R_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1114.250300] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1114.250300] [ 1114.253941] capability: warning: `syz-executor.5' uses deprecated v2 capabilities in a way that may be insecure 16:59:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_opts(r1, 0x0, 0x6, &(0x7f0000000280)="e1", 0x1) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x1d6902b07fab9dc5, 0x100e}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r5, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r6, r5}}, 0x18) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) 16:59:01 executing program 5: rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffe}, 0x0, 0x8) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)=0x8) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200, 0x0) write$binfmt_elf64(r0, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0xfffffffffffffffa, 0x3, 0x20, 0x8, 0x3, 0x6, 0x7ff, 0x2a0, 0x40, 0x23b, 0x16, 0x1000, 0x38, 0x2, 0x5, 0x8001, 0x7}, [{0x6474e553, 0x6, 0xffffffff80000001, 0x7ff, 0x81, 0x903, 0x7, 0x6}], "88191c7134a585acb20e2124d8535a09783e47391afc12195dff0f50e1df55b7d58ed6716dcbbeffcdf64147e32388e809a569323d4ce6c10d92714ee509dd24e6f584de3ab421c655baf4ce5d1bfb0e1acd4c36903be0a32b398f53994b5ef5c4e401280fc87a129c649b5dc54c6e6a0e2a939af10e104cd4763a327d527f74291f21c1c30704e6b790fcbfe57109b4aaf232357ceed9fb2bc9b63f3396aade61eedb84e3", [[], [], []]}, 0x41d) close(0xffffffffffffffff) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000080)) write(0xffffffffffffffff, &(0x7f0000000400)="88", 0x1) [ 1114.374451] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1114.374451] [ 1114.403809] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009207, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:01 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001ba, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:01 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400100, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) rt_sigprocmask(0x2, &(0x7f0000032ff8)={0xffffffbffffffffe}, 0x0, 0x8) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) 16:59:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000040)={0x10000, 0x1000, 0x0, 0x1363, 0x7f}) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1114.575749] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1114.600868] protocol 88fb is buggy, dev hsr_slave_0 [ 1114.605949] protocol 88fb is buggy, dev hsr_slave_1 16:59:01 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009208, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() sched_getscheduler(r1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:01 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, &(0x7f0000000100)=0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x800}, 0x8) 16:59:01 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001bb, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1114.658080] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1114.658080] [ 1114.680876] protocol 88fb is buggy, dev hsr_slave_0 [ 1114.686006] protocol 88fb is buggy, dev hsr_slave_1 [ 1114.691162] protocol 88fb is buggy, dev hsr_slave_0 [ 1114.696239] protocol 88fb is buggy, dev hsr_slave_1 16:59:01 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000080)={0x8, @remote}) dup3(r0, r0, 0x80000) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x10}) close(r0) ioctl$VT_ACTIVATE(r0, 0x5606, 0xc2) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000440)=""/4096, &(0x7f0000000000)=0x1000) write(r1, &(0x7f0000000400)="88", 0x1) 16:59:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009300, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1114.801186] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1114.801186] [ 1114.830676] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xd00, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x40, 0x400) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000180)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r4 = socket(0x11, 0x804, 0x6) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10100400}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xe4, r5, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7ff}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xffff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7ff}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x79}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x10000}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x10001}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4040}, 0x0) 16:59:01 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001bc, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:01 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x40840, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000000)={{0x3, @name="dd85a2a6ac2d6d4610f55e95111f716bbfe7961c89df6144e95a8db0ca29e2a2"}, 0x8, 0x1, 0x8}) write(r0, &(0x7f00000001c0)="88", 0x1) openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) r2 = getpgrp(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000200)={{0x3, 0x5, 0x3, 0xcab9, 'syz1\x00', 0x23bc}, 0x6, 0x20000040, 0x2, r2, 0x7, 0x100000001, 'syz1\x00', &(0x7f0000000100)=['/dev/bus/usb/00#/00#\x00', 'keyring\x00', '!proclo$\x00', '\x00', '/dev/bus/usb/00#/00#\x00', '&vboxnet0[ppp1keyring\x94]posix_acl_access{systemem1\x00', ',-\x00'], 0x71, [], [0x200, 0x100, 0x9]}) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x9, 0x2) 16:59:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009301, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1114.899640] Unknown ioctl 35090 [ 1114.919563] Unknown ioctl 35090 [ 