options+0x280/0x3a0 [ 819.672663] ksys_mount+0xdb/0x150 [ 819.698429] __x64_sys_mount+0xbe/0x150 [ 819.702433] do_syscall_64+0xfd/0x620 [ 819.706269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.711475] RIP: 0033:0x45c26a [ 819.714687] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 819.733692] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 819.741516] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 819.748891] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 819.756186] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 819.763470] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 819.770753] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:47 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000040)={0x7c, @rand_addr=0x1, 0x4e24, 0x0, 'rr\x00', 0x4, 0x400, 0x75}, 0x2c) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0x20}, @multicast2}, 0x8) close(r0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)) 19:01:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:47 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x3e) 19:01:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x200000000000000) 19:01:47 executing program 0 (fault-call:1 fault-nth:51): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 819.964782] net_ratelimit: 20 callbacks suppressed [ 819.964791] protocol 88fb is buggy, dev hsr_slave_0 [ 819.974911] protocol 88fb is buggy, dev hsr_slave_1 [ 819.979994] protocol 88fb is buggy, dev hsr_slave_0 [ 819.985057] protocol 88fb is buggy, dev hsr_slave_1 [ 820.040633] FAULT_INJECTION: forcing a failure. [ 820.040633] name failslab, interval 1, probability 0, space 0, times 0 [ 820.079103] CPU: 1 PID: 32199 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 820.086174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 820.095536] Call Trace: [ 820.095563] dump_stack+0x172/0x1f0 [ 820.101765] should_fail.cold+0xa/0x1b [ 820.101787] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 820.110784] ? lock_downgrade+0x810/0x810 [ 820.114954] ? ___might_sleep+0x163/0x280 [ 820.119125] __should_failslab+0x121/0x190 [ 820.123382] should_failslab+0x9/0x14 [ 820.127217] kmem_cache_alloc_trace+0x2cc/0x760 [ 820.131915] ? kasan_unpoison_shadow+0x35/0x50 [ 820.136523] ? kasan_kmalloc+0xce/0xf0 [ 820.140450] __memcg_init_list_lru_node+0x8a/0x1e0 [ 820.145411] __list_lru_init+0x402/0x720 [ 820.149501] sget_userns+0x81b/0xd30 [ 820.153238] ? kill_litter_super+0x60/0x60 [ 820.157503] ? ns_test_super+0x50/0x50 [ 820.161501] ? ns_test_super+0x50/0x50 [ 820.165404] ? kill_litter_super+0x60/0x60 [ 820.169661] sget+0x10c/0x150 [ 820.172788] mount_bdev+0xff/0x3c0 [ 820.176344] ? vfat_mount+0x40/0x40 [ 820.179986] vfat_mount+0x35/0x40 [ 820.183465] mount_fs+0xa8/0x32b [ 820.186977] vfs_kern_mount.part.0+0x6f/0x410 [ 820.191497] do_mount+0x53e/0x2bc0 [ 820.195067] ? copy_mount_string+0x40/0x40 [ 820.199320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 820.204868] ? copy_mount_options+0x280/0x3a0 [ 820.209397] ksys_mount+0xdb/0x150 [ 820.212962] __x64_sys_mount+0xbe/0x150 [ 820.216971] do_syscall_64+0xfd/0x620 [ 820.220790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 820.226079] RIP: 0033:0x45c26a [ 820.229286] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 820.248212] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 820.255946] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 820.263236] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 820.270529] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 820.277818] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 19:01:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={@null, @bcast, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r2 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:48 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x3e) [ 820.285541] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 820.293152] protocol 88fb is buggy, dev hsr_slave_0 [ 820.298315] protocol 88fb is buggy, dev hsr_slave_1 19:01:48 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3e) 19:01:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x300000000000000) 19:01:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x80, 0x82000) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000200)) ioctl(r0, 0x4, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8c100800}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)={0x1bc, r4, 0x600, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}]}, @TIPC_NLA_BEARER={0xb4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x40}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x66bda50a, @loopback, 0x1000}}, {0x14, 0x2, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xc}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xd7f}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast2}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xbe}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x133d800000000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}]}, @TIPC_NLA_MEDIA={0x54, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffff139}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffc1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000000)) 19:01:48 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x3e) 19:01:48 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000000)=0x6dd) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:01:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba8"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:48 executing program 0 (fault-call:1 fault-nth:52): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x80000001) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:48 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x3e) 19:01:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x400000000000000) [ 820.940679] FAULT_INJECTION: forcing a failure. [ 820.940679] name failslab, interval 1, probability 0, space 0, times 0 [ 820.974665] CPU: 1 PID: 32349 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 820.981729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 820.991096] Call Trace: [ 820.993727] dump_stack+0x172/0x1f0 [ 820.997387] should_fail.cold+0xa/0x1b [ 821.001308] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 821.006440] ? lock_downgrade+0x810/0x810 [ 821.012139] ? ___might_sleep+0x163/0x280 [ 821.016322] __should_failslab+0x121/0x190 [ 821.020584] should_failslab+0x9/0x14 [ 821.024402] kmem_cache_alloc_trace+0x2cc/0x760 [ 821.024419] ? kasan_unpoison_shadow+0x35/0x50 [ 821.024437] ? kasan_kmalloc+0xce/0xf0 [ 821.037565] __memcg_init_list_lru_node+0x8a/0x1e0 [ 821.042518] __list_lru_init+0x402/0x720 [ 821.046619] sget_userns+0x81b/0xd30 [ 821.050359] ? kill_litter_super+0x60/0x60 [ 821.054621] ? ns_test_super+0x50/0x50 [ 821.058526] ? ns_test_super+0x50/0x50 [ 821.062603] ? kill_litter_super+0x60/0x60 [ 821.066862] sget+0x10c/0x150 [ 821.069993] mount_bdev+0xff/0x3c0 [ 821.073550] ? vfat_mount+0x40/0x40 [ 821.077209] vfat_mount+0x35/0x40 [ 821.080685] mount_fs+0xa8/0x32b [ 821.084076] vfs_kern_mount.part.0+0x6f/0x410 19:01:48 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x3e) [ 821.088601] do_mount+0x53e/0x2bc0 [ 821.092180] ? copy_mount_string+0x40/0x40 [ 821.096444] ? _copy_from_user+0xdd/0x150 [ 821.100628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 821.106227] ? copy_mount_options+0x280/0x3a0 [ 821.110750] ksys_mount+0xdb/0x150 [ 821.114325] __x64_sys_mount+0xbe/0x150 [ 821.118331] do_syscall_64+0xfd/0x620 [ 821.122164] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.127369] RIP: 0033:0x45c26a 19:01:49 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x3e) [ 821.130579] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 821.149932] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 821.157664] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 821.164953] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 821.172237] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 821.181447] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 19:01:49 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0xfffffffffffffffd, 0xd, 0x4, 0x800, {0x77359400}, {0x1, 0xf, 0x9, 0x1856, 0x8000, 0x7, "93d55827"}, 0xe2, 0x7, @offset=0x8, 0x4}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet(0x10, 0x3, 0x1000000000000006) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000180)) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x10140, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 821.188734] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba8"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) [ 821.244782] protocol 88fb is buggy, dev hsr_slave_0 [ 821.249965] protocol 88fb is buggy, dev hsr_slave_1 19:01:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x500000000000000) [ 821.564789] protocol 88fb is buggy, dev hsr_slave_0 [ 821.569917] protocol 88fb is buggy, dev hsr_slave_1 19:01:49 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) socket$inet_udp(0x2, 0x2, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0xfff, 0x38, 0x0, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0xfffffffffffffff8, 0x7}, @mss={0x2, 0x3}, @mss={0x2, 0x1}, @sack_perm, @sack_perm], 0x5) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={0x0, 0xea1}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={r2, 0xcd77}, &(0x7f0000000240)=0x8) close(r1) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x400203, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r3, 0xc0c85666, &(0x7f0000000600)={{0x3, @addr=0x8001}, "d5aa039f90d5712bd72c00", 0x1003}) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x296fc, 0x5, 0x58, &(0x7f0000ffc000/0x2000)=nil, 0x7f}) 19:01:49 executing program 0 (fault-call:1 fault-nth:53): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:49 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x3e) 19:01:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) 19:01:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x600000000000000) 19:01:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba8"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) [ 821.852623] FAULT_INJECTION: forcing a failure. [ 821.852623] name failslab, interval 1, probability 0, space 0, times 0 19:01:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x17c) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000300)={'broute\x00', 0x0, 0x4, 0xf5, [], 0x7, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000200)=""/245}, &(0x7f0000000000)=0x78) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:49 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x3e) [ 821.936994] CPU: 1 PID: 32592 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 821.944403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.944410] Call Trace: [ 821.944434] dump_stack+0x172/0x1f0 [ 821.944455] should_fail.cold+0xa/0x1b [ 821.944476] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 821.969058] ? lock_downgrade+0x810/0x810 [ 821.973230] ? ___might_sleep+0x163/0x280 [ 821.977402] __should_failslab+0x121/0x190 [ 821.981658] should_failslab+0x9/0x14 19:01:49 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1000000000000002) lseek(r0, 0x0, 0x4) close(r0) [ 821.985489] kmem_cache_alloc_trace+0x2cc/0x760 [ 821.990180] ? kasan_unpoison_shadow+0x35/0x50 [ 821.994784] ? kasan_kmalloc+0xce/0xf0 [ 821.998704] __memcg_init_list_lru_node+0x8a/0x1e0 [ 822.003668] __list_lru_init+0x402/0x720 [ 822.007771] sget_userns+0x81b/0xd30 [ 822.011509] ? kill_litter_super+0x60/0x60 [ 822.015767] ? ns_test_super+0x50/0x50 [ 822.019682] ? ns_test_super+0x50/0x50 [ 822.023594] ? kill_litter_super+0x60/0x60 [ 822.027844] sget+0x10c/0x150 [ 822.027865] mount_bdev+0xff/0x3c0 [ 822.027883] ? vfat_mount+0x40/0x40 [ 822.043766] vfat_mount+0x35/0x40 [ 822.043785] mount_fs+0xa8/0x32b [ 822.043804] vfs_kern_mount.part.0+0x6f/0x410 [ 822.055763] do_mount+0x53e/0x2bc0 [ 822.059342] ? copy_mount_string+0x40/0x40 [ 822.063852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.069695] ? copy_mount_options+0x280/0x3a0 [ 822.074406] ksys_mount+0xdb/0x150 [ 822.078077] __x64_sys_mount+0xbe/0x150 [ 822.082245] do_syscall_64+0xfd/0x620 [ 822.086166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.091549] RIP: 0033:0x45c26a [ 822.094746] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 822.094755] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 822.094772] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 822.094779] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 19:01:49 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x3e) 19:01:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) [ 822.094786] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 822.094793] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 822.094806] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:50 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32030000]}, 0x3e) 19:01:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) socket$vsock_dgram(0x28, 0x2, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:50 executing program 0 (fault-call:1 fault-nth:54): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:50 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x700000000000000) 19:01:50 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x280080, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000640)={&(0x7f0000000440)=@delsa={0x1d4, 0x11, 0x100, 0x70bd28, 0x25dfdbfd, {@in6=@mcast2, 0x4d6, 0xa, 0x33}, [@lifetime_val={0x24, 0x9, {0x800, 0x100000000, 0x80, 0x1000}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x70bd2b, 0x70bd2c, 0x70bd2b, 0x70bd28, 0x7f}}, @address_filter={0x28, 0x1a, {@in6=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xa, 0x9, 0x8}}, @tmpl={0x144, 0x5, [{{@in6=@rand_addr="b6f6e3a9515b8632e44a1f48c36d99cb", 0x4d4, 0x6c}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3501, 0x0, 0x3, 0x0, 0x9, 0x0, 0x8}, {{@in=@empty, 0x4d3, 0x7f}, 0xa, @in6=@empty, 0x3502, 0x1, 0x2, 0x7fff, 0x7, 0x6ce}, {{@in6=@remote, 0x4d3, 0x7e}, 0xa, @in=@remote, 0x3503, 0x3, 0x2, 0x2, 0x6, 0x9, 0x20}, {{@in6=@mcast1, 0x4d5, 0x33}, 0xa, @in=@remote, 0x3500, 0x7, 0x2, 0x0, 0x100000001, 0xc42, 0x4}, {{@in=@loopback, 0x4d2, 0x7f}, 0x2, @in6=@empty, 0x3500, 0x3, 0x0, 0xffffffff, 0x8, 0x9, 0x7}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4008895}, 0xc000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_open_dev$swradio(&(0x7f00000006c0)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000002c0)={0x1f, {{0x2, 0x4e22, @remote}}}, 0x88) r2 = socket$inet(0x10, 0x3, 0x1000000000000006) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000200)=ANY=[@ANYBLOB="62726f75746500000000000000000000000000f2ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/128], @ANYBLOB='\x00'/72], 0xb8) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @broadcast, 0x0}, &(0x7f0000000080)=0xc) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000380)={r3, @broadcast, @broadcast}, 0xc) 19:01:50 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x3e) [ 822.479286] FAULT_INJECTION: forcing a failure. [ 822.479286] name failslab, interval 1, probability 0, space 0, times 0 [ 822.546852] CPU: 1 PID: 332 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 822.553758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.563393] Call Trace: [ 822.566017] dump_stack+0x172/0x1f0 [ 822.569706] should_fail.cold+0xa/0x1b [ 822.573630] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 822.578766] ? lock_downgrade+0x810/0x810 [ 822.582941] ? ___might_sleep+0x163/0x280 [ 822.587293] __should_failslab+0x121/0x190 [ 822.591553] should_failslab+0x9/0x14 [ 822.595373] kmem_cache_alloc_trace+0x2cc/0x760 [ 822.600074] ? kasan_unpoison_shadow+0x35/0x50 [ 822.604672] ? kasan_kmalloc+0xce/0xf0 [ 822.608671] __memcg_init_list_lru_node+0x8a/0x1e0 [ 822.613626] __list_lru_init+0x402/0x720 [ 822.617755] sget_userns+0x81b/0xd30 [ 822.621493] ? kill_litter_super+0x60/0x60 [ 822.625757] ? ns_test_super+0x50/0x50 [ 822.629659] ? ns_test_super+0x50/0x50 [ 822.633567] ? kill_litter_super+0x60/0x60 [ 822.637994] sget+0x10c/0x150 [ 822.641133] mount_bdev+0xff/0x3c0 [ 822.644688] ? vfat_mount+0x40/0x40 [ 822.648342] vfat_mount+0x35/0x40 [ 822.651815] mount_fs+0xa8/0x32b [ 822.655203] vfs_kern_mount.part.0+0x6f/0x410 [ 822.659726] do_mount+0x53e/0x2bc0 [ 822.663295] ? copy_mount_string+0x40/0x40 [ 822.667556] ? _copy_from_user+0xdd/0x150 [ 822.671731] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.677299] ? copy_mount_options+0x280/0x3a0 [ 822.681819] ksys_mount+0xdb/0x150 [ 822.685382] __x64_sys_mount+0xbe/0x150 [ 822.689376] do_syscall_64+0xfd/0x620 [ 822.693197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.698397] RIP: 0033:0x45c26a [ 822.701685] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 822.720683] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 822.728414] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 822.735700] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 19:01:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) [ 822.743074] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 822.750359] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 822.757651] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:50 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x800000000000000) 19:01:50 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000]}, 0x3e) 19:01:50 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x8, 0x4) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000040)={0x85, 0xf, 0x4, 0x4000000, {0x0, 0x7530}, {0x5, 0x1, 0x1, 0xffff, 0x1, 0xffffffff, "45b2bf92"}, 0x6, 0x0, @userptr=0x4, 0x4}) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) socket$inet_udp(0x2, 0x2, 0x0) write$rfkill(r0, &(0x7f00000000c0)={0x2, 0x6, 0x3, 0x1}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) 19:01:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:50 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}, 0x3e) 19:01:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:50 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0xa00000000000000) 19:01:51 executing program 