1115.037252] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1115.046832] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1115.046832] 16:59:01 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xa000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:01 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001bd, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:01 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x402, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000040)={0x6, 0x8, 0x10001, 0x6, 0x9}) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00042abd7000ffdbdf25010000000803000000080002000a0000000400050008000e0001000000080002000a0000000800040001000000080004000100af2412aa0500080001004e200000040005000000005fdeeb2e3ad6621b860988253a6ad351c44dcf19e62d533ff12da6e438176758fcae13cb7297b33028b9"], 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:01 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0x301) 16:59:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009302, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:01 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001be, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r0) accept4$netrom(r1, &(0x7f0000000100)={{0x3, @bcast}, [@remote, @default, @default, @bcast, @remote, @netrom, @bcast, @bcast]}, &(0x7f0000000080)=0x48, 0x80000) write(r0, &(0x7f0000000040)="ea7613bd642726350049593f0027", 0x25c) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'team_slave_1\x00', 0xb000}) [ 1115.201366] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 16:59:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xf1a, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009303, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:02 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001bf, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:02 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x400002, 0x0) bind$unix(r0, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000000)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x20}) [ 1115.289134] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r0) write(r0, &(0x7f0000000400)="88", 0x1) [ 1115.415592] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1115.415592] [ 1115.429061] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:02 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009304, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:02 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001c0, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x3ff, 0x10000, 0x8208, 0x2, 0x8000, 0x0, 0x10000, 0x4, r2}, &(0x7f0000000180)=0x20) close(r0) socket$nl_route(0x10, 0x3, 0x0) write(r1, &(0x7f0000000400)="88", 0x1) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x6, 0x80800) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000000)={0x422}) 16:59:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:02 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000000)="46f7b5bcf50e9a270487146d37f51771c631c9a0bbcb43357ed63bc70c288ac760d1989d36da2c9d34b4f416b6c81e0ae87ee5c23dea7cb9ab9e285bb4be462fe202053a8018a8eba67767101aeac10631611e1687fcfaa27dc95a2cc871620cbbe0c13076295644265b49d77de2bba0c6f0abef0f47b21662c57d47c3c17319d37d2d19a2") [ 1115.560668] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1115.560668] 16:59:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009305, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x1002, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:02 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001c1, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) fgetxattr(r1, &(0x7f0000000000)=@known='com.apple.FinderInfo\x00', &(0x7f0000000040)=""/99, 0x63) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) [ 1115.682564] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:02 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x10000) pread64(r0, &(0x7f0000000280)=""/144, 0x90, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$dspn(&(0x7f0000000500)='/dev/dsp#\x00', 0xfff, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000540)={0xbd11, 0x6, 0x7fff, @dev={[], 0x2a}, 'erspan0\x00'}) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000440)={0x0, 0xc54, 0x3, [], &(0x7f0000000400)=0x7cd5}) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000180)=""/230, &(0x7f0000000040)=0xe6) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f0000000340)={0x55, 0x81, 0x401, 'queue1\x00', 0x400}) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000600)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r4, 0xc0086421, &(0x7f00000004c0)={r7, 0x1}) ioctl$KVM_SET_VCPU_EVENTS(r6, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009306, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1115.829838] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1115.875703] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1115.875703] 16:59:02 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001c2, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0xfffffffffffffffc, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x16b) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) 16:59:02 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1a0f0000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup2(r0, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x5, @remote, 0x5}, {0xa, 0x4e20, 0x0, @rand_addr="474f035a3f12d5d10e748453ac025335", 0x5}, r5, 0x8}}, 0x48) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r6, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009307, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) 16:59:02 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001c3, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1116.001379] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1116.001379] 16:59:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x400500, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x8001}) 16:59:02 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001c4, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009308, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:03 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x589083, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000100)=""/230) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r1) write(r2, &(0x7f0000000400)="88", 0x1) 16:59:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x111400, 0x0) getsockopt$inet_tcp_buf(r4, 0x6, 0x0, &(0x7f0000000180)=""/185, &(0x7f0000000040)=0xb9) ioctl$KVM_ASSIGN_PCI_DEVICE(r4, 0x8040ae69, &(0x7f0000000080)={0x0, 0x5, 0x4, 0x6, 0xfffffffffffffff9}) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:03 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1f000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x5}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x10000, 0x1, [0xff]}, 0xa) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) 16:59:03 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001c5, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009400, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1116.316849] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1116.316849] 16:59:03 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001c6, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8000, 0x0) ioctl$VT_DISALLOCATE(r4, 0x5608) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1116.413267] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1116.413267] [ 1116.441898] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x1800, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x83cc}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000080)={r2, 0x1, 0x3}, 0x8) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) connect$ax25(r0, &(0x7f0000000100)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) 16:59:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009401, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:03 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001c7, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) bind$rds(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) 16:59:03 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009402, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x3, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) ioctl$FICLONE(r0, 0x40049409, r1) r5 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x101000) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x111040, 0x0) connect$rds(r5, &(0x7f0000000040)={0x2, 0x4e24, @broadcast}, 0x10) 16:59:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000000)) [ 1116.701400] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:03 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001c8, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1116.801728] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:03 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001c9, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:03 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20100000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1116.909440] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1116.909440] 16:59:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x1a0f, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:03 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) 16:59:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x3, 0x2) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = getpgrp(0x0) syz_open_procfs(r2, &(0x7f0000000500)='stat\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000003c0)={0x0, {0x2, 0x4e20, @remote}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, {0x2, 0x4e22, @broadcast}, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x7ff, 0x7ff}) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x288000) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="04002cbd7000fedbdf2507000000080006000180000028000200140001004e2100007be3550374a22cba30000000080004000200000014000100a37fe776f65185caf1ce0439ef47a8a3d9bd724e1f5400000000000000000000000000000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4}, 0xe380ced34cb7ff5e) getsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000040)=0x6, &(0x7f0000000080)=0x2) ioctl$PPPIOCATTCHAN(r5, 0x40047438, &(0x7f0000000180)=0x3) r7 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r7, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009403, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:03 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001ca, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:04 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x23000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:04 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x20000000000003, &(0x7f0000032ff8)={0x2}, 0x0, 0xffffffffffffffbe) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) 16:59:04 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001cb, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:04 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000000)={0xffff, 0x1, {0x2, 0x0, 0x5b93, 0x1, 0x7}}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x48000, 0x0) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f0000000100)) 16:59:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009404, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1117.263872] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1117.263872] [ 