0 (fault-call:1 fault-nth:55): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000240)={0x7, 0x0, @start}) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev}, 0x10) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000000c0)) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x1f4) write$UHID_CREATE2(r4, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1a5) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:51 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000]}, 0x3e) [ 823.295725] FAULT_INJECTION: forcing a failure. [ 823.295725] name failslab, interval 1, probability 0, space 0, times 0 19:01:51 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0xe0e000000000000) [ 823.375584] CPU: 0 PID: 522 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 823.382475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.391844] Call Trace: [ 823.394463] dump_stack+0x172/0x1f0 [ 823.398124] should_fail.cold+0xa/0x1b [ 823.402038] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 823.407164] ? lock_downgrade+0x810/0x810 [ 823.411338] ? ___might_sleep+0x163/0x280 [ 823.415508] __should_failslab+0x121/0x190 [ 823.419765] should_failslab+0x9/0x14 [ 823.423591] kmem_cache_alloc_node_trace+0x274/0x720 [ 823.428714] ? kmem_cache_alloc_trace+0x348/0x760 [ 823.433572] ? kasan_unpoison_shadow+0x35/0x50 [ 823.438175] __kmalloc_node+0x3d/0x80 [ 823.441991] kvmalloc_node+0x68/0x100 [ 823.445827] __list_lru_init+0x4d9/0x720 [ 823.449910] sget_userns+0x81b/0xd30 [ 823.453642] ? kill_litter_super+0x60/0x60 [ 823.457890] ? ns_test_super+0x50/0x50 [ 823.461801] ? ns_test_super+0x50/0x50 [ 823.465711] ? kill_litter_super+0x60/0x60 [ 823.469968] sget+0x10c/0x150 [ 823.473101] mount_bdev+0xff/0x3c0 [ 823.476656] ? vfat_mount+0x40/0x40 [ 823.480299] vfat_mount+0x35/0x40 [ 823.483767] mount_fs+0xa8/0x32b [ 823.487153] vfs_kern_mount.part.0+0x6f/0x410 [ 823.491669] do_mount+0x53e/0x2bc0 [ 823.495231] ? copy_mount_string+0x40/0x40 [ 823.499501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.505074] ? copy_mount_options+0x280/0x3a0 [ 823.509590] ksys_mount+0xdb/0x150 [ 823.513150] __x64_sys_mount+0xbe/0x150 [ 823.517259] do_syscall_64+0xfd/0x620 [ 823.521083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 823.526284] RIP: 0033:0x45c26a [ 823.529487] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 823.548489] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 823.556236] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 823.563520] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 19:01:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet(0x10, 0x80000003, 0x1000000000000006) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:51 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}, 0x3e) 19:01:51 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}, 0x3e) [ 823.570909] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 823.578196] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 823.585585] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:51 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r1) 19:01:51 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x3e) 19:01:51 executing program 0 (fault-call:1 fault-nth:56): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:51 executing program 3: setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:apt_lock_t:s0\x00', 0x20, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3f, 0x40000) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x8, {0x0, 0x2710}, {0x2, 0x9, 0x1, 0x401, 0x2, 0x5, "4203d87d"}, 0x5, 0x3, @fd=0xffffffffffffff9c, 0x4}) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) lstat(&(0x7f0000000480)='./file0/file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000240)='/dev/loop0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='fuseblk\x00', 0x3000, &(0x7f0000000540)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1400}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@audit='audit'}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role'}}, {@subj_user={'subj_user', 0x3d, 'security.selinux\x00'}}, {@subj_type={'subj_type', 0x3d, 'security.selinux\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '\\ppp0'}}]}}) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000680)=0xfffffffffffffffc) 19:01:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:51 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x1f00000000000000) [ 824.028787] FAULT_INJECTION: forcing a failure. [ 824.028787] name failslab, interval 1, probability 0, space 0, times 0 19:01:51 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x3e) [ 824.085756] CPU: 0 PID: 661 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 824.092649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.102048] Call Trace: [ 824.104674] dump_stack+0x172/0x1f0 [ 824.108336] should_fail.cold+0xa/0x1b [ 824.112262] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 824.117400] ? lock_downgrade+0x810/0x810 [ 824.121610] ? ___might_sleep+0x163/0x280 [ 824.125788] __should_failslab+0x121/0x190 [ 824.130051] should_failslab+0x9/0x14 19:01:52 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x3e) [ 824.133887] kmem_cache_alloc_trace+0x2cc/0x760 [ 824.138594] ? kasan_unpoison_shadow+0x35/0x50 [ 824.143206] ? kasan_kmalloc+0xce/0xf0 [ 824.147130] __memcg_init_list_lru_node+0x8a/0x1e0 [ 824.152091] __list_lru_init+0x402/0x720 [ 824.156190] sget_userns+0x81b/0xd30 [ 824.159921] ? kill_litter_super+0x60/0x60 [ 824.164179] ? ns_test_super+0x50/0x50 [ 824.168085] ? ns_test_super+0x50/0x50 [ 824.172039] ? kill_litter_super+0x60/0x60 [ 824.176296] sget+0x10c/0x150 [ 824.179438] mount_bdev+0xff/0x3c0 [ 824.182999] ? vfat_mount+0x40/0x40 [ 824.186651] vfat_mount+0x35/0x40 [ 824.190228] mount_fs+0xa8/0x32b [ 824.193628] vfs_kern_mount.part.0+0x6f/0x410 [ 824.198159] do_mount+0x53e/0x2bc0 [ 824.201732] ? copy_mount_string+0x40/0x40 [ 824.206012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 824.211579] ? copy_mount_options+0x280/0x3a0 [ 824.216109] ksys_mount+0xdb/0x150 [ 824.219692] __x64_sys_mount+0xbe/0x150 [ 824.223696] do_syscall_64+0xfd/0x620 [ 824.228403] entry_SYSCALL_64_after_hwframe+0x49/0xbe 19:01:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:52 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x3e) [ 824.233635] RIP: 0033:0x45c26a [ 824.237016] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 824.256113] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 824.263848] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 824.271136] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 824.278945] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 19:01:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "9d58a24713389c02", "87d01742dfb2d09b0b5a57181388769bba8bbbf6aa3028e8ee308f93ddfbaa70", "c44ea3ef", "93708efa0d125e9f"}, 0x38) [ 824.286231] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 824.293603] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:52 executing program 0 (fault-call:1 fault-nth:57): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 824.490286] FAULT_INJECTION: forcing a failure. [ 824.490286] name failslab, interval 1, probability 0, space 0, times 0 [ 824.547397] CPU: 0 PID: 800 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 824.554307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.563677] Call Trace: [ 824.566290] dump_stack+0x172/0x1f0 [ 824.569951] should_fail.cold+0xa/0x1b [ 824.573863] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 824.579169] ? lock_downgrade+0x810/0x810 [ 824.583433] ? ___might_sleep+0x163/0x280 [ 824.587705] __should_failslab+0x121/0x190 [ 824.592323] should_failslab+0x9/0x14 [ 824.596324] kmem_cache_alloc_trace+0x2cc/0x760 [ 824.601012] ? kasan_unpoison_shadow+0x35/0x50 [ 824.605616] ? kasan_kmalloc+0xce/0xf0 [ 824.609531] __memcg_init_list_lru_node+0x8a/0x1e0 [ 824.614496] __list_lru_init+0x402/0x720 [ 824.618581] sget_userns+0x81b/0xd30 [ 824.622350] ? kill_litter_super+0x60/0x60 [ 824.626605] ? ns_test_super+0x50/0x50 [ 824.630685] ? ns_test_super+0x50/0x50 [ 824.636172] ? kill_litter_super+0x60/0x60 [ 824.641324] sget+0x10c/0x150 [ 824.644461] mount_bdev+0xff/0x3c0 [ 824.648017] ? vfat_mount+0x40/0x40 [ 824.651662] vfat_mount+0x35/0x40 [ 824.655132] mount_fs+0xa8/0x32b [ 824.658604] vfs_kern_mount.part.0+0x6f/0x410 [ 824.663120] do_mount+0x53e/0x2bc0 [ 824.666702] ? copy_mount_string+0x40/0x40 [ 824.670954] ? copy_mount_options+0x1ea/0x3a0 [ 824.675465] ? copy_mount_options+0x1f0/0x3a0 [ 824.679977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 824.685531] ? copy_mount_options+0x280/0x3a0 [ 824.690137] ksys_mount+0xdb/0x150 [ 824.693691] __x64_sys_mount+0xbe/0x150 [ 824.697684] do_syscall_64+0xfd/0x620 [ 824.701501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 824.706700] RIP: 0033:0x45c26a [ 824.709912] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 824.728826] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 824.736554] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 824.744032] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 824.751321] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 824.758781] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 824.766084] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:52 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x9) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000140)={0x0, 0x0, 0x6957}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000100)={r2, 0x0, 0xfffffffffffffffe}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)={0x0, r3, 0x7fff}) truncate(&(0x7f0000000080)='./file0\x00', 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) readahead(r1, 0x3, 0x4) ioctl$KDADDIO(r0, 0x4b34, 0x2) write$P9_RLOPEN(r0, &(0x7f0000000000)={0x18, 0xd, 0x1, {{0x80, 0x0, 0x7}, 0x6}}, 0x18) close(r0) accept$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x1c) 19:01:52 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x3e) 19:01:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) flistxattr(r1, &(0x7f0000000380)=""/71, 0x47) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000100)=r2) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r3, 0xc1205531, &(0x7f0000000200)={0xb972e82, 0xc0af, 0x6, 0xfff, [], [], [], 0x4, 0x0, 0x8, 0x5, "92b2fa06a20918ca0a9c7701d785f9bd"}) r4 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x40) ioctl$VIDIOC_QUERYSTD(r4, 0x8008563f, &(0x7f0000000140)) sendmsg(r1, &(0x7f0000000340)={0x0, 0xaa, &(0x7f00000001c0), 0x12c7, 0x0, 0xffb5}, 0x0) fcntl$addseals(r0, 0x409, 0x5) 19:01:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x2000000000000000) 19:01:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:52 executing program 0 (fault-call:1 fault-nth:58): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 824.973633] FAULT_INJECTION: forcing a failure. [ 824.973633] name failslab, interval 1, probability 0, space 0, times 0 [ 824.985170] CPU: 1 PID: 919 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 824.992031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.001432] Call Trace: [ 825.004057] dump_stack+0x172/0x1f0 [ 825.009256] should_fail.cold+0xa/0x1b [ 825.013175] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 825.018318] ? lock_downgrade+0x810/0x810 [ 825.022501] ? ___might_sleep+0x163/0x280 [ 825.026685] __should_failslab+0x121/0x190 [ 825.030943] should_failslab+0x9/0x14 [ 825.034861] kmem_cache_alloc_trace+0x2cc/0x760 [ 825.039537] ? kasan_unpoison_shadow+0x35/0x50 [ 825.039553] ? kasan_kmalloc+0xce/0xf0 [ 825.039578] __memcg_init_list_lru_node+0x8a/0x1e0 [ 825.048035] __list_lru_init+0x402/0x720 [ 825.048057] sget_userns+0x81b/0xd30 [ 825.048072] ? kill_litter_super+0x60/0x60 [ 825.048088] ? ns_test_super+0x50/0x50 [ 825.069082] ? ns_test_super+0x50/0x50 [ 825.072997] ? kill_litter_super+0x60/0x60 [ 825.077258] sget+0x10c/0x150 [ 825.080392] mount_bdev+0xff/0x3c0 [ 825.083948] ? vfat_mount+0x40/0x40 [ 825.087618] vfat_mount+0x35/0x40 [ 825.091098] mount_fs+0xa8/0x32b [ 825.094508] vfs_kern_mount.part.0+0x6f/0x410 [ 825.099038] do_mount+0x53e/0x2bc0 [ 825.102616] ? copy_mount_string+0x40/0x40 [ 825.106876] ? _copy_from_user+0xdd/0x150 [ 825.111139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 825.116701] ? copy_mount_options+0x280/0x3a0 [ 825.121225] ksys_mount+0xdb/0x150 [ 825.124798] __x64_sys_mount+0xbe/0x150 [ 825.128811] do_syscall_64+0xfd/0x620 [ 825.132639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.137951] RIP: 0033:0x45c26a [ 825.141161] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 825.160077] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 19:01:53 executing program 3: eventfd(0x5) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1004008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1, 0x10000) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) write$eventfd(r2, &(0x7f0000000080)=0x4, 0x8) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140), 0x1, 0x0, 0xffffffffffffff83}, 0x0) 19:01:53 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x3e) 19:01:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf0000000000000000"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) [ 825.167812] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 825.176717] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 825.184183] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 825.191471] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 825.198762] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:53 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x3e) 19:01:53 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000200), &(0x7f0000000180)=0xfffffffffffffda7) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@md5={0x1, "b42d4c7eb8db2a8da12d26481d520eb3"}, 0x11, 0x2) lseek(r1, 0x0, 0x4) close(r1) 19:01:53 executing program 0 (fault-call:1 fault-nth:59): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000001700)='/dev/dlm-control\x00', 0x100, 0x0) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f0000001740)) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) sendmsg$tipc(r3, &(0x7f00000016c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x3, {0x43, 0x0, 0x3}}, 0x10, &(0x7f0000001580)=[{&(0x7f0000000100)="49743226b77cd3dd76b7957939521a9d84640f7b996a4e4fe78342aad5b41c83024d6c72430a5ad744dbb25c8f4b38baa783990e623bd19a41d7f86ec87f1cf33c04b28e38e4e92ff9eef0febb0bbc6248bc8a9b621eb2cb318906387fc2131bde1a270b0baa194beb62932d94f2910e244add7a1fce9e49f9cc46ce8aa28b1f6c586083d2f67e2ef8598bd284329e22f67efb64dced81ec4a079d446ff4bf9d338326d7569b5b094e2c8348ec7d89b95e505e743d23", 0xb6}, {&(0x7f0000000200)="0af69a0d1a4112302b3cf4e617", 0xd}, {&(0x7f0000000240)="156e081e5cdfdd7e2e94c40792b549518a23d4b19e780e314f52e019d7f330ba0578055dad38c9084713025a1cbbed36bf3be3882e5d8b0476e12a8749b1af7770ca187376ec24f84f2583566e80c8ddd410b572", 0x54}, {&(0x7f00000002c0)="978a0619936374eac6e95bc8a4926569448ab11cb6a63a5a0a028715d1dd0373775d60ed550afc0f9bdcd8413c02eaf47ce10e48af76fdd2bf2aa533d06bf9d69026a748d50fe8517f270ce60859f684c090dbbcd4483a6c57ff76a48847cf97226188a9b2fb1ca0123c7a00698baf695bcc435e68d78fac234a3966a93b82f8ca4c1be6cd9b0f298e13a03091b6e4e8f052a446e0c17a14f141a8b45b6029d4daa611eb0fed1efa2c82f25113f4ea963c18e1aba2fdcc0c0356fe944ce93a49506d6fc6bb37e612b66d1128", 0xcc}, {&(0x7f00000003c0)="1e395e36cce0ac62d2101392b2f8839bfa2e6e72d86ad512e6783ae7c6decee8a46ebbb4ba9a10180fe5339bd5f1bdd1f131e016b2efa8abd4e1395e874d", 0x3e}, {&(0x7f0000000440)="112610c97a3f48477a0c75bf3464c97e8a206eaf2a0181f829939fb15ea5c4a87de5bc474df3bf69594c9e734644b93368ae07c6c48353738a54a4df85ea087e3a9fa141b3235ed0d5c2d1e19b24dcf9d12d031fc62e207f47", 