1117.276113] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x101, 0x1) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000040)={0x7fffffff, 0x100000001, 0x101, 0x1, 0x1}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000180)={0x10001, 0x97b4, 0x3, 0x100000000, 0x800000000, 0x1}) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) getpeername$llc(r4, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000280)=0x10) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000200)=0x1) 16:59:04 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001cc, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x1e02, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:04 executing program 5: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) flock(r0, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r1) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000080)={0x4, @remote}) write(r2, &(0x7f0000000040)="88", 0x1) [ 1117.411591] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:04 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001cd, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:04 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3f000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009405, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1117.516452] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1117.516452] 16:59:04 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x8) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000100)={'raw\x00', 0xb9, "83fc0361c141fea0e6fce326d8dc481d8ecbc75b8d7f1542c771a73b44fe8922d76104cc839685dba606c58e81471980da7b791309bf3ffa4290e92f5f71aad0de8324791c5e6a430372414dab62d6635fa33caa7ebea14909f8a5d6f041f0418535124cb546f7c8d0aee1fc67331958242d9dd5559de4451efeb17a8a10aee10ea35eb426ce1338e363c085879007c2eaabf27527f3575d2fb41568f4ddde7f10aa874b77d0299cd9d244dfaa23fe83f3b2720283ccb6fb22"}, &(0x7f0000000000)=0xdd) write(r1, &(0x7f0000000400)="88", 0x1) 16:59:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009406, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:04 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001ce, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400204) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1117.649775] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1117.687280] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1117.687280] 16:59:04 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r2, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e20, @rand_addr=0x24}, {0x2, 0x4e21, @empty}, 0x20c, 0x0, 0x0, 0x0, 0x500000000000, 0x0, 0x2, 0x1, 0xffffffffffffff01}) close(r0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000100)={0x7, 0x2, 0x50b, 0x3, &(0x7f0000000000)=[{}, {}]}) write(r1, &(0x7f0000000400)="88", 0x1) 16:59:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009407, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:04 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001cf, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1117.771330] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 16:59:04 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:04 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) 16:59:04 executing program 1: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) fsetxattr(r1, &(0x7f0000000180)=@random={'trusted.', ':@[[\x00'}, &(0x7f00000001c0)='[}posix_acl_accessGPLvboxnet1%-\x00', 0x20, 0x1) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) write$P9_RMKNOD(r1, &(0x7f0000000080)={0x14, 0x13, 0x1, {0x21, 0x2, 0x2}}, 0x14) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) modify_ldt$read(0x0, &(0x7f0000000000)=""/78, 0x4e) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:04 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001d0, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009408, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1117.970288] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1117.970288] [ 1117.977411] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:04 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001d1, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:04 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r0) write(r0, &(0x7f0000000400)="88", 0x1) 16:59:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getpeername(r0, &(0x7f0000000580)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000600)=0x80) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x9, 0x6, 0xce, 0x8}, {0xa923, 0x401, 0x7fff, 0x1}, {0x5, 0xffffffff, 0x3, 0xf17}]}, 0x10) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x8040180}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="000026bd7000fbdbdf25120000000000009c7600000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x810}, 0x20000000) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:04 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x48000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1118.144302] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1118.144302] 16:59:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_attr(r0, &(0x7f0000000140)='system_u:object_r:cron_spool_t:s0\x00', 0x22) r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r2) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000180)={0xc2a3}) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f00000001c0)="fea1a8d2f728ec9f6353cd524285c641c4a5a47a363b8771812dc2be8baf14ddf0ff5288cbe6f425568c469728d11f767c918dbbe7d0759ca3d9cc7505554822983eb9ac25f799509f18f74ce704d1e6b6eed3ffd4c4f364d39590a07f1303fcbf19c4da8e5ec85e3f5dff32ad021f1caf7f2d718394896071b540d50381039ca7a6a336765a3098cccd518ea91c741cc479fead0a87ee79ff8bb1fb12a32d6893277f232f7743df04ebb7e9fc0d6c9470706a41a2287f56c09cde20bc161b01137ce302299a117a8cd513485fff13cc5c32d7ffd0196099ef217051dd1cfa77421a15f7f63b3f3da1dc87") write(r1, &(0x7f0000000000)="888bc72c66885b1cc95e5361fb95082755adcf7cc585ef7fc194a667a2b37b92b229611d0173f153f6015562b3b6211f039e1cd81cba28ece5f8bc2854dfd1496405f05878b82b9446bf0a2fbd4c741b6170074d88a300aee31f5688a7f1bcec4a82b6be2af2da834d61e4e0153d2783f6e7b714e0bf85eab0d50b647369bb3b9a655ff341309e843c43f8969d2662f70581d3cc", 0x94) 16:59:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009500, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:05 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001d2, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 16:59:05 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001d3, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1118.275760] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009501, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) io_setup(0xe000000000000000, &(0x7f0000000340)=0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)) io_submit(r2, 0x2, &(0x7f00000002c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x5, r1, &(0x7f0000000140)="90f1", 0x2, 0x0, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x3, 0x4, r1, &(0x7f00000001c0)="0bd7f11991993b1487e27aa70b4c333e28b7555f3692c09f1a3c91a70ca1ac4592dcf39f0a023acc48d7aae4dce6b6cc9f5ee8b3d3b0d6de2bd7b16b246b2925f61cc56a9f98f7f64bd0f0af76a260cb0bfbdfcdf58c075dc5594e8896c59bfb4c316bcbe9e3731150ec3ee0e48bccb1aa7607f9c04bc23f139fc3f2cf682e84df593c6d665861aa43e0290a84b6cee7872e40", 0x93, 0x1, 0x0, 0x3, r0}]) [ 1118.402260] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1118.402260] [ 1118.413565] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$describe(0x6, r4, &(0x7f0000000180)=""/176, 0xb0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) rt_sigprocmask(0x0, &(0x7f00000002c0)={0xfffffffffffffffe}, 0x0, 0x8) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0xbec5, 0x4) close(r0) clock_gettime(0x0, &(0x7f0000000180)) 16:59:05 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4c000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:05 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001d4, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1118.571185] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1118.571185] 16:59:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) prctl$PR_SET_TSC(0x1a, 0x2) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) 16:59:05 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001d5, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009502, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) pselect6(0x40, &(0x7f0000000000)={0x7, 0x4, 0x9, 0x40, 0x0, 0x80000000, 0x101, 0x40}, &(0x7f0000000040)={0xc9, 0x3, 0x4, 0x9, 0x8000, 0x6, 0x49, 0x4}, &(0x7f0000000080)={0x3, 0x1, 0x4, 0x4, 0x4, 0x1000, 0x400, 0x800}, &(0x7f0000000180)={0x77359400}, &(0x7f0000000200)={&(0x7f00000001c0)={0x8000}, 0x8}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1118.693968] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000080)={0x3}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x4000, 0x0) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x118, 0x2563, 0x1f, 0x7, 0x80000001, @remote}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:05 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001d6, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009503, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x200) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4000, 0x0) write$P9_RMKNOD(r4, &(0x7f0000000040)={0x14, 0x13, 0x2, {0x80, 0x1, 0x6}}, 0x14) 16:59:05 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001d7, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1118.840093] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1118.840093] [ 1118.850921] net_ratelimit: 16 callbacks suppressed [ 1118.850928] protocol 88fb is buggy, dev hsr_slave_0 [ 1118.850986] protocol 88fb is buggy, dev hsr_slave_1 [ 1118.851093] protocol 88fb is buggy, dev hsr_slave_0 [ 1118.851139] protocol 88fb is buggy, dev hsr_slave_1 [ 1118.862142] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:05 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x60000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x1, 0x0) getsockname$inet6(r4, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000080)={r5, 0x20004000000000, 0x2}, 0x8) 16:59:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x2402, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2db, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000005, 0x0) syz_open_procfs(0x0, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, 0x0) delete_module(0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000400), &(0x7f0000000440)=0x4) poll(0x0, 0x0, 0x0) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) 16:59:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009504, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:06 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001d8, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1119.125348] sctp: [Deprecated]: syz-executor.5 (pid 4985) Use of int in maxseg socket option. [ 1119.125348] Use struct sctp_assoc_value instead [ 1119.148067] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1119.148067] 16:59:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2db, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000005, 0x0) syz_open_procfs(0x0, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, 0x0) delete_module(0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000400), &(0x7f0000000440)=0x4) poll(0x0, 0x0, 0x0) close(r0) write(r1, &(0x7f0000000400)="88", 0x1) 16:59:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009505, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:06 