0x59}, {&(0x7f00000004c0)="f0c002761abb6feae583955d770bab427f867eeb6e0e5b7c425207899a1449f572659dcbb555e77d04806740b2954b1ff2a4d2c203175db0f0fa0c6577846e3da6ed6e4d1fb82031b9ae3717c673517cf39e1456ee9c9bb3a2202bc5658e2982c6ea0c31c84cd14bb33d24301a54b1801d235c72a25f358d683bb5b1ff945c7f2f813cf94a8de3b0fb735820f06fd5f4e01fe019cfaaaf9bd12c3a6c24533bba32d09b5020c5a41d44a5f1fc5e040d0f26c563b4a964072aa06d70024cf211d26c6c2ed1c59d22c9cbe5eeb8b8647727e0bc31c91f5e0f4491ffa336da236511e93268b1828e315d35454b31479a0a17f669b7a00841b834a5270e25b9308b7574008e21838249b9c501882a81ce1f2de3f43479d47aa9c5f5e292313a4f4de7456a7bfacd7d560af34024c6b3404719606b3c2df15d9ebd8dedd1e667be7c5378e9299353dfd331f82b666365ee29f785768490aea762d32cd64e4a544073ba08a307702232fb048b31cd4f0f9ff5d2bd48e3d77de3339fe7c266b344bb854337010c4cc447a5154ee350a6f2a748b7df5956179f5c78f29d1a6d84a3e2c0e8e9cab61d31b05652999e393dc322e788a36d19ecbd8f8c60552ab8a86a702d72ce64e49c13df30e7d6033f8015dfa40a5607665c4037768d9edecb67f39f2a56f6c8609f84d419aa54a90e886975f956cfba249a9198402106e11a2c6aa622576c79c3c9c6190a3273ed6f88312eefbfda3d7e1941f23174bb47f9b1bd21807ed3a89cb25f90c2f6b9b54beb7ed8c3942cfe9de4a9d4441b8d46b3ae1a581fcd0468e977cc929e51e1ebbda6a939a0177855e2fac056fe996018aaad6dc1f519b887ec9e4c1e924756c234c656ff82f341868e767e7daf3d5692ba6864589467385a14992c6561381f4e0318488fda77e709c4106322f796105a48c82b61e4efa54da776d0c08d32a0d53133f7f45fb487fd20a5b9cc64f973c5639ecceda5ad73b09fe2398fda3f9d795bd3fd1bf04a952ad687fc496c99238cb43f15725ed48c9301b1ea23e87100f6febcd7c8930b76d7e1304a346febd78e1632dba52f2c276b0a445f36b584c6f8de793178b5481cd02e6c2dce43aaa0e3f0bc7b43015c2b090f44b763bbfd59a9ffb1163448603b0471bb106fd453f55ceb250fe3eaacc794af1f72da327960d978fb49246f1536bc08f2b885c64379f01077d734af15180777667c0a10c39ae8422c7b8defd80ded00c019f5e48829e9f36e15a3e7c85dbc815bf3d488a27d7a586ea8ab72f5d3748705f6cb23ee26f1356bd7c5e35360109c18ef3753f0c176beaeb6545869652ade551e3293ba08ee1f86746baf67578f6d43d7b4d0ef2a4015733dc1bf62f656871dc66c2fc102032c9f8e825e274ca2769bcea25fbb7c7433a6e65d2a3d2ee2aba00d6216858c6d7ba29e97b07dd52cf412e1a086098a10ccda55c32dd3994157c8d3eb960baf7fa048e95eea84ad016d424c5eb51aade064069b204e57649266507c2df05adb2411f251418b3f299ca3f6902a1929fd03e4559b083ab966eb2f41b7b2fc395b7b05e2a16b7cdc8ffa86cf0bc2b83a31e97842a5c7f38a529720b858ae7ecb0a9499004dfc0cc281aa9f5f51dbeb9d3d75d57146d83714c6faa02b3037ef16e9312973c6c879775dbdeb5498941c04d9e398dea577dd5ca9420b5d6fedd0b3086c232c70ab6d10f052c92b74b07ae97d3db47586f75ef0eee605ebc187f22782e5a879cbd229f8bd0aefb48227a54f10061b752f68fa463111b2dabdc6396f16c53c5e08cb4ccf8bd5597b609b94b65abea17396fe4c387af6d1aedf4599f9ceeeaf99c7fa70a08438239057ae2b33840a529e63d9a980af84886a8bb9f7d9a7621f7978f9f4daeb65435073649ff151dae0e8bbe54c01160bcced2aff15f1b81436c0fbcb34612471308e786d37c33139f4375b57b498adbe66b49d4f6d591d21a5f486a6241f9362dcd71c14abd7750a46b035965c47c6f366b0cf262fe1f9299be4553185fea8761a120663b150ef612c739836deaf3366afa4da5ed895f4ea5b6f13558cf56320a888677fb06b9c4a989fba60847bfdf113e2205839a4d271abca196ebfbbad6f41f8c04a2970a1db5451253ec7fc6d4510e57fa515cb404571f33a13bc5a57ce29a11111b6fbe5d573f3b36035b2f9692b77aef3569da57a4415de4665a3c7e839a962b035c43ae361ed5b875d67f70b55e9fd86702e37b1aae020c101f623261f570cea74744dda0906d6a23723bd960651b289ea2b5fcc7c7f806c62212d0b1eae8eb0099f0285ee8b84289ecea37c39047a0e79e742d282de9545db619a1a00b21253691b3982274114d4fe88b2fab258040c6e87fc86fd98f1c0d586e36ae9f6dae94f2ce5de7f36ed90eaecead7b7d2c5029c0cccf544cdde14136daab936bb669399097e6d2d003707dfdf8d83d80136e54bbb00364be59bc62306259d5164be0cf67619a8e3f2a3508285b64d9b7230b06013a1cb4e1b1a9eb525b9589aa87a9baaefafd823176a176f659d622b998fe2c5bf670801e39e21712604c2949f2828ddd4db5aefcb0c3c37538accd4fa3155d7b8aae35d2dbf847f1a72e6c0d810a2d580345227d9491a083207d500dc1e46598a398a3911d12372c2f8161266ed474045e9003f137dcca4dd17ffb9fdf428aad78db11eb686f5c92307c60c91b2a642fef19470e6b83fc68ae522848b6b0a2c117e58fc9f3b09aee9eef64a26bda4febf61dd6fb87d3dc1eb91b05714f6efda08401b9f7a0122f20f5d1a662f3ffcc5cd46c02c9f2493adc02c106dd40ad4ecb62a2461b4a75b267342695bf515e2bcc1c647e6807bf80ee9f98b4d208bedeeef9fb48c3923284e2bfbd060a1d5e1015074cd3ee752f84ee98c69fd740752319fda0a48376cf70dd28646ea9219404e610affa8bc44239c6f1717a5b5f861ccb04586250939cbf8e4c3ccc494445ac57993ff34826b8781ec6083cc3f7e256d16c5a64561ec05755f00317712edd4413f5fac7dec7206d56b2c238dc05944e5e5bf2d161e5ae3706bc551a91cad29ede4bbef9e793de45cc02f5daf091722d579af9c7591a8b935e9b1057a9176e07e7aeb875fd342722c6c80f447fcb0a7cf5d8cde5cef25df5eeff6af5ee6c5ff8fdd8d2fa723a2a0f1958b971ee13eb9e3089fc89ec2e400f447da2cc3802874ef253952667588a6e3d96df5c260028369b947c3dfd740517ef154e3822809db19d3ce1feb7aca0e153803b3a225a372edcd46b89a1dfb6565f8a3c3246307a05cb00c070b7f3e4cd79b565f47217764fc4e9755e543836729c20c697b63c1eed7e6582979c859bb51ae315e3ef445a56d6645e21a4e2021ac3b45fa2b47db28151cefe9beb0795c6b12c12bca07f4b394a84761901b0de32cd92ec0c2b6e83718c040aff9235a9136fa37994bda7185e197c7181c5efebcffcfa7ef35c0abeda30accd675beacb0ec3cbfb1e198d7d06bb804259830f6b4352482925a3544f1ecb85eccf2dabcc9bc76efb0ac520e6fd61d8eace52d196cc3f85c9829d18881b7d59c10ae5601ab8ada6a5fb82f8b55856d7e35f2a17e3790d1cfb81b7f040043cb96b77c5c14013d0fa1acf77817e4e35aee6e99ec9cbc1d73536ae3e2226940338e7357bfb1a925910911972f38f45787d56ebbb2db65c01905b1545c033425c2967dd5613c9151234e5a8a0751afde779be5629cf1a8e74d7f92ff14d646f5e23483c96d466f0b39a4426f339a0dc7ef2737202aa8862ff159acbee34743149ea8f01dd43faa5344f1d476bb17b5e75e4665b832ef5376fac6fc2e903536fe7597fc9a88e580a95f52742fb3e6190368b1123862c4210fed6d36c4cf6d180fca6581110b37cc2061471052b47929d7abe675ea4cbd2c3582c798cc5a7cfb54920c2d262212752cf2550ca240f45dfb677112a1561036943cdfe4f02f0f0acf71f5dd083414aba310c617b4cc27d35ecfaaf3a6a13c73f034be0092bc77a7c1718a96923c8c8d52a90b714b219b0671dffc2c353cbfa5f000becd92bfa4271991d93be44458be3e2e0ec71156e06ded6d85755415b2ba83a506d08294e26b82ac97865f2caa06e1ea0022b7a386c3133c9bcea1c4d2ac67affcc9a677d4f6bed4f732b75f777f218550a0cd35484392abf38e33a13c686c60ae6c3737a9ef9c3f87c02e11ee4002a85905f17335a39c4357b24bbbaa92bbee597ebb0bdcfb36f2526fc3b1be2f34d119383db88201c1572cf69d1fee64a64f220ac63beb92e9175bdf9845def4266d1b13733de05d931baa288b25df1144d3e28acc4e2e9767c73ee7d04e07fc7353edc17cc8ff7bc2d4968e0effe849cf25a2214cf8bd138cbc9b9cce626bf9eadfe46b52a02b4ec4501d6fc4aba85086ae423443d3a353db0df0ab8337e74a805b6076fc1d142a9598c6cbdd637be8900de62a4716562338842501d26916efc92551fd489a78c5c5711b3072fce9c87a3454e404da0cc7f7a1aff38e526ef83e71c094f8de6b2b7d9343b3e492c437982737a4fdd06a6e062829c8ef6f328d8cbaba387488e787673724ea5c1fbad58e813a5919c7b92b85d1c7201f922ab5cc5f30c9b15618a4ea5d2a73996b38ed208d7dd71c85fb979f6a474acbddc942a8972398c5ddf1d3f0307c1312889854efed6a49a3a973ded22a1845b171a588709748113eb267310018da764a957016eae18ab191e9e00e452756a89945cb09aa1736f5d5c62294bf733185e98b8fa07bb278b0c6ce9b7fe0d17d4392d620d443dbbbe47537319eba4d209202946e7c86603f50a50c27e49b8a76cffff10e1ff957249af66ee9b4f3e278cca30fdd07248825e3b9bf413a364f07ad6cff8a3c7285a69f05a0e07da7f3cee42f4df85ef9fc3e53539d0684bc57cf27f73d510265a7ee49fbdd3e58dc8b9e7edea22ab532928a3ccc56f36a33febd841707269bbf8fa3f2fca08bcd67209f69e5f23f9264c829d740854cd779e28fe2d210ea5a73712e4a0c64c98d4292f87beb074535a257045ad06ecd8d1277f0aa2500c99afc48f25bbdd94c102229dc64005b036077ca15031c1bae9d2452889d2809c4a4e70319c86a14eba265721df3c788a97158cc22fc30c1580bab1a53cacac880b60d96c5eceda62c2e9b8bfa096871e765a825668732a3cf9966f835f0e00991e1cf7422bc18a587eab8321984cee83add459c787193b48276718e7f462e0e08c7e708f37883e50e068b54bfcb58155010ebb4b9e973a9f4bc8b979e521b179879b959733a7068c79b1d8322ac8a7326e2104bd1365f510176dc018d71e7f592f4da848fd2d7451bb9dc4f2e308000d0a0cf1373a8cc0867826f16132ebc53ea7d03255c22b5abb1ca6abc95747596488381ab152b1b76d3cfb66c5be8eb1e94d2ef5c8f78e3b8f634c437624ccadfd5571c37a10b237704d2e1ea4afcf62a10cfc0a893c65a35bf99fb4fc5220961f6e53265da364d66ab8a0cadbce8d090ca52087b65e8da2194483b282e6552631d6fa377e069956185ff59b4d0ab7a0efa58fcf036a53a9ad5cfb2406f7f8650207bc35926b3a6f9b4cd120fdab2c999f2e5f57b914d37b54841e9a31468d1beae84795fb8ba461f65eed8089851a179ea93eca6992e21a447ae0aab29a0e68a931ed9f9a91947984d62269352229d9893203935e6c8a44906f55954cd3080c4fcb67c0067499219805209e4fc9b300a3d432576b37949ac860e753efb437bb4b2e37a41", 0x1000}, {&(0x7f00000014c0)="bb306d213ae38cb2c799ad2a70f5100959cfaf5b54ea398b15d3c7647a995cced7222a3282bb7954f17a94e6bf299dacae446cf381532fee35bc7598e97fd44ca60c387b8b319733f3bb6a5660afe69b17f4ee1d0528a8f016c66ca90dd63556a7afa7c02bd253651bfd1ab795d39d43e172a7293618d0067e6e712212f453c0e938fa223ade98884af5087edd2191c8919c1a403002a23a730b4ab11778c20f8fc1f45c3c6ddf315274bc1b3f4ba660734e0179d21101c389df92b8522ecb", 0xbf}], 0x8, &(0x7f0000001600)="a73f9c0aaa786b6392fcb6c2becf8306953f17200ad876d8bcb1a67a7c26bf7883d89afc3f898ce3bf7078eb2fa0200ba7c8af55b0801b29f8de5f27223d6811a61490175b142e6b3dee7cea1986574ef144e66e00d9a9aaf9fca655620bd0abb1e9c6d12e1e09ae4bf44d70a1ea90ff7961b33b7a25914aa85968f5a61431b48307b00f82d8b3bf9bf40b3480fd7177f510ffa72e7b773d166c8cca5d6ee7ab5a78ee14c684e8b6c83985baed", 0xad, 0x800}, 0x4000000) 19:01:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x3f00000000000000) [ 825.404799] net_ratelimit: 20 callbacks suppressed [ 825.404806] protocol 88fb is buggy, dev hsr_slave_0 [ 825.414919] protocol 88fb is buggy, dev hsr_slave_1 [ 825.426415] FAULT_INJECTION: forcing a failure. [ 825.426415] name failslab, interval 1, probability 0, space 0, times 0 19:01:53 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x3e) [ 825.510881] CPU: 1 PID: 1057 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 825.517855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.527228] Call Trace: [ 825.529845] dump_stack+0x172/0x1f0 [ 825.533679] should_fail.cold+0xa/0x1b [ 825.537605] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 825.542743] ? lock_downgrade+0x810/0x810 [ 825.546917] ? ___might_sleep+0x163/0x280 [ 825.551114] __should_failslab+0x121/0x190 [ 825.555374] should_failslab+0x9/0x14 [ 825.559198] kmem_cache_alloc_trace+0x2cc/0x760 [ 825.563885] ? kasan_unpoison_shadow+0x35/0x50 [ 825.568500] ? kasan_kmalloc+0xce/0xf0 [ 825.572416] __memcg_init_list_lru_node+0x8a/0x1e0 [ 825.577365] __list_lru_init+0x402/0x720 [ 825.577386] sget_userns+0x81b/0xd30 [ 825.585232] ? kill_litter_super+0x60/0x60 [ 825.585247] ? ns_test_super+0x50/0x50 [ 825.585261] ? ns_test_super+0x50/0x50 [ 825.585272] ? kill_litter_super+0x60/0x60 [ 825.585285] sget+0x10c/0x150 [ 825.585302] mount_bdev+0xff/0x3c0 [ 825.585316] ? vfat_mount+0x40/0x40 [ 825.585333] vfat_mount+0x35/0x40 [ 825.615263] mount_fs+0xa8/0x32b [ 825.619265] vfs_kern_mount.part.0+0x6f/0x410 [ 825.623778] do_mount+0x53e/0x2bc0 [ 825.627363] ? copy_mount_string+0x40/0x40 [ 825.631626] ? _copy_from_user+0xdd/0x150 [ 825.635815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 825.641380] ? copy_mount_options+0x280/0x3a0 [ 825.645907] ksys_mount+0xdb/0x150 [ 825.649470] __x64_sys_mount+0xbe/0x150 [ 825.653485] do_syscall_64+0xfd/0x620 [ 825.657312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.662519] RIP: 0033:0x45c26a [ 825.665739] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 825.684662] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 825.692483] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 825.699769] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 19:01:53 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x3e) 19:01:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20000, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080), 0x4) r2 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="2400000025000300000000000000680c1ba3a20400ff7ec11734fba9e008e572a8b5497d8c0fbde1dc83eff76866a7c0efee17bf225acaf32ebcb8af5cbc739c95156ff2e1bafcbd6c544dffdd2fc467a81b98416cbaee0d0543772abe0b958ff8143f1951ce9a1407cf910d81cc69ec72bccfb577a1ef320865e607c38266e97de14366840793f9e2dfdfc44a9e690029007f1a46962bd5", 0x98}], 0x1}, 0x40004) 19:01:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf0000000000000000"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:53 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x3e) [ 825.707060] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 825.714353] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 825.721894] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 825.729514] protocol 88fb is buggy, dev hsr_slave_0 [ 825.734657] protocol 88fb is buggy, dev hsr_slave_1 [ 825.861397] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 19:01:53 executing program 0 (fault-call:1 fault-nth:60): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x4000000000000000) 19:01:53 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x3e) [ 825.964795] protocol 88fb is buggy, dev hsr_slave_0 [ 825.970061] protocol 88fb is buggy, dev hsr_slave_1 [ 826.042675] FAULT_INJECTION: forcing a failure. [ 826.042675] name failslab, interval 1, probability 0, space 0, times 0 [ 826.091233] CPU: 1 PID: 1231 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 826.098213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.107586] Call Trace: [ 826.110194] dump_stack+0x172/0x1f0 [ 826.113851] should_fail.cold+0xa/0x1b [ 826.117766] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 826.122887] ? lock_downgrade+0x810/0x810 [ 826.127052] ? ___might_sleep+0x163/0x280 [ 826.131217] __should_failslab+0x121/0x190 [ 826.135483] should_failslab+0x9/0x14 [ 826.139300] __kmalloc+0x2e2/0x750 [ 826.142893] ? __list_lru_init+0xd5/0x720 [ 826.147061] __list_lru_init+0xd5/0x720 [ 826.151061] sget_userns+0x84a/0xd30 [ 826.154790] ? kill_litter_super+0x60/0x60 [ 826.159036] ? ns_test_super+0x50/0x50 [ 826.162933] ? ns_test_super+0x50/0x50 [ 826.166840] ? kill_litter_super+0x60/0x60 [ 826.171089] sget+0x10c/0x150 [ 826.174242] mount_bdev+0xff/0x3c0 [ 826.177800] ? vfat_mount+0x40/0x40 [ 826.181443] vfat_mount+0x35/0x40 [ 826.184917] mount_fs+0xa8/0x32b [ 826.188299] vfs_kern_mount.part.0+0x6f/0x410 [ 826.192807] do_mount+0x53e/0x2bc0 [ 826.196368] ? copy_mount_string+0x40/0x40 [ 826.200617] ? _copy_from_user+0xdd/0x150 [ 826.204782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 826.204799] ? copy_mount_options+0x280/0x3a0 [ 826.204817] ksys_mount+0xdb/0x150 [ 826.204832] __x64_sys_mount+0xbe/0x150 [ 826.204850] do_syscall_64+0xfd/0x620 [ 826.204870] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.204884] RIP: 0033:0x45c26a [ 826.215111] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 826.215119] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 826.215136] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 826.215145] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 826.215154] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 826.215161] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 19:01:54 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000000), 0x4) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r1) 19:01:54 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3203000000000000]}, 0x3e) 19:01:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf0000000000000000"], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:54 executing program 3: pkey_alloc(0x0, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x400000000, 0x10000) setsockopt$inet6_dccp_int(r1, 0x21, 0x3, &(0x7f0000000080)=0x3, 0x4) r2 = socket$inet(0x10, 0x3, 0x1000000000000006) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)=0x0) ptrace$cont(0x3f, r3, 0x1, 0x7081) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000840)=0xe8) fcntl$dupfd(r2, 0x406, r0) openat$capi20(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/capi20\x00', 0x210100, 0x0) syz_mount_image$hfsplus(&(0x7f0000000340)='hfsplus\x00', &(0x7f0000000380)='./file0\x00', 0xc9, 0x4, &(0x7f0000000600)=[{&(0x7f0000000440)="f1b9c4e5897772be2faa29458f1e8a32599609ca2640dddbae2dcc5afd5ddf730a1794b258da5fef0d52c5041ba9c692066c7ebdf864715c7e6cb594865940715ee184029b7b59d0220f94f6269e6e80aa2de36192caad6462e060962084f5f00a3ec9bb8396a640f2a0f91b7d", 0x6d}, {&(0x7f00000004c0)="98479e8b1773219e5360e0a0f4d8d02bc616e197334896417dd3373d210ff06faad615f220f878b2426f9d62d60e37ae86f526f9f77829da23cd0b22670dae0fbe23ae0a53f100f314e79d1d6e97bdb29c046c8dd3af39a8a7573aa3d4072bbaa18d11424e59b9d24ffeae3376cf1f0f10dd159c58ac49bbc7c7cc38d4d1ebcb86b5a9c79c773fcb1f4e41ec0a0254dadeec45301ada0e86821ef4b345edd54f8749b9c18047de24ee702670a5014c5348b2509bbc8ab1bc5266c38634fa06ac717b3429e33c0f7eb47866392f9b82eeafda1f6e1aeac0", 0xd7, 0x8f}, {&(0x7f00000003c0)="43083647de28520c21e5a90310a242237be499477969b0f2a3a2505e", 0x1c, 0x3}, {&(0x7f00000005c0), 0x0, 0x68}], 0x2000000, &(0x7f0000000940)=ANY=[@ANYBLOB='nls=default,pcr=00000000000000000050,smackfshat=F$,+,euid=', @ANYRESDEC=r4, @ANYBLOB="2c66756e633decbc62f14649524d574152455f434845434b2c666f776e61723e", @ANYRESDEC=r5, @ANYBLOB=',seclabel,pcr=00000000000000000043,\x00']) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f00000002c0), &(0x7f0000000300)=0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000200)={r6, @in={{0x2, 0x4e24, @multicast1}}}, 0x84) 19:01:54 executing program 0 (fault-call:1 fault-nth:61): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 826.215169] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 826.364796] protocol 88fb is buggy, dev hsr_slave_0 [ 826.369909] protocol 88fb is buggy, dev hsr_slave_1 [ 826.375107] protocol 88fb is buggy, dev hsr_slave_0 [ 826.380211] protocol 88fb is buggy, dev hsr_slave_1 [ 826.394066] hfsplus: unable to parse mount options [ 826.404375] FAULT_INJECTION: forcing a failure. [ 826.404375] name failslab, interval 1, probability 0, space 0, times 0 [ 826.425589] CPU: 0 PID: 1325 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 826.432561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.441924] Call Trace: [ 826.441950] dump_stack+0x172/0x1f0 [ 826.441974] should_fail.cold+0xa/0x1b [ 826.441994] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 826.442011] ? lock_downgrade+0x810/0x810 [ 826.442025] ? ___might_sleep+0x163/0x280 [ 826.442043] __should_failslab+0x121/0x190 [ 826.442060] should_failslab+0x9/0x14 [ 826.457340] kmem_cache_alloc_trace+0x2cc/0x760 [ 826.457356] ? kasan_unpoison_shadow+0x35/0x50 [ 826.457370] ? kasan_kmalloc+0xce/0xf0 [ 826.457393] __memcg_init_list_lru_node+0x8a/0x1e0 [ 826.457414] __list_lru_init+0x402/0x720 [ 826.457442] sget_userns+0x81b/0xd30 [ 826.466534] ? kill_litter_super+0x60/0x60 [ 826.466552] ? ns_test_super+0x50/0x50 [ 826.474679] ? ns_test_super+0x50/0x50 [ 826.474693] ? kill_litter_super+0x60/0x60 [ 826.474705] sget+0x10c/0x150 [ 826.474722] mount_bdev+0xff/0x3c0 [ 826.474735] ? vfat_mount+0x40/0x40 [ 826.474751] vfat_mount+0x35/0x40 [ 826.483987] mount_fs+0xa8/0x32b [ 826.484012] vfs_kern_mount.part.0+0x6f/0x410 [ 826.500781] do_mount+0x53e/0x2bc0 [ 826.500805] ? copy_mount_string+0x40/0x40 [ 826.500833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 826.552533] ? copy_mount_options+0x280/0x3a0 [ 826.557060] ksys_mount+0xdb/0x150 [ 826.560638] __x64_sys_mount+0xbe/0x150 [ 826.564641] do_syscall_64+0xfd/0x620 [ 826.568472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.573682] RIP: 0033:0x45c26a [ 826.576892] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 826.595811] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 826.603545] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a 19:01:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x4800000000000000) 19:01:54 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x3e) [ 826.610835] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 826.618130] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 826.625503] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 826.632986] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f0000000540)="11dca50d5e0bcfe47bf00291560753eebf96161543a8ebcbcf43c60df54d49ec75a9eeda31a3030e7ced8f2b97b7523fd17451e3cb44e46c0ea9711d50f0f78369147a147c40f0cc428d3313e2ab89048985fc3b20683c0a1971c11be74086450d48bfc411f0ab0756156894ec74cf4d7747acd02c5b52511cbc05e66db61a3565a702906437be6379c99b8a1073b4f47cd325021614120949547c1da1cea7f9ce81f7b6b39bf123032414a732b3231d93b85e3c223ce4a8e9642842637d01e6bcf86f0dd20391f1efaaca82986aca606ce95ead127caa") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7e0, 0x10000) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4040}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x118, r3, 0xd, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK={0xe0, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x60}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7e77b49f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x40}, 0x4000011) 19:01:54 executing program 0 (fault-call:1 fault-nth:62): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:54 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x3e) [ 826.905169] FAULT_INJECTION: forcing a failure. [ 826.905169] name failslab, interval 1, probability 0, space 0, times 0 [ 826.937349] CPU: 1 PID: 1471 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 826.944322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.953696] Call Trace: [ 826.956421] dump_stack+0x172/0x1f0 [ 826.960074] should_fail.cold+0xa/0x1b [ 826.964096] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 826.969221] ? lock_downgrade+0x810/0x810 [ 826.973390] ? ___might_sleep+0x163/0x280 [ 826.977573] __should_failslab+0x121/0x190 [ 826.981843] should_failslab+0x9/0x14 [ 826.985671] kmem_cache_alloc_trace+0x2cc/0x760 [ 826.990366] ? kasan_unpoison_shadow+0x35/0x50 [ 826.994972] ? kasan_kmalloc+0xce/0xf0 [ 826.998940] __memcg_init_list_lru_node+0x8a/0x1e0 [ 827.004068] __list_lru_init+0x402/0x720 [ 827.009807] sget_userns+0x81b/0xd30 [ 827.013537] ? kill_litter_super+0x60/0x60 [ 827.017871] ? ns_test_super+0x50/0x50 [ 827.021776] ? ns_test_super+0x50/0x50 [ 827.025734] ? kill_litter_super+0x60/0x60 [ 827.029987] sget+0x10c/0x150 [ 827.035387] mount_bdev+0xff/0x3c0 [ 827.042587] ? vfat_mount+0x40/0x40 [ 827.046252] vfat_mount+0x35/0x40 [ 827.049729] mount_fs+0xa8/0x32b [ 827.053118] vfs_kern_mount.part.0+0x6f/0x410 [ 827.057644] do_mount+0x53e/0x2bc0 [ 827.061198] ? retint_kernel+0x2d/0x2d [ 827.065102] ? copy_mount_string+0x40/0x40 [ 827.069623] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 827.075196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 827.080761] ? copy_mount_options+0x280/0x3a0 [ 827.085306] ksys_mount+0xdb/0x150 [ 827.088869] __x64_sys_mount+0xbe/0x150 [ 827.092868] do_syscall_64+0xfd/0x620 [ 827.096691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.101915] RIP: 0033:0x45c26a [ 827.105113] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 827.124027] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 827.131933] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 827.139481] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 827.146768] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 19:01:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x10000000000000ef}, 0x0) [ 827.154043] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 827.161338] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:55 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) bind$netrom(r0, &(0x7f0000000000)={{0x3, @null, 0x5}, [@default, @null, @bcast, @bcast, @bcast, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000080)={0x7ff, 0x10001, 0x4}) ioctl$void(r0, 0x5450) 19:01:55 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}, 0x3e) 19:01:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x4c00000000000000) 19:01:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:55 executing program 0 (fault-call:1 fault-nth:63): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="7100000054daeec087bf4f7328f45d0f5a6378f34ecace756f9eed5997d08df0ed266effe41b841794e28875f6c616220321195193523ff8c22cad2e3360c37a2ec11a6233a8fc972b36113868b4726067285d84aed2bc70e4cac48e56f37e591a03f546a140a1b7ea3585f31afde500db83d782bf51afd5194466d9c36551377e1b958b091732e6f12a13d5b2ad0cfc9591045032ca56597a68c81d9da6241a4e0a46f5324c748fbfeced1cb93316b199a1cbc6123df125c249956f1cce65a1cf9bd35712e3d3a2d62b37e676834bba5b4ed23ad2309a2264d0602f8f7fb5ced71572c985f086f6dbbbc45caa6ee12dd80b4f1634d0bc28a011db42"], &(0x7f0000000000)=0x79) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={r1, 0xffff}, 0x8) r2 = socket$inet(0x10, 0x3, 0x1000000000000006) pread64(r2, &(0x7f0000000200)=""/223, 0xdf, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000180)={0x0, 0xa0}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000480)={r4, @in={{0x2, 0x4e22, @loopback}}}, 0x84) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000140), 0x4) 19:01:55 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x3e) 19:01:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) remap_file_pages(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x2, 0x10) 19:01:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x6800000000000000) [ 827.552254] FAULT_INJECTION: forcing a failure. [ 827.552254] name failslab, interval 1, probability 0, space 0, times 0 [ 827.578157] mmap: syz-executor.3 (1657) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 827.596991] CPU: 0 PID: 1656 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 827.604073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.613435] Call Trace: [ 827.616136] dump_stack+0x172/0x1f0 [ 827.619795] should_fail.cold+0xa/0x1b [ 827.623712] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 827.628861] ? lock_downgrade+0x810/0x810 [ 827.633043] ? ___might_sleep+0x163/0x280 [ 827.637222] __should_failslab+0x121/0x190 [ 827.641483] should_failslab+0x9/0x14 [ 827.645306] kmem_cache_alloc_trace+0x2cc/0x760 [ 827.650251] ? kasan_unpoison_shadow+0x35/0x50 [ 827.650267] ? kasan_kmalloc+0xce/0xf0 [ 827.650288] __memcg_init_list_lru_node+0x8a/0x1e0 [ 827.650307] __list_lru_init+0x402/0x720 [ 827.667753] sget_userns+0x81b/0xd30 [ 827.667769] ? kill_litter_super+0x60/0x60 [ 827.667785] ? ns_test_super+0x50/0x50 [ 827.667797] ? ns_test_super+0x50/0x50 [ 827.667809] ? kill_litter_super+0x60/0x60 [ 827.667821] sget+0x10c/0x150 [ 827.667838] mount_bdev+0xff/0x3c0 [ 827.667856] ? vfat_mount+0x40/0x40 [ 827.679694] vfat_mount+0x35/0x40 [ 827.679713] mount_fs+0xa8/0x32b [ 827.679732] vfs_kern_mount.part.0+0x6f/0x410 [ 827.679750] do_mount+0x53e/0x2bc0 [ 827.687891] ? copy_mount_string+0x40/0x40 [ 827.698318] ? _copy_from_user+0xdd/0x150 [ 827.698341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 827.698356] ? copy_mount_options+0x280/0x3a0 [ 827.698373] ksys_mount+0xdb/0x150 [ 827.705181] __x64_sys_mount+0xbe/0x150 [ 827.705202] do_syscall_64+0xfd/0x620 [ 827.705223] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.705238] RIP: 0033:0x45c26a [ 827.717667] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 827.717676] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 827.717692] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 827.717700] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 827.717712] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 19:01:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:55 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}, 0x3e) [ 827.727495] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 827.727504] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:55 executing program 0 (fault-call:1 fault-nth:64): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 827.929524] FAULT_INJECTION: forcing a failure. [ 827.929524] name failslab, interval 1, probability 0, space 0, times 0 [ 827.964805] CPU: 1 PID: 1737 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 827.971784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.981169] Call Trace: [ 827.983781] dump_stack+0x172/0x1f0 [ 827.987441] should_fail.cold+0xa/0x1b [ 827.991358] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 827.996485] ? lock_downgrade+0x810/0x810 [ 828.000661] ? ___might_sleep+0x163/0x280 [ 828.004834] __should_failslab+0x121/0x190 [ 828.009092] should_failslab+0x9/0x14 [ 828.012953] kmem_cache_alloc_trace+0x2cc/0x760 [ 828.017628] ? kasan_unpoison_shadow+0x35/0x50 [ 828.017645] ? kasan_kmalloc+0xce/0xf0 [ 828.017669] __memcg_init_list_lru_node+0x8a/0x1e0 [ 828.017688] __list_lru_init+0x402/0x720 [ 828.017706] sget_userns+0x81b/0xd30 [ 828.017720] ? kill_litter_super+0x60/0x60 [ 828.017737] ? ns_test_super+0x50/0x50 [ 828.017749] ? ns_test_super+0x50/0x50 [ 828.017761] ? kill_litter_super+0x60/0x60 [ 828.017775] sget+0x10c/0x150 [ 828.017793] mount_bdev+0xff/0x3c0 [ 828.017806] ? vfat_mount+0x40/0x40 [ 828.017826] vfat_mount+0x35/0x40 [ 828.035258] mount_fs+0xa8/0x32b [ 828.035281] vfs_kern_mount.part.0+0x6f/0x410 [ 828.035297] do_mount+0x53e/0x2bc0 [ 828.035317] ? copy_mount_string+0x40/0x40 [ 828.035341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 828.035354] ? copy_mount_options+0x280/0x3a0 [ 828.035371] ksys_mount+0xdb/0x150 [ 828.047183] __x64_sys_mount+0xbe/0x150 [ 828.047206] do_syscall_64+0xfd/0x620 [ 828.047226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.047235] RIP: 0033:0x45c26a [ 828.047250] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 828.047257] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 828.047271] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 828.047279] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 828.047286] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 828.047294] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 828.047302] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:56 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@remote, @loopback, @ipv4={[], [], @multicast1}, 0xfffffffffffffffa, 0x5, 0xfff, 0x500, 0x1, 0x2000000, r2}) 19:01:56 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x3e) 19:01:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000250007031dfffd946fa28300a3a20400ff7e322288f8727205f7c635ee1c2ac9982f1797561c23c7fa73c57e23918b13a9f0c1a4899ad89b7176cd4d9ae5a6e6fbb5c3200f9fda59cd506b100173374a155359bf0c710e6a09da7f28b3dd80a57bf6555296428a30ef54a06f27a9058dde29a06932c08a7d21947c3e6c369720452396c765340f6d3db9da18a69935073120e4ec8c3b8f3b651000f915593c68990165739b73f76c938ff327eef32cf889770de8afb5", 0xba}], 0x1}, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x608, 0x4000) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)={r1}) 19:01:56 executing program 0 (fault-call:1 fault-nth:65): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x6c00000000000000) 19:01:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) [ 828.429814] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 828.448479] FAULT_INJECTION: forcing a failure. [ 828.448479] name failslab, interval 1, probability 0, space 0, times 0 [ 828.470224] CPU: 1 PID: 1861 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 828.477213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.486700] Call Trace: [ 828.489312] dump_stack+0x172/0x1f0 [ 828.492972] should_fail.cold+0xa/0x1b [ 828.496924] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 828.500423] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 828.502056] ? lock_downgrade+0x810/0x810 [ 828.502076] ? ___might_sleep+0x163/0x280 [ 828.519154] __should_failslab+0x121/0x190 [ 828.523531] should_failslab+0x9/0x14 19:01:56 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x3e) [ 828.527357] kmem_cache_alloc_trace+0x2cc/0x760 [ 828.527375] ? kasan_unpoison_shadow+0x35/0x50 [ 828.527389] ? kasan_kmalloc+0xce/0xf0 [ 828.527411] __memcg_init_list_lru_node+0x8a/0x1e0 [ 828.536705] __list_lru_init+0x402/0x720 [ 828.536724] sget_userns+0x81b/0xd30 [ 828.536736] ? kill_litter_super+0x60/0x60 [ 828.536752] ? ns_test_super+0x50/0x50 [ 828.536765] ? ns_test_super+0x50/0x50 [ 828.536775] ? kill_litter_super+0x60/0x60 [ 828.536789] sget+0x10c/0x150 [ 828.536810] mount_bdev+0xff/0x3c0 [ 828.576227] ? vfat_mount+0x40/0x40 [ 828.579969] vfat_mount+0x35/0x40 [ 828.583452] mount_fs+0xa8/0x32b [ 828.586852] vfs_kern_mount.part.0+0x6f/0x410 [ 828.591382] do_mount+0x53e/0x2bc0 [ 828.594952] ? copy_mount_string+0x40/0x40 [ 828.599309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 828.604895] ? copy_mount_options+0x280/0x3a0 [ 828.609501] ksys_mount+0xdb/0x150 [ 828.613067] __x64_sys_mount+0xbe/0x150 [ 828.617061] do_syscall_64+0xfd/0x620 [ 828.620887] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.626262] RIP: 0033:0x45c26a 19:01:56 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x3e) [ 828.629475] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 828.648574] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 828.656290] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 828.656298] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 828.656305] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 19:01:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) [ 828.656312] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 828.656319] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1010008912, &(0x7f0000000000)="11dca50d5e0bcfa47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:56 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4) lseek(r0, 0x0, 0x4) close(r0) ioctl$KDSETMODE(r0, 0x4b3a, 0x2) getsockopt$inet6_dccp_buf(r0, 0x21, 0x82, &(0x7f0000000000)=""/93, &(0x7f0000000080)=0x5d) 19:01:56 executing program 0 (fault-call:1 fault-nth:66): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x6e00000000000000) [ 828.898976] FAULT_INJECTION: forcing a failure. [ 828.898976] name failslab, interval 1, probability 0, space 0, times 0 [ 828.915597] CPU: 0 PID: 1995 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 828.922573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.931942] Call Trace: [ 828.934552] dump_stack+0x172/0x1f0 [ 828.938212] should_fail.cold+0xa/0x1b [ 828.942122] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 828.947236] ? lock_downgrade+0x810/0x810 [ 828.951405] ? ___might_sleep+0x163/0x280 [ 828.955578] __should_failslab+0x121/0x190 [ 828.959834] should_failslab+0x9/0x14 [ 828.963664] __kmalloc+0x2e2/0x750 [ 828.967224] ? __list_lru_init+0xd5/0x720 [ 828.971414] __list_lru_init+0xd5/0x720 [ 828.975405] sget_userns+0x84a/0xd30 [ 828.979169] ? kill_litter_super+0x60/0x60 [ 828.983422] ? ns_test_super+0x50/0x50 [ 828.987336] ? ns_test_super+0x50/0x50 [ 828.991242] ? kill_litter_super+0x60/0x60 [ 828.995497] sget+0x10c/0x150 [ 828.998624] mount_bdev+0xff/0x3c0 [ 829.002264] ? vfat_mount+0x40/0x40 [ 829.005914] vfat_mount+0x35/0x40 [ 829.011864] mount_fs+0xa8/0x32b [ 829.015522] vfs_kern_mount.part.0+0x6f/0x410 [ 829.020039] do_mount+0x53e/0x2bc0 [ 829.023600] ? copy_mount_string+0x40/0x40 [ 829.027863] ? _copy_from_user+0xdd/0x150 [ 829.032042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 829.037603] ? copy_mount_options+0x280/0x3a0 [ 829.042125] ksys_mount+0xdb/0x150 [ 829.045686] __x64_sys_mount+0xbe/0x150 [ 829.049680] do_syscall_64+0xfd/0x620 [ 829.053499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.058707] RIP: 0033:0x45c26a [ 829.062003] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 829.081091] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 829.088917] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a 19:01:56 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x3e) 19:01:56 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x3e) 19:01:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getsockname(r1, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000002c0)=0x80) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e20, @remote}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={r2, 0xffff}, &(0x7f0000000200)=0x8) [ 829.096207] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 829.103499] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 829.110872] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 829.118175] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:57 executing program 0 (fault-call:1 fault-nth:67): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:57 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3e) [ 829.330751] FAULT_INJECTION: forcing a failure. [ 829.330751] name failslab, interval 1, probability 0, space 0, times 0 [ 829.330773] CPU: 0 PID: 2101 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 829.349025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.358392] Call Trace: [ 829.361007] dump_stack+0x172/0x1f0 [ 829.364667] should_fail.cold+0xa/0x1b [ 829.368580] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 829.373708] ? lock_downgrade+0x810/0x810 [ 829.377878] ? ___might_sleep+0x163/0x280 [ 829.377899] __should_failslab+0x121/0x190 [ 829.377918] should_failslab+0x9/0x14 [ 829.377932] kmem_cache_alloc_trace+0x2cc/0x760 [ 829.377944] ? kasan_unpoison_shadow+0x35/0x50 [ 829.377961] ? kasan_kmalloc+0xce/0xf0 [ 829.394815] __memcg_init_list_lru_node+0x8a/0x1e0 [ 829.394834] __list_lru_init+0x402/0x720 [ 829.394853] sget_userns+0x84a/0xd30 [ 829.394871] ? kill_litter_super+0x60/0x60 [ 829.408260] ? ns_test_super+0x50/0x50 [ 829.408277] ? ns_test_super+0x50/0x50 [ 829.416060] ? kill_litter_super+0x60/0x60 [ 829.416076] sget+0x10c/0x150 [ 829.428098] mount_bdev+0xff/0x3c0 [ 829.428111] ? vfat_mount+0x40/0x40 [ 829.428127] vfat_mount+0x35/0x40 [ 829.435445] mount_fs+0xa8/0x32b [ 829.435465] vfs_kern_mount.part.0+0x6f/0x410 [ 829.435485] do_mount+0x53e/0x2bc0 [ 829.446159] ? copy_mount_string+0x40/0x40 [ 829.453999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 829.467369] ? copy_mount_options+0x280/0x3a0 [ 829.471903] ksys_mount+0xdb/0x150 [ 829.475544] __x64_sys_mount+0xbe/0x150 [ 829.479541] do_syscall_64+0xfd/0x620 [ 829.483365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.488578] RIP: 0033:0x45c26a [ 829.491785] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 829.510702] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 829.518432] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a 19:01:57 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x3e) 19:01:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x2, 0x1000000000000006) ioctl$RTC_PIE_OFF(r1, 0x7006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200, 0x104) ioctl$sock_ifreq(r0, 0x8917, &(0x7f0000000100)={'bridge_slave_1\x00', @ifru_data=&(0x7f0000000080)="1e84c84c9395547a6e68800c4acd511f2b5869854237931354816eb6d3ad563a"}) ioctl$sock_x25_SIOCADDRT(r2, 0x890b, &(0x7f0000000200)={@remote={[], 0x0}, 0xe, 'veth1_to_bridge\x00'}) [ 829.525718] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 829.533009] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 829.540294] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 829.547578] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x6) ftruncate(r1, 0x0) 19:01:57 executing program 0 (fault-call:1 fault-nth:68): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 829.820297] FAULT_INJECTION: forcing a failure. [ 829.820297] name failslab, interval 1, probability 0, space 0, times 0 [ 829.832264] CPU: 1 PID: 2141 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 829.839415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.848784] Call Trace: [ 829.851395] dump_stack+0x172/0x1f0 [ 829.855228] should_fail.cold+0xa/0x1b [ 829.859142] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 829.864271] ? lock_downgrade+0x810/0x810 19:01:57 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x2, 0x8000) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0x100000230) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fstat(r0, &(0x7f0000000140)) lseek(r0, 0x0, 0x4) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000100)={{0x1, 0x7, 0x9, 0xfffffffffffffebf, 0x4, 0x8b04}, 0xf628, 0x80000000, 0xffff}) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x200, 0x3, 0xff, 0x296a53ae, 0x0, 0xffffffff, 0x400, 0x0, 0x5, 0x8, 0x0, 0x1000, 0x2, 0x6, 0x1, 0x5, 0x1, 0x20, 0x4, 0x200, 0x8, 0x7, 0x246, 0x7f, 0x553, 0xfffffffffffffffa, 0x2, 0xfffffffffffff800, 0x10001, 0x4, 0xa8a3, 0x6, 0x1, 0x8, 0x8, 0x7, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x20, 0x5, 0x6, 0x0, 0xfffffffffffffffb, 0x6d92, 0x6}, r2, 0x5, r0, 0x1) close(r0) 19:01:57 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3e) 19:01:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x7400000000000000) 19:01:57 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) r1 = getuid() r2 = getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000080)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000005c0)=0xe8) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000700)=0xc) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getuid() lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f00000009c0)=0xe8) getgroups(0x7, &(0x7f0000000a00)=[0xee01, 0xee01, 0x0, 0x0, 0xee00, 0x0, 0xffffffffffffffff]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40)={0x0, 0x0}, &(0x7f0000000a80)=0xc) execveat(r0, &(0x7f0000000bc0)='./file0\x00', &(0x7f0000000d00)=[&(0x7f0000000c00)='/dev/full\x00', &(0x7f0000000c40)='\x00', &(0x7f0000000c80)='-vmnet1\x00', &(0x7f0000000cc0)='/dev/full\x00'], &(0x7f0000000e40)=[&(0x7f0000000d40)='/dev/full\x00', &(0x7f0000000d80)='/dev/full\x00', &(0x7f0000000dc0)='/dev/full\x00', &(0x7f0000000e00)='/dev/full\x00'], 0x1500) getgroups(0x6, &(0x7f0000000ac0)=[0xee01, 0xee01, 0xee01, 0xee01, 0xee01, 0xee00]) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = getegid() write$FUSE_DIRENTPLUS(r0, &(0x7f00000011c0)=ANY=[@ANYBLOB="b80500000000000003000000000000000300000000000000020000000000000008000000000000000700000000000000070000000500000002000000000000000500000000000000010000000000000080ffffffffffffff00000000000000009a0000000000000000000000ffff0000018000000100000003000000", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="0100008001ffffff000000000500000000000000ff0000000000000007000000070000006b657972696e670002000000000055b12a7e0400000300000000000000010400000000000000000000000000000100000008000000038abe1e244496940135f92259be836ea300000000000000000200000000000004000000000000000000000000000000610b00010000000000080000000000000180000000000000090000003f0400", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="090000000000000000000000050000000000000008000000000000000000000006000000040000000000000003000000000000000600000000000000788800000000000006000000810000000000000000000000060000000000000081000000000000000700000000000000020000000000000000000000000000007f00000008000000010000009d0c000001000000", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="070000000100000000000000050000000000000004000000000000000f000000e000000070726f637d2e5e656d316e6f646576000000000000000000010000000000000040000000000000008100000000000000f9ffffff81000000060000000000000004000000000000000900000000000000070000000000000003000000000000000000000000000000060000007f00000009000000ffffffff00020000", @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="01000000001000000000000006000000000000007f000000000000000b000000020000005d637075736574657468310000000000050000000000000002000000000000000400000000000000010400000000000000000000060000000000000000000000040000000000000000000100000000004a00000000000000540600000000000085000000000000000200000009000000a20e00003a0000001f000000", @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="05000000ffffff7f00000000050000000000000000000000000000000300000008000000656d30000000000001000000000000000300000000000000060000000000000080000000000000000100010002000000050000000000000000000000000000000400000000000000080000000000000067040000000000002d0e000000000000ff030000000800000900000001000000ffffff7f", @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="040000000008000000000000030000000000000000000000000000000e000000090000003a76626f786e657430276574683000000100000000000000030000000000000000000000000000000004000000000000020000000600000000000000000000000100ffffffffffff01000000000000000000000000000000070000000000000000000000000000000100000070700000090000002000000009000000", @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="000001000400000000000000040000000000000006000000000000000000000000010000020000000000000001000000000000000200000000000000020000000000000001000000050000000400000000000000040000000000000001000000000000000900000000000000010000000000000009000000000000000000000200020000090000000600000068000000", @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="04000000216f000000000000040000000000000004000000000000000a000000fbffffff945c295a766d6e6574300000000000000000000000000000000000000000000000100000000000006004000000000000f98400000700000004000000000000000000000000000000000000000000000040000000000000004e8948390000000001000000000000000200000000f8ffff0001000009000000fbffffff", @ANYRES32=r17, @ANYRES32=r18, @ANYBLOB="0100008000000000000000000300000000000000fcecffffffffffff0000000005000000"], 0x5b8) r19 = socket$inet_udplite(0x2, 0x2, 0x88) socket$unix(0x1, 0x5, 0x0) ioctl(r19, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r20 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r20, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 829.868632] ? ___might_sleep+0x163/0x280 [ 829.872802] __should_failslab+0x121/0x190 [ 829.877057] should_failslab+0x9/0x14 [ 829.880879] kmem_cache_alloc_trace+0x2cc/0x760 [ 829.885831] ? kasan_unpoison_shadow+0x35/0x50 [ 829.890601] ? kasan_kmalloc+0xce/0xf0 [ 829.894511] __memcg_init_list_lru_node+0x8a/0x1e0 [ 829.899467] __list_lru_init+0x402/0x720 [ 829.903652] sget_userns+0x81b/0xd30 [ 829.907424] ? kill_litter_super+0x60/0x60 [ 829.911856] ? ns_test_super+0x50/0x50 [ 829.915759] ? ns_test_super+0x50/0x50 [ 829.919668] ? kill_litter_super+0x60/0x60 [ 829.923918] sget+0x10c/0x150 [ 829.927054] mount_bdev+0xff/0x3c0 [ 829.930606] ? vfat_mount+0x40/0x40 [ 829.934348] vfat_mount+0x35/0x40 [ 829.937811] mount_fs+0xa8/0x32b [ 829.941189] vfs_kern_mount.part.0+0x6f/0x410 [ 829.945697] do_mount+0x53e/0x2bc0 [ 829.949261] ? copy_mount_string+0x40/0x40 [ 829.953507] ? _copy_from_user+0xdd/0x150 [ 829.953533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 829.963215] ? copy_mount_options+0x280/0x3a0 [ 829.967739] ksys_mount+0xdb/0x150 [ 829.971275] __x64_sys_mount+0xbe/0x150 [ 829.975243] do_syscall_64+0xfd/0x620 [ 829.979043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.984223] RIP: 0033:0x45c26a [ 829.987408] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 830.006398] RSP: 002b:00007fd1a440da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 830.014108] RAX: ffffffffffffffda RBX: 00007fd1a440db40 RCX: 000000000045c26a [ 830.021469] RDX: 00007fd1a440dae0 RSI: 00000000200000c0 RDI: 00007fd1a440db00 [ 830.028734] RBP: 0000000000000001 R08: 00007fd1a440db40 R09: 00007fd1a440dae0 [ 830.036002] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 830.043354] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000003 19:01:57 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x3e) 19:01:58 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x8, 0x60100) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x3000, 0x1}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(r1, 0x2, &(0x7f0000000440)="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") ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000080)={0x3, r0}) r2 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r0, 0x1f, 0x2, r0}) 19:01:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x6) ftruncate(r1, 0x0) 19:01:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x7a00000000000000) 19:01:58 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x3e) 19:01:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x7000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200)="d4ccc1ced383f019408cd96ac8fc3d641c44768f67fc3c1cdace1c926cd9f4aa4941a2a8b3625a0efab09244092c0fd0d016e26060a2212b2ff8939960c4db5d7b5421de7fa071c3dfd84d04f9c98ef47b0fd41edff2935374babc57bcc391c1cc19c17b53ebf3f1090f8aedc51e2b6f93c521614fa760a71daf643103e9a4f00fd78297aa5662c999b210fbd9b1244f5814330426379d7b8f9245c66679c7288e84a91ac99bb7751480db06ca42162cb3643355500b775b6f44514c4e4d689672c782460e7cc02af3058fa9b81686f4d4f929da178f3d493a307cb6ed2913377eed41ce3d045a6d", 0xe8, r1}, 0x68) 19:01:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0xfeffffff00000000) [ 830.524806] net_ratelimit: 20 callbacks suppressed [ 830.524816] protocol 88fb is buggy, dev hsr_slave_0 [ 830.535084] protocol 88fb is buggy, dev hsr_slave_1 [ 830.535170] protocol 88fb is buggy, dev hsr_slave_0 [ 830.545737] protocol 88fb is buggy, dev hsr_slave_1 19:01:58 executing program 0 (fault-call:1 fault-nth:69): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 830.677600] FAULT_INJECTION: forcing a failure. [ 830.677600] name failslab, interval 1, probability 0, space 0, times 0 [ 830.703964] CPU: 0 PID: 2406 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 830.710940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.720307] Call Trace: [ 830.722917] dump_stack+0x172/0x1f0 [ 830.726579] should_fail.cold+0xa/0x1b [ 830.730494] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 830.735622] ? lock_downgrade+0x810/0x810 [ 830.739794] ? ___might_sleep+0x163/0x280 [ 830.743967] __should_failslab+0x121/0x190 [ 830.748217] should_failslab+0x9/0x14 [ 830.752030] kmem_cache_alloc_trace+0x2cc/0x760 [ 830.756714] ? kasan_unpoison_shadow+0x35/0x50 [ 830.761316] ? kasan_kmalloc+0xce/0xf0 [ 830.765233] __memcg_init_list_lru_node+0x8a/0x1e0 [ 830.770282] __list_lru_init+0x402/0x720 [ 830.774361] sget_userns+0x84a/0xd30 [ 830.778102] ? kill_litter_super+0x60/0x60 [ 830.782364] ? ns_test_super+0x50/0x50 [ 830.786270] ? ns_test_super+0x50/0x50 [ 830.790181] ? kill_litter_super+0x60/0x60 [ 830.794477] sget+0x10c/0x150 [ 830.797609] mount_bdev+0xff/0x3c0 [ 830.801169] ? vfat_mount+0x40/0x40 [ 830.804809] vfat_mount+0x35/0x40 [ 830.808278] mount_fs+0xa8/0x32b [ 830.811827] vfs_kern_mount.part.0+0x6f/0x410 [ 830.816528] do_mount+0x53e/0x2bc0 [ 830.820076] ? copy_mount_string+0x40/0x40 [ 830.824317] ? _copy_from_user+0xdd/0x150 [ 830.828481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 830.834033] ? copy_mount_options+0x280/0x3a0 [ 830.838545] ksys_mount+0xdb/0x150 [ 830.842102] __x64_sys_mount+0xbe/0x150 [ 830.846099] do_syscall_64+0xfd/0x620 [ 830.849910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.855102] RIP: 0033:0x45c26a [ 830.858298] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 19:01:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000100)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f0000000000)=""/43, &(0x7f0000000080)=0x2b) 19:01:58 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x3e) 19:01:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x6) ftruncate(r1, 0x0) [ 830.877209] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 830.884937] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 830.892226] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 830.899508] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 830.906797] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 830.914089] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0xffffff7f00000000) 19:01:58 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {}]}) close(r0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000100)={r2, 0x2}, 0x8) [ 830.924866] protocol 88fb is buggy, dev hsr_slave_0 [ 830.929985] protocol 88fb is buggy, dev hsr_slave_1 19:01:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(r0, 0x4000000000000000, &(0x7f0000000100)="3b525124bc7811ccbcc5676062071631160b2755dcc33e56adc0d2239d6b1b8bc046a13d520771a40d9a8970caa0be44f4e07c6471034d737d29e16688239f3b3a26ef65fda33678eeb0a795bbbacb313535a0027d673d1a68c5fcd6dbaa71c31616f24353eeb800b55f23dfc38bd2fcfcf1acc32e") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:58 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x3e) 19:01:58 executing program 0 (fault-call:1 fault-nth:70): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) bind$alg(r2, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) 19:01:59 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0xffffffff00000000) 19:01:59 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x3e) [ 831.171691] FAULT_INJECTION: forcing a failure. [ 831.171691] name failslab, interval 1, probability 0, space 0, times 0 [ 831.234179] CPU: 0 PID: 2500 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 831.241244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.241251] Call Trace: [ 831.241275] dump_stack+0x172/0x1f0 [ 831.241297] should_fail.cold+0xa/0x1b [ 831.260784] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 831.265913] ? lock_downgrade+0x810/0x810 [ 831.270089] ? ___might_sleep+0x163/0x280 [ 831.274266] __should_failslab+0x121/0x190 [ 831.278527] should_failslab+0x9/0x14 [ 831.282349] kmem_cache_alloc_trace+0x2cc/0x760 [ 831.287039] ? kasan_unpoison_shadow+0x35/0x50 [ 831.287055] ? kasan_kmalloc+0xce/0xf0 [ 831.287075] __memcg_init_list_lru_node+0x8a/0x1e0 [ 831.287094] __list_lru_init+0x402/0x720 [ 831.287116] sget_userns+0x84a/0xd30 [ 831.308382] ? kill_litter_super+0x60/0x60 [ 831.312645] ? ns_test_super+0x50/0x50 [ 831.316570] ? ns_test_super+0x50/0x50 [ 831.320569] ? kill_litter_super+0x60/0x60 [ 831.324922] sget+0x10c/0x150 [ 831.328135] mount_bdev+0xff/0x3c0 [ 831.331695] ? vfat_mount+0x40/0x40 [ 831.335344] vfat_mount+0x35/0x40 [ 831.338814] mount_fs+0xa8/0x32b [ 831.342261] vfs_kern_mount.part.0+0x6f/0x410 [ 831.346874] do_mount+0x53e/0x2bc0 [ 831.350440] ? copy_mount_string+0x40/0x40 [ 831.354701] ? _copy_from_user+0xdd/0x150 [ 831.358867] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 831.364425] ? copy_mount_options+0x280/0x3a0 [ 831.368947] ksys_mount+0xdb/0x150 [ 831.372510] __x64_sys_mount+0xbe/0x150 [ 831.376509] do_syscall_64+0xfd/0x620 19:01:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x847fd) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000200)) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:59 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x3e) [ 831.380321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.380335] RIP: 0033:0x45c26a [ 831.380351] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 831.407690] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 831.407707] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 831.407716] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 19:01:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x6) ftruncate(r1, 0x0) [ 831.407725] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 831.407733] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 831.407740] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:01:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) write$P9_RGETLOCK(r2, &(0x7f0000000100)={0x2f, 0x37, 0x2, {0x2, 0x6, 0x5, r3, 0x11, ']\xa6md5sum.vboxnet1'}}, 0x2f) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:59 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x3e) [ 831.644789] protocol 88fb is buggy, dev hsr_slave_0 [ 831.649934] protocol 88fb is buggy, dev hsr_slave_1 19:01:59 executing program 0 (fault-call:1 fault-nth:71): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:01:59 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:01:59 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x8001, 0x8000) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f00000000c0)={0x0, 0x4, 0x6, [], &(0x7f0000000080)=0x3}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r0, 0x0) 19:01:59 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x3e) 19:01:59 executing program 4: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x4) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0xfffffffffffffff7, 0x6, 0x3d91, 0xfffffffffffffffc, 0x1d8}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000280)={0x0, 0xcd, "e94d9030a1457561a49f7b78c5f0238d0a304262682c7bed7273d83f3574e2925068d4f1f34db4bfda504a0e631da9da225aeafcdfc65c726c9bbeb63cc3608aed326d8a657d2b1d5eef18cbbdf5d2986a0f5f20b5fca53808ddcb64fa3bfa124bf5457c15fc3eab2e05026d5fe58461200e8a625fb2244bd542f4ba987b376d942fe4e8b3f9a8834bba4ab639a53cdc82f15d75ed18f5534ae18ea8598dca69cdede794cf7b86f7846bd7f19d7aad480a3cfd6734317cba42ece8e97f730021009e35c4502aedbf28270e1bb0"}, &(0x7f0000000380)=0xd5) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000003c0)={r2, 0x5, 0xa965, 0xffffffff, 0x97c, 0x101, 0xffffffff, 0x3, {r3, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x401, 0x2, 0x3, 0xb7, 0x7}}, &(0x7f0000000480)=0xb0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(0xffffffffffffffff, r1, r4) close(0xffffffffffffffff) 19:01:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ftruncate(r1, 0x0) 19:01:59 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x3e) [ 832.021232] FAULT_INJECTION: forcing a failure. [ 832.021232] name failslab, interval 1, probability 0, space 0, times 0 19:01:59 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x80000) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) dup2(r0, r0) close(r0) 19:01:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) r2 = semget$private(0x0, 0x0, 0x204) semtimedop(r2, &(0x7f0000000000)=[{0x0, 0x8, 0x800}, {0x2, 0x36, 0x800}], 0x2, &(0x7f0000000080)) fchmod(r0, 0x20) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000100)=""/165) [ 832.124793] protocol 88fb is buggy, dev hsr_slave_0 [ 832.130054] protocol 88fb is buggy, dev hsr_slave_1 [ 832.154083] CPU: 0 PID: 2698 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 832.161068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.170521] Call Trace: [ 832.173127] dump_stack+0x172/0x1f0 [ 832.177046] should_fail.cold+0xa/0x1b [ 832.181217] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 832.186362] ? lock_downgrade+0x810/0x810 [ 832.190528] ? ___might_sleep+0x163/0x280 [ 832.194696] __should_failslab+0x121/0x190 [ 832.198958] should_failslab+0x9/0x14 [ 832.202786] kmem_cache_alloc_trace+0x2cc/0x760 [ 832.207568] ? kasan_unpoison_shadow+0x35/0x50 [ 832.212181] ? kasan_kmalloc+0xce/0xf0 [ 832.216101] __memcg_init_list_lru_node+0x8a/0x1e0 [ 832.221051] __list_lru_init+0x402/0x720 [ 832.225147] sget_userns+0x84a/0xd30 [ 832.228889] ? kill_litter_super+0x60/0x60 [ 832.233240] ? ns_test_super+0x50/0x50 [ 832.237153] ? ns_test_super+0x50/0x50 [ 832.241275] ? kill_litter_super+0x60/0x60 [ 832.245532] sget+0x10c/0x150 [ 832.248700] mount_bdev+0xff/0x3c0 [ 832.252259] ? vfat_mount+0x40/0x40 [ 832.255917] vfat_mount+0x35/0x40 [ 832.259394] mount_fs+0xa8/0x32b [ 832.262784] vfs_kern_mount.part.0+0x6f/0x410 [ 832.267309] do_mount+0x53e/0x2bc0 [ 832.271169] ? copy_mount_string+0x40/0x40 [ 832.275433] ? _copy_from_user+0xdd/0x150 [ 832.279633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.285217] ? copy_mount_options+0x280/0x3a0 [ 832.289744] ksys_mount+0xdb/0x150 [ 832.293338] __x64_sys_mount+0xbe/0x150 [ 832.297351] do_syscall_64+0xfd/0x620 [ 832.301916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.307210] RIP: 0033:0x45c26a 19:02:00 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x3e) 19:02:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet6_dccp(0xa, 0x6, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000ac0)={0x53, 0xffffffffffffffff, 0xee, 0x3, @scatter={0x9, 0x0, &(0x7f0000000840)=[{&(0x7f0000000200)=""/141, 0x8d}, {&(0x7f00000002c0)=""/208, 0xd0}, {&(0x7f0000000180)=""/29, 0x1d}, {&(0x7f0000000440)=""/238, 0xee}, {&(0x7f0000000540)=""/140, 0x8c}, {&(0x7f0000000600)=""/180, 0xb4}, {&(0x7f00000006c0)=""/123, 0x7b}, {&(0x7f00000003c0)=""/30, 0x1e}, {&(0x7f0000000740)=""/213, 0xd5}]}, &(0x7f0000000900)="8e17f49e5e478689531262b7daa672d8e2e2a8d0d74a2aa2c064129df298c44ba81488c53e9b9ac3f47828bd2ad76d1d3319ec2d8c89e74907b2684bedfd9e85b50a0200680245aec0cc8e84b3c75c2ff17b28de06315c37fc28e1cb3f59aacb03d45305e8877758fb8613f9367097c834237fdc14589e74b55523563668458ed6dcb7d1ee2287e923fb2ed37c6d06a4f358cfb5f4c8936edbdb181d70feb63f650c90fdb4910470a53fe3737c3a2acc274bfa14803c7f82b6ab858415412d9f7180184036095ba705a8a5d8aa9e75d76a5f969d32460b70053149d3350ba42c7309dbee3548cd94b64c839866fe", &(0x7f0000000a00)=""/101, 0x6, 0x0, 0x3, &(0x7f0000000a80)}) r2 = socket$inet(0x10, 0x3, 0x1000000000000006) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x0, 0x100000000}, &(0x7f0000000080)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/loop-control\x00', 0x4000, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x8, 0x8, 0x0, r3}, 0x10) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 832.310416] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 832.329333] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 832.337063] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 832.344352] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 832.351640] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 832.358926] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 832.366218] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:02:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ftruncate(r1, 0x0) 19:02:00 executing program 0 (fault-call:1 fault-nth:72): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:02:00 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x332]}, 0x3e) 19:02:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x2, [0x0, 0x0]}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e23, 0x5061, @remote, 0x4}}, 0x5, 0xffffffffffff6444, 0xbcc, 0x7fff, 0x10}, &(0x7f0000000300)=0x98) r3 = socket$inet(0x10, 0x3, 0x1000000000000006) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) bind$bt_rfcomm(r4, &(0x7f0000000080)={0x1f, {0x3, 0x80000001, 0x4, 0x100, 0x200, 0x1}, 0xfffffffffffffffc}, 0xa) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:02:00 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) r2 = dup3(r1, r0, 0x0) read(r0, &(0x7f0000000800)=""/4096, 0x1000) getsockname$inet(r2, &(0x7f0000000040), &(0x7f0000000080)=0x10) 19:02:00 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x3e) 19:02:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000080)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video1\x00', 0x2, 0x0) [ 832.602403] FAULT_INJECTION: forcing a failure. [ 832.602403] name failslab, interval 1, probability 0, space 0, times 0 [ 832.660027] CPU: 1 PID: 2850 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 832.667004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.667013] Call Trace: [ 832.667037] dump_stack+0x172/0x1f0 [ 832.667064] should_fail.cold+0xa/0x1b [ 832.667085] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 832.667103] ? lock_downgrade+0x810/0x810 [ 832.667118] ? ___might_sleep+0x163/0x280 [ 832.667139] __should_failslab+0x121/0x190 [ 832.667157] should_failslab+0x9/0x14 [ 832.667171] kmem_cache_alloc_trace+0x2cc/0x760 [ 832.667185] ? kasan_unpoison_shadow+0x35/0x50 [ 832.667200] ? kasan_kmalloc+0xce/0xf0 [ 832.667220] __memcg_init_list_lru_node+0x8a/0x1e0 [ 832.667241] __list_lru_init+0x402/0x720 [ 832.667261] sget_userns+0x84a/0xd30 [ 832.667275] ? kill_litter_super+0x60/0x60 [ 832.667291] ? ns_test_super+0x50/0x50 [ 832.717670] ? ns_test_super+0x50/0x50 [ 832.717683] ? kill_litter_super+0x60/0x60 [ 832.717699] sget+0x10c/0x150 [ 832.746262] mount_bdev+0xff/0x3c0 [ 832.746277] ? vfat_mount+0x40/0x40 [ 832.746294] vfat_mount+0x35/0x40 [ 832.746311] mount_fs+0xa8/0x32b [ 832.746329] vfs_kern_mount.part.0+0x6f/0x410 [ 832.746348] do_mount+0x53e/0x2bc0 [ 832.768099] ? copy_mount_string+0x40/0x40 [ 832.780365] ? _copy_from_user+0xdd/0x150 [ 832.784542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.790098] ? copy_mount_options+0x280/0x3a0 [ 832.794608] ksys_mount+0xdb/0x150 [ 832.794627] __x64_sys_mount+0xbe/0x150 [ 832.794646] do_syscall_64+0xfd/0x620 [ 832.806136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.811337] RIP: 0033:0x45c26a [ 832.814544] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 832.833458] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 832.833476] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 832.833485] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 19:02:00 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x3e) [ 832.833494] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 832.833506] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 832.870279] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:02:00 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0xd9, 0x5, 0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7) lseek(r1, 0x1e, 0x7) close(r0) 19:02:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ftruncate(r1, 0x0) 19:02:00 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) r2 = dup3(r1, r0, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000000c0)={0x9, 0x0, 0xfffffffffffffe00, 0x7fff, 'syz0\x00', 0x1}) 19:02:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf0704bf04cb485d6a428a268a97c1de642f07a50cd68d6165440d0ae3e0a80528ae1f1379c7f56faac1c33267e8a34d4c1cc0d2d1e5d26b497a32b58f229c4167906d141a3d291637d43e0d9e19298bb309da27f666f04bab556ee356eaac339e95354944f0c6f09277388ecb5c122dee0df83d3a755b1e765ccc91e23daa4b016d645d44517af02d0316f39f77794b2552d0d323fc4edb8d8dcabddf0d56bded56f69739d78e7a9585e45327a5977fff8bc592b807746a507d75b") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x400) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000040)={0x100000, 0xffff, 0x7, 0x8}) 19:02:00 executing program 0 (fault-call:1 fault-nth:73): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:02:00 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x3e) 19:02:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) connect$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x1, 0x2, 0x6, 0x634, 0x3, "b1af4239c55982623e3b99f881b7e70be0d3a4d607464aed584db9cc58413be8b8241275b2544be15b887b81df599bc8a2f2a30957c8d07ed62a3be6f29efd", 0x30}, 0x60) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = socket$inet(0x10, 0x3, 0x1000000000000006) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0x2, 0x5}, @window={0x3, 0xa93d, 0x7}, @timestamp, @window={0x3, 0xa6de}], 0x4) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:02:01 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x3e) 19:02:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000000)={0x2, 0x8001, 0x1}, 0xc) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000080)='./file0\x00', 0x400300, 0x41) sendto$x25(r1, &(0x7f0000000100)="a01ff3eda6e58e502b7c92fe167b675bba1190b3186b3a99f8f6513b22b8305ff55a4dee95f9925c90c9530bd560d8a6298c8690996a3c98177e4cb9fa7c5c5106ddef0fac86780d324df530273678ef4037de7290cf829df637cad1483dd003e7e3586028441079a52b31fc4db6fe916a", 0x71, 0x80, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) r2 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:02:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x3) write$selinux_access(r2, &(0x7f0000000080)={'system_u:object_r:lost_found_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x354}, 0x46) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:02:01 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3203]}, 0x3e) [ 833.465726] FAULT_INJECTION: forcing a failure. [ 833.465726] name failslab, interval 1, probability 0, space 0, times 0 [ 833.477167] CPU: 1 PID: 3130 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 833.484115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.493485] Call Trace: [ 833.496105] dump_stack+0x172/0x1f0 [ 833.499769] should_fail.cold+0xa/0x1b [ 833.503692] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 833.508821] ? lock_downgrade+0x810/0x810 [ 833.513002] ? ___might_sleep+0x163/0x280 [ 833.517180] __should_failslab+0x121/0x190 [ 833.521437] should_failslab+0x9/0x14 [ 833.525258] kmem_cache_alloc_trace+0x2cc/0x760 [ 833.529948] ? kasan_unpoison_shadow+0x35/0x50 [ 833.534556] ? kasan_kmalloc+0xce/0xf0 [ 833.538478] __memcg_init_list_lru_node+0x8a/0x1e0 [ 833.543445] __list_lru_init+0x402/0x720 [ 833.547530] sget_userns+0x84a/0xd30 [ 833.551264] ? kill_litter_super+0x60/0x60 [ 833.555528] ? ns_test_super+0x50/0x50 [ 833.559444] ? ns_test_super+0x50/0x50 [ 833.563357] ? kill_litter_super+0x60/0x60 [ 833.567604] sget+0x10c/0x150 [ 833.567623] mount_bdev+0xff/0x3c0 [ 833.567636] ? vfat_mount+0x40/0x40 [ 833.567652] vfat_mount+0x35/0x40 [ 833.567667] mount_fs+0xa8/0x32b [ 833.567686] vfs_kern_mount.part.0+0x6f/0x410 [ 833.567704] do_mount+0x53e/0x2bc0 [ 833.567725] ? copy_mount_string+0x40/0x40 [ 833.567749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 833.567763] ? copy_mount_options+0x280/0x3a0 [ 833.567780] ksys_mount+0xdb/0x150 [ 833.567797] __x64_sys_mount+0xbe/0x150 [ 833.567815] do_syscall_64+0xfd/0x620 [ 833.567835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.574460] RIP: 0033:0x45c26a [ 833.574474] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 833.574482] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 833.574496] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a 19:02:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) [ 833.574508] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 833.668168] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 833.675483] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 833.682857] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:02:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(0xffffffffffffffff, 0x0) 19:02:01 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x3e) 19:02:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x4400) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000200)={0x100, 0x7, 0x6, 0x0, 0x0, [], [], [], 0x5ce7, 0x80000001}) close(r1) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:02:01 executing program 0 (fault-call:1 fault-nth:74): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:02:01 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0xfffffffffffffe24) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fd) rt_sigreturn() lseek(r0, 0x0, 0x4) close(r0) fcntl$getownex(r1, 0x10, &(0x7f0000000c80)) r2 = getpgrp(0xffffffffffffffff) r3 = getpgrp(r2) r4 = perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0xffffffffffffffff, 0x1f, 0xfffffffffffffff7, 0xffffffff, 0x0, 0x3, 0x8000, 0x1, 0x7fffffff, 0x3ff, 0x5, 0x59, 0x5, 0xfffffffffffffffe, 0x100000001, 0x80000000, 0x81, 0x6, 0x342, 0x4, 0x100000000, 0x4, 0x6, 0x4, 0x8, 0x1000, 0x100, 0x0, 0x7, 0xfca, 0x1f, 0x797a, 0x3, 0x1, 0x50000000000000, 0xd95, 0x0, 0x3, 0x1, @perf_config_ext={0x4, 0x7}, 0x2000, 0x3ff, 0x8000, 0x0, 0x7, 0x9, 0x5}, r3, 0x1, r0, 0x3) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() kexec_load(0x42, 0x4, &(0x7f0000000f80)=[{&(0x7f0000000cc0)="365f5b874962a76b4ddc1a562cd64806d2e3471512a7f81679ae75c41ac20b7015c52e12aa6f5258722a5169275a3e4282b0bbd28c3a42aa50ce30c9e26c5707ab61daadab67fd59cf912a610544c7456ccbc8b987e56de5eb65bf3b90fd89346ab895ba16b8e22b0df86c5ccd6479f95b6c40d03049226431a25c882dfe8fdd410859fc95040b40c3ab99f913d296dcee3dfeafe383ff200cf731fdf9abe8", 0x9f, 0x5, 0x2}, {&(0x7f0000000d80)="901f6d2b21462bb3fa3d422e26015bac7dce5dd889b4ff8115d1d574c4d50174258259aa26d6e65c041ccb58e78a44c63334c8cbad731fc4e358a79a1e17c4c79f48b332f05bfce2dd4f06f8293810786a671b9be2", 0x55, 0x2, 0x9}, {&(0x7f0000000e00)="ea02066979e9e49ea49073dc09b0ec76d515632c792769e3316bc9186b1bd9dc22a1db26211aa0cec3e3eeed00c142d7ddcbc8311bcacc73f3314bc6b89f01a51fb7a7b60a1708df6aa0644e40ba052ef2f5abc6b00be988e8183edfc4628b46e2280cdf43db8162072664fdba9f33007fa9542cd5452ba49ce8c895ac813a1af169d17a0c32898403b849dda33a6cf651fb7390695c5076cd3a869bb016f373dace85e534e6136788b891677804325ecbaaaa7c0943f70200f6e97eaa9d5b2fb5b4b4b188698a2fc05925254b46bd6cc8356a9bf3b737d7771d93e6024a4570b99e8ff16d0d", 0xe6, 0x4, 0x8b}, {&(0x7f0000000f00)="8a71fbcb2e2a3f2396d5267ec45f33a8d8543a16866a2643c35ba0ab019fdba156c49d7e120ba7a81413e8b2f0ad70d90b8fdf06ba513d64d1e89d3bc7775d640d4c73e7909fe2664d061d681e711ace82", 0x51, 0x2, 0xfffffffffffffffe}], 0x3a0000) sendmsg$unix(r0, &(0x7f0000000c40)={&(0x7f0000000440)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000a80)=[{&(0x7f00000004c0)="185829832d7f5b3b5f78bbfe2596257d713518061b502ce1ca59c73d852c2c20cfb40c539ab8024f266f0a396aacece8b02e95fcbfecd973783f445671b73c53d4706c58f291433ad657ec76ad8c5aed12bdf706a5d6a414d2c9cb3ee3e3dea7cab3de5b215d635b56cc70dd3e81eb23de03c6bf0b020d93366b9cdd09dbea0741be78774bc3d986aead7054789055c60db8dd2c302051eac2e9e233630b00ef794f16097e3ffec11fd0603b4a6398491771614c9a62301c321cae509c08e4434c103edbd4e606051a5ecbc7dd", 0xcd}, {&(0x7f00000005c0)="a4e2412ea41c5ae8545f3e2d67f916a3c358e6c202470e02a5b2fa076330a410c19a7688a1bed56bc04783de6bb0a5cc43ad437ddc167b58cc5eea0991bbedb2477d93e37d76fe7877371f0aac2b79633b055897ee356ab039af83901e315b9a041bdad352b92b27812fdf329710bb9e54a01eb9d65922cf8b9a4dd4579dab8f3641e6bdffc70a08f4dc367aaeb678", 0x8f}, {&(0x7f0000000680)="98520a17b8b4d98c153597df1da9b080ba106bae05c9bb5daf6d05d40ee88ad2c2e8b2c579f44531e968a345a7df5eeceedcec121066e12bfc3f3eb1479649954cf2d00b9b2effcc1b6188f6da4616fc5260365d789c2d7cfca0e4500316941f9e6f63da120a053f3c0826dc47cbe41afe8214e8ac33230a952847f821b2d2db80f1df773b457dafeabdd417dae2e19f18eec08dcd034d25b6e548715b9915514892b864ca9fa8f952e1980842e9a471a141ae26e85559ffcbdea098dee9149112d3923f5d2f809547a18e09da65e2a887bd5492d11e0b38299770", 0xdb}, {&(0x7f0000000780)="2de371e62c6160f1aa66aebe46dc465cb74f745a03576abb8b05b63b59", 0x1d}, {&(0x7f00000007c0)="e85fc5133d5b026980afda5b11d433e905bee2b4a337f8820da0ca9a61c300ed5ebcd354c96efe2b38c596191af2bdbf1720ce81d58b38f1348a875b20e0997b50ca44e06e2f4ce7bdcea1aacc989f5a53419cf1c874206ef8ca0bfe45669ea4f9f55774bd99b9ce689e593a21d073e11a5bdea971706d4975a11d46e311e489895c914a45ee6f5be0945f0eb99dbf2f6ab008b0113062fe2e5fe34dc9d5065331f7a8962dbf4eecd4ae610149e1ba720b779de2f4e881fdbb5749eeea7d4b8ef9e34d76", 0xc4}, {&(0x7f00000008c0)="02b324c7a989912783cc56c0b7f0ed28b18ebfc2ae9aa5ad9dbec96b8905629476d105408dc71588c9b7a4", 0x2b}, {&(0x7f0000000900)="01cd20382d45196feca9890afacd51717eaf371a750f47f7462ab2417c43428a3bd37aa0a0ba86868b376fee5e55d0e90de732319131e8ccbd5d0408388f260ef5957f5a18f82d29d590115f35d9a5daf85bc38b815edff8cb70d0bc378844a7783841c4f449506144684535ec93a7088029f9fa0d00a2de63104e24b306c322c363742c170b5f0f30b8feb4dc43906eea65b27a5f09c18c8af1437678397d5c56545186", 0xa4}, {&(0x7f00000009c0)="bf013308c5b6a3d8bcac5e61ca4ac06b44a31b1d508458dff4a65b7c69d14e45514cf74f91a9e701bd07f3863df85f70cb31492fa8f865625ed5e94e0d494d0ea2ab43fa5f4c479f2e2c32a561797c97c574878f3cd6b72c16d266e29c88eb89fe23af9e1bff3624776fa0761a8b0fde21b1d64dfbac3c7c7759d40837e654b0e0d5303e435450d682e76a5410e841489060f11a18761baa62bb2cf36b", 0x9d}], 0x8, &(0x7f0000000bc0)=[@rights={{0x38, 0x1, 0x1, [r1, r1, r1, r1, r4, r1, r0, r4, r4, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, r5, r6}}}], 0x58, 0x80}, 0x20000000) set_mempolicy(0x0, &(0x7f0000001000)=0xdf75, 0x3f) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x4, 0x2}, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x7, 0xb61, 0x2}, &(0x7f0000000140)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x100000000}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r7, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=@sha1={0x1, "a74fad05e33dbe93237ee71a198358e429c9e0ac"}, 0x15, 0x3) 19:02:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) rt_sigaction(0x29, &(0x7f0000000100)={&(0x7f0000000040)="c4c1fc5aab12d6000081306c7c0000c48321485e97fd660f2f5f46c4c2c10a9231000000c4e131c645f6012e65420f1ac2c4e12dd2ec418bc6c4c105d293ffefffff", {0x7fff}, 0xd8000004, &(0x7f00000000c0)="66410ffecb36f00fba7cb570cf2daf4a00006766410f702800c4e235ac10c462fd38e92665660fe8e8410fba665fad45e635d0c0"}, &(0x7f0000000200)={&(0x7f0000000180)="2ef3470f169a2a0200000f4cfdc4c1a57dd5c4019d64060fc7fbc481d45effc423dd0fcb0dc462f9304b51420f80a099161df34c0f1ecf", {}, 0x0, &(0x7f00000001c0)="2e45dcda66400f38dd4107c462393f4458000f1a3e66420f752d70000000c4824909d8c42269beb5b7000000c4e1b5f48feca7000046f93400"}, 0x8, &(0x7f0000000240)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:02:01 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x3e) [ 834.072133] FAULT_INJECTION: forcing a failure. [ 834.072133] name failslab, interval 1, probability 0, space 0, times 0 [ 834.123874] CPU: 1 PID: 3183 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 834.130854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.140216] Call Trace: [ 834.142863] dump_stack+0x172/0x1f0 [ 834.146525] should_fail.cold+0xa/0x1b [ 834.150443] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 834.155663] ? lock_downgrade+0x810/0x810 [ 834.159837] ? ___might_sleep+0x163/0x280 [ 834.164012] __should_failslab+0x121/0x190 [ 834.168271] should_failslab+0x9/0x14 19:02:02 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x3e) [ 834.172096] kmem_cache_alloc_trace+0x2cc/0x760 [ 834.176795] ? kasan_unpoison_shadow+0x35/0x50 [ 834.181402] ? kasan_kmalloc+0xce/0xf0 [ 834.185319] __memcg_init_list_lru_node+0x8a/0x1e0 [ 834.190275] __list_lru_init+0x402/0x720 [ 834.194356] sget_userns+0x84a/0xd30 [ 834.198081] ? kill_litter_super+0x60/0x60 [ 834.202333] ? ns_test_super+0x50/0x50 [ 834.206241] ? ns_test_super+0x50/0x50 [ 834.210150] ? kill_litter_super+0x60/0x60 [ 834.214407] sget+0x10c/0x150 [ 834.217549] mount_bdev+0xff/0x3c0 19:02:02 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) setsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000000)=0x9, 0x4) close(r0) [ 834.221115] ? vfat_mount+0x40/0x40 [ 834.224765] vfat_mount+0x35/0x40 [ 834.228241] mount_fs+0xa8/0x32b [ 834.231633] vfs_kern_mount.part.0+0x6f/0x410 [ 834.236149] do_mount+0x53e/0x2bc0 [ 834.239710] ? copy_mount_string+0x40/0x40 [ 834.243976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 834.249535] ? copy_mount_options+0x280/0x3a0 [ 834.249554] ksys_mount+0xdb/0x150 [ 834.249571] __x64_sys_mount+0xbe/0x150 [ 834.257963] do_syscall_64+0xfd/0x620 [ 834.257983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.257994] RIP: 0033:0x45c26a [ 834.258008] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 834.258015] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 834.258035] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 834.308031] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 834.315388] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 834.322676] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 834.329975] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:02:02 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}, 0x3e) 19:02:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)={0x4, [0x1, 0x0, 0x400, 0x0]}, &(0x7f0000000100)=0xc) r2 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x50}, &(0x7f0000000180)=0x8) write$P9_RCREATE(r1, &(0x7f0000000240)={0x18, 0x73, 0x1, {{0x8, 0x1, 0x3}}}, 0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000200)={0x5f4, 0x200, 0x8001, 0x4, r3}, 0x10) 19:02:02 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x33e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:02:02 executing program 0 (fault-call:1 fault-nth:75): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:02:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in6=@empty}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xfffffffffffffc88) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:02:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(0xffffffffffffffff, 0x0) 19:02:02 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}, 0x3e) [ 834.652695] FAULT_INJECTION: forcing a failure. [ 834.652695] name failslab, interval 1, probability 0, space 0, times 0 [ 834.676649] CPU: 1 PID: 3329 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 834.683620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.692987] Call Trace: [ 834.695598] dump_stack+0x172/0x1f0 [ 834.699273] should_fail.cold+0xa/0x1b [ 834.699294] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 834.708279] ? lock_downgrade+0x810/0x810 [ 834.712446] ? ___might_sleep+0x163/0x280 [ 834.716619] __should_failslab+0x121/0x190 [ 834.720868] should_failslab+0x9/0x14 [ 834.724797] kmem_cache_alloc_trace+0x2cc/0x760 [ 834.729474] ? kasan_unpoison_shadow+0x35/0x50 [ 834.734065] ? kasan_kmalloc+0xce/0xf0 [ 834.738044] __memcg_init_list_lru_node+0x8a/0x1e0 [ 834.738063] __list_lru_init+0x402/0x720 [ 834.738082] sget_userns+0x84a/0xd30 [ 834.738095] ? kill_litter_super+0x60/0x60 [ 834.738110] ? ns_test_super+0x50/0x50 [ 834.758900] ? ns_test_super+0x50/0x50 [ 834.762806] ? kill_litter_super+0x60/0x60 [ 834.767040] sget+0x10c/0x150 [ 834.767057] mount_bdev+0xff/0x3c0 [ 834.767070] ? vfat_mount+0x40/0x40 [ 834.767087] vfat_mount+0x35/0x40 [ 834.767102] mount_fs+0xa8/0x32b [ 834.767123] vfs_kern_mount.part.0+0x6f/0x410 [ 834.767141] do_mount+0x53e/0x2bc0 [ 834.767162] ? copy_mount_string+0x40/0x40 [ 834.767179] ? _copy_from_user+0xdd/0x150 19:02:02 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x3e) [ 834.767200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 834.767212] ? copy_mount_options+0x280/0x3a0 [ 834.767227] ksys_mount+0xdb/0x150 [ 834.767244] __x64_sys_mount+0xbe/0x150 [ 834.767260] do_syscall_64+0xfd/0x620 [ 834.767280] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.777510] RIP: 0033:0x45c26a [ 834.777526] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 834.777533] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 834.821983] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 834.821993] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 834.822002] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 834.822011] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 834.822019] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 19:02:02 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x64000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000080)={0x0, 0x81, 0x2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x40000, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r0, 0x0) 19:02:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000080)=[0x0, 0x1]) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:02:02 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x3e) [ 835.125357] Unknown ioctl 1074283779 [ 835.145585] Unknown ioctl 1074283779 19:02:03 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000300)=""/4096) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) io_setup(0x2, &(0x7f0000000000)=0x0) io_submit(r2, 0x3, &(0x7f00000002c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f0000000040)="229e71749286fd9fbb980f247564b037d2313f0be3dc40b7b8e3b2448fca71e32c565d30650ff15766db070177e2f435875ba193070f42776eb34a77e125f7e48b80215f8915fc16ca74b073d09dafc66c6c6d499830d3fb93bc0c328d53bb2c583f9b07985c14d084f986c82caafa832ed700909e58aee524763b877eaea3ea12f9d783e9ad64db102b9055684855c4dfa5da90861795d2858db6b03652cde6932e96eca48d4c3342", 0xa9, 0x100}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x1000, r0, &(0x7f0000000140)="2b52cf1933a1e6220c33f0286492639f97789804", 0x14, 0x9, 0x0, 0x0, r0}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x3, 0x8, r1, &(0x7f0000000200)=';', 0x1, 0x2, 0x0, 0x1, r0}]) 19:02:03 executing program 0 (fault-call:1 fault-nth:76): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:02:03 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x3e) 19:02:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4000001000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:02:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000000000000000400fdff000000001000000000000092b6d247345db4d3198ba84a2ecf000000000000000000"], 0x24, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ftruncate(0xffffffffffffffff, 0x0) 19:02:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:02:03 executing program 3: prctl$PR_SET_ENDIAN(0x14, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0xc0, 0x0) mq_timedsend(r2, &(0x7f0000000100)="c1198ddbc8ddd47ca6f6d6c10d992bde41ebad4246c4999ed3af1932a47b13b13cb8dabafcbd313269f47c17376ba186b919b551bb14facab2aa082512910830b05a90c173319132b4aec1f929b3cd8738f7e6f60fb26e0444ccbb0cf1616393fab632dbda1d4c865efe59f84d72061ea51f", 0x72, 0x8, &(0x7f0000000080)={0x77359400}) 19:02:03 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3e) 19:02:03 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000080)={0x0, 0xbe6}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000640)={r1, @in={{0x2, 0x4e21, @broadcast}}}, &(0x7f0000000140)=0xffffffffffffffec) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)={0x1f4, r4, 0x60a81fdace23313d, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xb4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xffff, @local, 0x224d}}, {0x14, 0x2, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x23}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'veth1\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_bond\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f7d72c4}]}]}, @TIPC_NLA_NET={0x68, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8eb}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3d0ffff2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1000}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x72a54940}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}]}]}, 0x1f4}}, 0x40000) 19:02:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x3c) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) 19:02:03 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x3e) 19:02:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = signalfd4(r0, &(0x7f0000000000)={0x80}, 0x8, 0x80000) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/enforce\x00', 0x80000, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000380)={0x1}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r2, 0x0, 0xc, &(0x7f00000004c0)='/dev/amidi#\x00'}, 0x30) r4 = getpgid(r3) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000440)={&(0x7f0000ffd000/0x1000)=nil, 0x80000001, 0x7, 0x80, &(0x7f0000ffd000/0x2000)=nil, 0x2d2}) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x25a92a47) fcntl$setown(r1, 0x8, r4) socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000080001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x80000001) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f00000000c0)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000080)={0x0, @speck128, 0x0, "e341026dcd4e1050"}) fdatasync(r1) get_thread_area(&(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x9, 0x7, 0x7, 0x9, 0x9, 0x4, 0x4}) write$FUSE_NOTIFY_POLL(r2, &(0x7f00000003c0)={0x18, 0x1, 0x0, {0xde1b}}, 0x18) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000540)={'bcsh0\x00', {0x2, 0x4e21, @remote}}) syz_open_dev$amidi(&(0x7f0000000480)='/dev/amidi#\x00', 0x2, 0x1) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r5, 0xc1105518, &(0x7f0000000200)={{0x5, 0x6, 0x2, 0x0, '\x00', 0x6}, 0x1, 0x31, 0x3, r4, 0x4, 0xffffffffffffffff, 'syz0\x00', &(0x7f0000000180)=['*procwlan1\x00', '[\x00', 'keyring\x00', 'keyringvboxnet0:@vboxnet1]eth1-\'[,\x00'], 0x38, [], [0x3, 0xfffffffffffff537, 0x8001, 0x3]}) [ 835.646244] FAULT_INJECTION: forcing a failure. [ 835.646244] name failslab, interval 1, probability 0, space 0, times 0 [ 835.747414] CPU: 0 PID: 3594 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 835.754401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.763859] Call Trace: [ 835.766467] dump_stack+0x172/0x1f0 [ 835.770119] should_fail.cold+0xa/0x1b [ 835.774021] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 835.774040] ? lock_downgrade+0x810/0x810 [ 835.774059] ? ___might_sleep+0x163/0x280 [ 835.783387] __should_failslab+0x121/0x190 [ 835.783403] should_failslab+0x9/0x14 [ 835.783420] kmem_cache_alloc_trace+0x2cc/0x760 [ 835.800374] ? kasan_unpoison_shadow+0x35/0x50 [ 835.804981] ? kasan_kmalloc+0xce/0xf0 [ 835.808898] __memcg_init_list_lru_node+0x8a/0x1e0 [ 835.813863] __list_lru_init+0x402/0x720 [ 835.817955] sget_userns+0x84a/0xd30 [ 835.821692] ? kill_litter_super+0x60/0x60 [ 835.825950] ? ns_test_super+0x50/0x50 [ 835.829858] ? ns_test_super+0x50/0x50 [ 835.833773] ? kill_litter_super+0x60/0x60 [ 835.838025] sget+0x10c/0x150 [ 835.841158] mount_bdev+0xff/0x3c0 [ 835.844722] ? vfat_mount+0x40/0x40 [ 835.848378] vfat_mount+0x35/0x40 [ 835.851857] mount_fs+0xa8/0x32b [ 835.855345] vfs_kern_mount.part.0+0x6f/0x410 [ 835.859869] do_mount+0x53e/0x2bc0 [ 835.863478] ? copy_mount_string+0x40/0x40 [ 835.867856] ? copy_mount_options+0x1fe/0x3a0 [ 835.872373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 835.877930] ? copy_mount_options+0x280/0x3a0 [ 835.882475] ksys_mount+0xdb/0x150 [ 835.886036] __x64_sys_mount+0xbe/0x150 [ 835.890030] do_syscall_64+0xfd/0x620 [ 835.893850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 835.899050] RIP: 0033:0x45c26a [ 835.902252] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 835.921169] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 835.928895] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 835.936179] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 835.943462] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 835.950746] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 835.958074] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 835.965652] net_ratelimit: 20 callbacks suppressed [ 835.965662] protocol 88fb is buggy, dev hsr_slave_0 [ 835.975739] protocol 88fb is buggy, dev hsr_slave_1 19:02:04 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x2000000) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x440000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001ff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40000, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0}) clock_gettime(0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={{r2}}, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) syz_emit_ethernet(0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="ffffffffffff00000000000086ef60b4090000303a0080000000000000000000ffffe0000002ff020000000000000000000000000001800090780009040060b680fa00000000030000000000"], 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) clock_nanosleep(0x5, 0x0, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) creat(0x0, 0x0) ustat(0x5, 0x0) lseek(r0, 0x0, 0x4) close(r1) 19:02:04 executing program 0 (fault-call:1 fault-nth:77): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:02:04 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x3e) 19:02:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f00000009c0)={0x0, 0x0, 0x0}, 0x0) 19:02:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) r2 = open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="19161a5ccf4b0df3cf6b5b93864a704a41fc0886ad58e91155e7fb80c50dfcc8932e51d5cc583d9cf4b4868e7d5901e1f849af5dafeb1fc77d753ce4ab54d7638ddf8b8132b0888e7b998469b36e98b6498b799aff9977a09004ee57ad65fb26c48ecaf99428dd986c4ae8c8d790fd0eeb3efa950807b5c4feab8c69aa186d0d", 0x80) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 19:02:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x8000000) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) [ 836.224552] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 836.241412] FAULT_INJECTION: forcing a failure. [ 836.241412] name failslab, interval 1, probability 0, space 0, times 0 19:02:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000100)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f00000003c0)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000400)={0x40000000000000, 0x9, r2, 0x0, r3, 0x0, 0x7fffffff, 0xa3}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000006c0)="05c90927dfa410181a0fd0ad9dfdab95b3266a8eb66b13b4d5e232490bd4139af734ae09b983bcdc41eea250da39535fa4d94c23a5fc11aac58363df24108040783f269a05555e7f78dfa277f7ce57e08cc072b5be634bcd846aa4eedc715ff7bac0070e2f58411c102a1ec2f72866060270ae9e88dbf38a71744a0457767fa8e97a08454dd2ece906ce541aedaf88710337d24d9ad7fbb05e1ecc75b7d89c073b50e9f52499efed78d029936b6832c3fa7bcdeff92801962f3149921164794d64ab5ef98f00083f63961d09887cb7e7feb3ee6eb2", 0xd5}, {&(0x7f0000000600)="b5d5a8b0529a00df44ae98591bb3fd759c0461c0dbdc75e77787daf0fadd95e3cffbded16f0e39e27923b3a99af52286867d76a23f29e897ecb828d1bbecc1586c1536af6a25888a9f9257523bdce2727abacead0798206e1b57165d52e0b5344f80659dc281eb41428a6e22c78aeb23736d84936b3a347e933d531260718f11cdc76016a6a3ca7a12", 0x89}, {&(0x7f0000000300)="d1466dfd6a621cbbf8c97e15771488276bd68ae42435047be72a8e9b89776e63c3f0f3d81a224b325de9da0897c4f1484210f60410d04eab76f7229a76379c9d1e137607dca79bc5edc9086f61fa022cb5dc2126df59572a14889d5127d763dd437ec250d3dc3801ae347c0a1be4c47514eccf544c566688641b03025749f4eb76385a6672c62a8facd25f0edb0c41c7abf07f55b239f815476a59", 0x9b}, {&(0x7f0000000440)="80239f588d81039678540e54ba8ebaddb193351b28d20f14f80f27a9dd5730a202b34b56eb5bcf0da53b9dc1d3ee86c656e51d35710b4f13261995cf6fb16c2a435557e8e8bdea137e102a2b2c03ae4f498437165a4253eb", 0x58}, {&(0x7f00000004c0)="8d0f39479c6432b7708aa9219d75fd1452397da17cdf8307e5fb42df9cac800d0b63754a251d42aa27b3ccd2c686deb43b893275d59b135fd49bb85c7d026f43cbbd5347bd5ff69da0906fe4b3474679cdd7ae5ae8ed5b0069e0fb72809577364dc0c32f68083185f6f83250fd1b4e527b8ea0c1d676ecb9370834c51de18f772ddc65842429124701d5d623a1715338ed8d063a2a968fc271e9b9853f3ce26848d99a5ec5016661", 0xfffffffffffffd6a}], 0x5}, 0x0) [ 836.270719] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 836.290266] CPU: 0 PID: 3649 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 836.297249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.306622] Call Trace: [ 836.309241] dump_stack+0x172/0x1f0 [ 836.312904] should_fail.cold+0xa/0x1b [ 836.316855] ? fault_create_debugfs_attr+0x1e0/0x1e0 19:02:04 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x3e) [ 836.321995] ? lock_downgrade+0x810/0x810 [ 836.323544] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 836.326165] ? ___might_sleep+0x163/0x280 [ 836.326187] __should_failslab+0x121/0x190 [ 836.326204] should_failslab+0x9/0x14 [ 836.326216] kmem_cache_alloc_trace+0x2cc/0x760 [ 836.326235] ? kasan_unpoison_shadow+0x35/0x50 [ 836.326253] ? kasan_kmalloc+0xce/0xf0 [ 836.355182] __memcg_init_list_lru_node+0x8a/0x1e0 [ 836.355202] __list_lru_init+0x402/0x720 [ 836.355221] sget_userns+0x84a/0xd30 [ 836.363686] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 836.364025] ? kill_litter_super+0x60/0x60 [ 836.383491] ? ns_test_super+0x50/0x50 [ 836.387383] ? ns_test_super+0x50/0x50 [ 836.391259] ? kill_litter_super+0x60/0x60 [ 836.395479] sget+0x10c/0x150 [ 836.398574] mount_bdev+0xff/0x3c0 [ 836.402202] ? vfat_mount+0x40/0x40 [ 836.405905] vfat_mount+0x35/0x40 [ 836.409349] mount_fs+0xa8/0x32b [ 836.412705] vfs_kern_mount.part.0+0x6f/0x410 [ 836.417194] do_mount+0x53e/0x2bc0 [ 836.420728] ? copy_mount_string+0x40/0x40 [ 836.424957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 836.430483] ? copy_mount_options+0x280/0x3a0 [ 836.434972] ksys_mount+0xdb/0x150 [ 836.438501] __x64_sys_mount+0xbe/0x150 [ 836.442464] do_syscall_64+0xfd/0x620 [ 836.446258] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 836.451443] RIP: 0033:0x45c26a [ 836.454624] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 836.473511] RSP: 002b:00007fd1a442ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 836.481208] RAX: ffffffffffffffda RBX: 00007fd1a442eb40 RCX: 000000000045c26a [ 836.488471] RDX: 00007fd1a442eae0 RSI: 00000000200000c0 RDI: 00007fd1a442eb00 [ 836.495728] RBP: 0000000000000001 R08: 00007fd1a442eb40 R09: 00007fd1a442eae0 [ 836.502995] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 836.510261] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 836.524892] protocol 88fb is buggy, dev hsr_slave_0 [ 836.530130] protocol 88fb is buggy, dev hsr_slave_1 [ 836.535488] protocol 88fb is buggy, dev hsr_slave_0 [ 836.540673] protocol 88fb is buggy, dev hsr_slave_1 [ 836.558479] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 19:02:04 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, 0x0, &(0x7f0000000140)}, 0x17f) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r0, 0x0, &(0x7f00000000c0)=""/1}, 0x18) 19:02:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@remote, @loopback, @dev={0xac, 0x14, 0x14, 0x2b}}, 0xc) 19:02:04 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x3e) 19:02:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x2) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x121400) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f00000000c0)={&(0x7f0000000080)=[0x25c, 0xfa, 0xfff, 0x1000000000000, 0x7], 0x5, 0x4, 0x1, 0x825, 0x100, 0x1, {0x5, 0x9b3, 0x80, 0x8, 0x100, 0x9b46, 0x7, 0x81, 0x6, 0x4, 0x10000, 0x3, 0xf98d, 0x20, "96d5438f4bce4a533238ea853eece8ff873bfaf11f7c5a6a8a704446fec3a1f1"}}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) dup3(r2, r0, 0x0) [ 836.764783] protocol 88fb is buggy, dev hsr_slave_0 [ 836.769902] protocol 88fb is buggy, dev hsr_slave_1 [ 836.769997] protocol 88fb is buggy, dev hsr_slave_0 [ 836.780076] protocol 88fb is buggy, dev hsr_slave_1 19:02:05 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) close(r0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 19:02:05 executing program 0 (fault-call:1 fault-nth:78): open(&(0x7f0000000080)='./file0\x00', 0x3ffd, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 19:02:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca58d5e0bcfe47bf070") getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0xffffffffffffff70, &(0x7f00000000c0)=0x2) fadvise64(r0, 0x0, 0x7, 0x3) r1 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000200)="83c1be507c06e1ec1bcb542bac938bf80df2c199eb4ed7be3492bd02fd8eeb2d6392a7e2cfb5829c8fe1e725ff0a87edbbbf52685b076aca35ad7c23dee6cc63186f"}, {&(0x7f0000000280)="c51a6c4fd99f3fb8"}, {&(0x7f00000002c0)}, {&(0x7f0000000300)="4f301df343d9f1c983d9f52effa22cacf4b8d9b4aab9e8559ef423b9770bd398036393eaa1f68b639f66deec50d1f4a68924c8e0822f62e6a910b6da590c1d4715cb498e748ca32b1b07682f79f88d4bfae793b9fbb9b1a359f6cd8730f2d6d3faac41dd4123c2e967dfaa8ba49db147e709b6cc99a42aac5df4fa3a9bbbdcade3ed332e3e02148ceeb343980e77656ca1597f931ca3a67d31896c0a0cb2ade999eeb8c6b4210ae1eb2c32c81e8335eb45f5973a776c34e7a39d9277ad3ab512bc6ccb595d7bbb8d2aa1984dc20041"}, {&(0x7f0000000400)="7bc6049b9917e12c0fd5ec0239b6495322ee6f29961c12bb8eccf8d6744591a43e70b2a3cf0c422544476741109539146c429499a322558732b55c847c211c78bad57be4f72ae2591a896c5a2d95d9123965933a95f374afa9831356ac0410c15b6989420d2782c0d87706fbde04575c26bdeb39169b2dc44ee9"}, {&(0x7f0000000480)="d510fbb968f18332ca8d14ebe28916d84d1487e96f4a20b5a412c817ec00f9e9952b478c647a1efcd1e236fa0a74fb13aff532bc767d1423f70ce0651e9af8bd29e6473693cebaced16fe617e1e206868c4cb2c7290b786037170149d437bf0fe42e63dca20afd0c0a086febd43786ce927a8184d8efd9a40b9f33119a8788571d66356f443a7494d3bd64da75fad22499c72fb8f4193a0fc28d4e983213f2e8e028953a6d49f72cd5f3da703006729bd56596cfeae16ade646d34dc86cb28ff611240f6"}, {&(0x7f0000000580)="eecfcfe8122ac34f46150d6a4f79090ea2fa28704547edff020f658e94d5f57522baf27e36963ed2a9145f172b259e36be3106698c3b907559260c1c77920dc4d95654977fe3a936f413062deefd41e34cb6a38343ea84b5c2cd06ed3c932933"}], 0x0, 0x0, 0x134}, 0x0) ioctl(r1, 0x5, &(0x7f0000000080)="1818303939dcad0f235710503e7952357329766c6b22") 19:02:05 executing program 1: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x8, 0x0) 19:02:05 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x3e) 19:02:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x5, &(0x7f0000000580)=[{&(0x7f0000000280)="c6248e3471235a66834c48718d97978f3cc2aa8a46757398f7903dd04c1d0667f0b2014b5162dfad755db657264f3a017ce095602e62a6ab8586ec58d9f89ae1b653d1c8618a9df32ba1882436b86daf0dc3514f7b9c897abaa8e9439cd7dddc2b6e08419f2a183fe285ca15f967a33a286f3978a96063d83fc3859671", 0x7d, 0x7fffffff}, {&(0x7f0000000300)="44fcfead903140d4b9a8b91355ab97464d055f53a03fd39bf2970ff8be0f4397276319488872fcfb55678df54190452c72991e23755ed5c9dc518bc11765e64f55b2f7fd81ec8592c136fafa781f3937724d15ebc1b5b379ef5a40562665ffaa7e43f54136c54c8b6b2c2807733f1a10806a51afefe1", 0x76, 0x10001}, {&(0x7f0000000380)="1ad96c559038c93337b9f052f5f9b4e3dde2512f5b8a9baa3bc5ea711f84da69dd6323995e53595dab3ce2ad502bb98148367d5bbb1094a832a050cf1de834361fc35eb1bfde26fe0972d5144df80b4a7dfad72af5176c682af8773aa5fa6f5436b451f2476a2ee85c405c891581ed2d191735eed2cc85de37529690030c004763f6e726a5d7fa37e488cbd8fe503e8c9e214349208a3446b62cb44ac5431d41afca3092ef2304ed91ea955ac28bd145de94af215de2dcd5e85071d900bb378891ddac2005b20414da10214c27f26d0e6829ceedfea9df05445dc1c87fda698a3a17e1d99a54673174", 0xe9, 0x101}, {&(0x7f0000000480)="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", 0xfd, 0x1}, {&(0x7f0000000640)="2803240caefd41b14c38601e165ff5ada28f551e93a6e42785c6ebad709bbc4543486ea579abd571bc2ab979c645245f520919674229a3a47f6811420fc7b61e6812f0ef772a38797de7aa5f09863b98bce6989856b1429cf72dbe5c9a5057c8080806cd7f05a1566ba3b42436630cf073528283d82df356654711f614d8ae0f12e0c8ea2b55bebf991f49ec68093689766288d172803945e21b868a2148a438d225756908ec5f5a9b5a254dbf3b4d39fbb965a6da8c17b51130c201bc43fb3dadeae42c9fde720b69f56e1d1ccc43a91b1c1b27f72a85503244", 0xda, 0x8}], 0x10, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) r1 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_netdev_private(r1, 0x89f7, &(0x7f0000000180)="465f79b735f6d49ead46b3de500b5015cda0079fd5f161b8053a5739a530793a3297a43a811b6f3936ca76e443f340098b98371e05bb17c8778dc244a4c0687eadea13e4eb79ec1daef047bbc83deaf256db9dc6cfba96844d651475a0722ebcb36f357fffb0aafe4d21dca3157557faa20c30c8961883e38c8fcf63aebe4ea2c2b29213369bfc88bd449a5462eb541c7172c5f5f74cb13986e68e8fb6044745fa9c3055a981da793b06ab5d19beca009185dff06a00e06e8c8469a57cc025152861b37ad3bc52982a45645e3a697a45776e382639f941f7dc95bd8f") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3f, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$void(r0, 0x5451) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000780)=""/64, &(0x7f0000000800)=0x40) prctl$PR_GET_SECUREBITS(0x1b) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, 0xfffffffffffffffe) dup3(r3, r0, 0x0) [ 837.393410] FAULT_INJECTION: forcing a failure. [ 837.393410] name failslab, interval 1, probability 0, space 0, times 0 [ 837.429763] CPU: 0 PID: 3703 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 837.436742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.446171] Call Trace: [ 837.448784] dump_stack+0x172/0x1f0 [ 837.452435] should_fail.cold+0xa/0x1b [ 837.456345] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 837.461561] ? lock_downgrade+0x810/0x810 [ 837.465733] ? ___might_sleep+0x163/0x280 [ 837.469905] __should_failslab+0x121/0x190 [ 837.474189] should_failslab+0x9/0x14 [ 837.478008] kmem_cache_alloc+0x2ae/0x700 [ 837.482173] ? lock_downgrade+0x810/0x810 [ 837.486341] ? kasan_check_write+0x14/0x20 [ 837.490595] __kernfs_new_node+0xef/0x680 [ 837.494763] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 837.499548] ? mutex_unlock+0xd/0x10 [ 837.503270] ? kernfs_activate+0x192/0x1f0 [ 837.507698] ? kernfs_add_one+0x131/0x4d0 [ 837.511871] kernfs_new_node+0x99/0x130 [ 837.515891] kernfs_create_dir_ns+0x52/0x160 [ 837.520326] internal_create_group+0x1cb/0xc30 [ 837.524929] ? internal_create_group+0x79a/0xc30 [ 837.529706] ? remove_files.isra.0+0x190/0x190 [ 837.534304] ? remove_files.isra.0+0x190/0x190 [ 837.538905] ? kernfs_put+0x3c2/0x5d0 [ 837.542727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 837.548456] ? kernfs_create_link+0x1d2/0x250 [ 837.552986] sysfs_create_group+0x20/0x30 [ 837.557164] dpm_sysfs_add+0x26/0x210 [ 837.560985] device_add+0xa47/0x1760 [ 837.564899] ? get_device_parent.isra.0+0x570/0x570 [ 837.570028] ? kfree+0x1f7/0x220 [ 837.573413] ? kfree_const+0x5e/0x70 [ 837.577169] device_create_groups_vargs+0x1fa/0x270 [ 837.582234] device_create_vargs+0x45/0x60 [ 837.586496] bdi_register_va.part.0+0x38/0x740 [ 837.591191] bdi_register+0x12a/0x140 [ 837.595012] ? bdi_register_va+0x80/0x80 [ 837.599101] ? vsnprintf+0x32a/0x19a0 [ 837.602961] bdi_register_owner+0x61/0x110 [ 837.607424] __device_add_disk+0xcef/0x10b0 [ 837.611770] ? blk_alloc_devt+0x2e0/0x2e0 [ 837.615937] ? sprintf+0xc0/0x100 [ 837.619413] ? __init_waitqueue_head+0x36/0x90 [ 837.624024] ? pm_runtime_init+0x347/0x400 [ 837.628291] ? __lockdep_init_map+0x10c/0x5b0 [ 837.632806] ? device_initialize+0x1a1/0x440 [ 837.637235] device_add_disk+0x23/0x30 [ 837.641143] loop_add+0x650/0x8d0 19:02:05 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x3e) [ 837.644618] loop_probe+0x161/0x1a0 [ 837.648264] ? loop_control_ioctl+0x360/0x360 [ 837.652874] ? find_held_lock+0x35/0x130 [ 837.656969] kobj_lookup+0x260/0x460 [ 837.660701] ? loop_control_ioctl+0x360/0x360 [ 837.665219] get_gendisk+0x4d/0x380 [ 837.668950] __blkdev_get+0x457/0x1660 [ 837.672865] ? blkdev_get_block+0xc0/0xc0 [ 837.677029] ? bd_acquire+0x14e/0x2c0 [ 837.680861] blkdev_get+0xc4/0x990 [ 837.684514] ? bd_may_claim+0xd0/0xd0 [ 837.688333] ? kasan_check_read+0x11/0x20 [ 837.692497] ? do_raw_spin_unlock+0x57/0x270 [ 837.697024] ? _raw_spin_unlock+0x2d/0x50 [ 837.701184] blkdev_open+0x205/0x290 [ 837.704896] do_dentry_open+0x4c3/0x1200 [ 837.708966] ? kasan_check_read+0x11/0x20 [ 837.713113] ? bd_acquire+0x2c0/0x2c0 [ 837.717272] ? chown_common+0x5c0/0x5c0 [ 837.721240] ? inode_permission+0xb4/0x560 [ 837.725470] vfs_open+0xa0/0xd0 [ 837.728742] path_openat+0x10d7/0x4690 [ 837.732633] ? __lock_acquire+0x6eb/0x48f0 [ 837.737206] ? getname+0x1a/0x20 [ 837.740563] ? do_sys_open+0x2c9/0x550 [ 837.744538] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 837.749296] ? __alloc_fd+0x44d/0x560 [ 837.753103] do_filp_open+0x1a1/0x280 [ 837.756986] ? may_open_dev+0x100/0x100 [ 837.760976] ? kasan_check_read+0x11/0x20 [ 837.765134] ? do_raw_spin_unlock+0x57/0x270 [ 837.769563] ? _raw_spin_unlock+0x2d/0x50 [ 837.773703] ? __alloc_fd+0x44d/0x560 [ 837.777518] do_sys_open+0x3fe/0x550 [ 837.781238] ? filp_open+0x80/0x80 [ 837.784789] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 837.789555] ? do_syscall_64+0x26/0x620 [ 837.793535] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 837.798899] ? do_syscall_64+0x26/0x620 [ 837.802876] __x64_sys_open+0x7e/0xc0 [ 837.806665] do_syscall_64+0xfd/0x620 [ 837.810472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 837.815646] RIP: 0033:0x413701 [ 837.818827] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 19:02:05 executing program 1: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed008d46", 0xce) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x0) 19:02:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = accept(r0, &(0x7f0000000100)=@xdp, &(0x7f0000000000)=0x80) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000080)) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f00000002c0)=0x1) accept4$nfc_llcp(r1, &(0x7f0000000200), &(0x7f0000000180)=0x60, 0x800) r3 = socket$inet(0x10, 0x3, 0x1000000000000006) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 837.838257] RSP: 002b:00007fd1a442ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 837.845965] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413701 [ 837.853223] RDX: 00007fd1a442eb0a RSI: 0000000000000002 RDI: 00007fd1a442eb00 [ 837.860520] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 837.867780] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 837.875039] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 837.897855] WARNING: CPU: 1 PID: 3703 at block/genhd.c:709 __device_add_disk+0xe63/0x10b0 [ 837.906221] Kernel panic - not syncing: panic_on_warn set ... [ 837.906221] [ 837.913610] CPU: 1 PID: 3703 Comm: syz-executor.0 Not tainted 4.19.59 #32 [ 837.920525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.929882] Call Trace: [ 837.932462] dump_stack+0x172/0x1f0 [ 837.936105] panic+0x263/0x507 [ 837.939306] ? __warn_printk+0xf3/0xf3 [ 837.943185] ? __device_add_disk+0xe63/0x10b0 [ 837.947681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 837.953231] ? __warn.cold+0x5/0x4a [ 837.956853] ? __device_add_disk+0xe63/0x10b0 [ 837.961353] __warn.cold+0x20/0x4a [ 837.964885] ? __device_add_disk+0xe63/0x10b0 [ 837.969376] report_bug+0x263/0x2b0 [ 837.972994] do_error_trap+0x204/0x360 [ 837.976881] ? math_error+0x340/0x340 [ 837.980674] ? device_create_vargs+0x45/0x60 [ 837.985078] ? error_entry+0x76/0xd0 [ 837.988783] ? trace_hardirqs_off_caller+0x65/0x220 [ 837.993816] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 837.998660] do_invalid_op+0x1b/0x20 [ 838.002366] invalid_op+0x14/0x20 [ 838.005804] RIP: 0010:__device_add_disk+0xe63/0x10b0 [ 838.010904] Code: ff ff 4c 89 e7 e8 4d 31 8c fe e9 dc f2 ff ff e8 c3 31 8c fe e9 b7 f5 ff ff e8 19 c0 55 fe 0f 0b e9 92 fb ff ff e8 0d c0 55 fe <0f> 0b e9 9a fe ff ff e8 f1 92 29 fe 4c 89 f7 e8 59 31 8c fe e9 e1 [ 838.029811] RSP: 0018:ffff88805c897480 EFLAGS: 00010246 [ 838.037900] RAX: 0000000000040000 RBX: ffff88805c897568 RCX: ffffc90005e77000 [ 838.047554] RDX: 0000000000040000 RSI: ffffffff83155613 RDI: 0000000000000005 [ 838.054838] RBP: ffff88805c897590 R08: ffff888063c48080 R09: ffff888063c48920 [ 838.062198] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888064bf8a00 [ 838.069467] R13: ffff888064bf8a90 R14: 00000000fffffff4 R15: 0000000000000000 [ 838.076739] ? __device_add_disk+0xe63/0x10b0 [ 838.081225] ? blk_alloc_devt+0x2e0/0x2e0 [ 838.085381] ? sprintf+0xc0/0x100 [ 838.088835] ? __init_waitqueue_head+0x36/0x90 [ 838.093494] ? pm_runtime_init+0x347/0x400 [ 838.097723] ? __lockdep_init_map+0x10c/0x5b0 [ 838.102291] ? device_initialize+0x1a1/0x440 [ 838.106694] device_add_disk+0x23/0x30 [ 838.110971] loop_add+0x650/0x8d0 [ 838.114412] loop_probe+0x161/0x1a0 [ 838.118051] ? loop_control_ioctl+0x360/0x360 [ 838.122547] ? find_held_lock+0x35/0x130 [ 838.126616] kobj_lookup+0x260/0x460 [ 838.130337] ? loop_control_ioctl+0x360/0x360 [ 838.134836] get_gendisk+0x4d/0x380 [ 838.138476] __blkdev_get+0x457/0x1660 [ 838.142368] ? blkdev_get_block+0xc0/0xc0 [ 838.146506] ? bd_acquire+0x14e/0x2c0 [ 838.150308] blkdev_get+0xc4/0x990 [ 838.153969] ? bd_may_claim+0xd0/0xd0 [ 838.157765] ? kasan_check_read+0x11/0x20 [ 838.161903] ? do_raw_spin_unlock+0x57/0x270 [ 838.166327] ? _raw_spin_unlock+0x2d/0x50 [ 838.170471] blkdev_open+0x205/0x290 [ 838.174289] do_dentry_open+0x4c3/0x1200 [ 838.178338] ? kasan_check_read+0x11/0x20 [ 838.182489] ? bd_acquire+0x2c0/0x2c0 [ 838.186341] ? chown_common+0x5c0/0x5c0 [ 838.190328] ? inode_permission+0xb4/0x560 [ 838.194576] vfs_open+0xa0/0xd0 [ 838.197846] path_openat+0x10d7/0x4690 [ 838.201727] ? __lock_acquire+0x6eb/0x48f0 [ 838.205950] ? getname+0x1a/0x20 [ 838.209322] ? do_sys_open+0x2c9/0x550 [ 838.213218] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 838.217879] ? __alloc_fd+0x44d/0x560 [ 838.221709] do_filp_open+0x1a1/0x280 [ 838.225529] ? may_open_dev+0x100/0x100 [ 838.229535] ? kasan_check_read+0x11/0x20 [ 838.233703] ? do_raw_spin_unlock+0x57/0x270 [ 838.238126] ? _raw_spin_unlock+0x2d/0x50 [ 838.242275] ? __alloc_fd+0x44d/0x560 [ 838.246093] do_sys_open+0x3fe/0x550 [ 838.249817] ? filp_open+0x80/0x80 [ 838.253367] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 838.258126] ? do_syscall_64+0x26/0x620 [ 838.262101] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.267475] ? do_syscall_64+0x26/0x620 [ 838.271467] __x64_sys_open+0x7e/0xc0 [ 838.275275] do_syscall_64+0xfd/0x620 [ 838.279094] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.284287] RIP: 0033:0x413701 [ 838.287490] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 838.306391] RSP: 002b:00007fd1a442ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 838.314173] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413701 [ 838.321449] RDX: 00007fd1a442eb0a RSI: 0000000000000002 RDI: 00007fd1a442eb00 [ 838.328731] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 838.336006] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 838.343404] R13: 00000000004c8910 R14: 00000000004df598 R15: 0000000000000004 [ 838.352140] Kernel Offset: disabled [ 838.355908] Rebooting in 86400 seconds..