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001d9, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1119.182768] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x200000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000280)={0x6, 0x0, [{0x200, 0x3, 0x0, 0x0, @msi={0x3, 0x20, 0x7f}}, {0x8, 0x7, 0x0, 0x0, @sint={0x8, 0x80}}, {0x0, 0x7, 0x0, 0x0, @irqchip={0x4, 0x2}}, {0x24000000000, 0x3, 0x0, 0x0, @adapter={0x9b, 0x0, 0x80000001, 0xb7, 0x10000000000}}, {0x91, 0x1, 0x0, 0x0, @sint={0xbe3, 0x9}}, {0x100000000, 0x1, 0x0, 0x0, @sint={0x100000001, 0xfff}}]}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000180)={0xb1b, 0x0, 0x1b, "5ce1d02fa55b34b73cf353bd6f11e5b783ed657ddd107810eb05624709a15b921994b839855d11b62bc9fd44a7235633612ff06f9fad62b1b1426cd9", 0xd, "a786e61955dfe2d20ef7a595fa0e3232fa3a49ea170ebfecbe9d9bae0b27eca4dc2d0b0f529468b06887329d5b65fc25cd0d559211447fc6f16694fe", 0x80}) fchmodat(r5, &(0x7f0000000040)='./file0\x00', 0x100) ioctl$BLKFLSBUF(r5, 0x1261, &(0x7f0000000080)=0x9a5) 16:59:06 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001da, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x2502, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) [ 1119.283861] sctp: [Deprecated]: syz-executor.5 (pid 5001) Use of int in maxseg socket option. [ 1119.283861] Use struct sctp_assoc_value instead [ 1119.319600] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:06 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x68000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:06 executing program 5 (fault-call:2 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:06 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001db, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:06 executing program 1: socketpair$unix(0x1, 0x8000000000002, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000140)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x18, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1119.463121] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1119.463121] [ 1119.466344] FAULT_INJECTION: forcing a failure. [ 1119.466344] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.511560] CPU: 1 PID: 5024 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1119.518792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1119.528153] Call Trace: [ 1119.530752] dump_stack+0x172/0x1f0 [ 1119.534392] should_fail.cold+0xa/0x1b [ 1119.538285] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1119.543409] ? lock_downgrade+0x810/0x810 [ 1119.547569] ? ___might_sleep+0x163/0x280 [ 1119.551722] __should_failslab+0x121/0x190 [ 1119.555960] should_failslab+0x9/0x14 [ 1119.559767] __kmalloc+0x2dc/0x740 [ 1119.563310] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1119.568870] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1119.574426] ? strnlen_user+0x1f0/0x280 [ 1119.578399] ? __x64_sys_memfd_create+0x13c/0x470 [ 1119.583241] __x64_sys_memfd_create+0x13c/0x470 [ 1119.587900] ? memfd_fcntl+0x1550/0x1550 [ 1119.591950] ? do_syscall_64+0x26/0x610 [ 1119.595914] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1119.600484] ? trace_hardirqs_on+0x67/0x230 [ 1119.604798] do_syscall_64+0x103/0x610 [ 1119.608707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1119.613880] RIP: 0033:0x457e29 [ 1119.617057] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1119.635943] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1119.643638] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1119.650903] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 16:59:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009506, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1119.658158] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1119.665411] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f619bb686d4 [ 1119.672666] R13: 00000000004c67eb R14: 00000000004dbdb0 R15: 0000000000000005 16:59:06 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001dc, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1119.708536] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1119.708536] [ 1119.720458] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:06 executing program 5 (fault-call:2 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009507, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80100, 0x0) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000180)={0x6, 0x1, @stop_pts=0x3ff}) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000080)=0xffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x500, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:06 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x6c000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x2d02, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) [ 1119.877130] FAULT_INJECTION: forcing a failure. [ 1119.877130] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.940988] CPU: 1 PID: 5042 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1119.948222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1119.957575] Call Trace: [ 1119.960169] dump_stack+0x172/0x1f0 [ 1119.963802] should_fail.cold+0xa/0x1b [ 1119.967701] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1119.972806] ? lock_downgrade+0x810/0x810 [ 1119.976960] ? ___might_sleep+0x163/0x280 [ 1119.981114] __should_failslab+0x121/0x190 [ 1119.985362] should_failslab+0x9/0x14 [ 1119.989426] kmem_cache_alloc+0x2be/0x710 [ 1119.993578] ? __alloc_fd+0x430/0x530 [ 1119.997391] ? shmem_destroy_callback+0xc0/0xc0 [ 1120.002064] shmem_alloc_inode+0x1c/0x50 [ 1120.006126] alloc_inode+0x66/0x190 [ 1120.009756] new_inode_pseudo+0x19/0xf0 [ 1120.013736] new_inode+0x1f/0x40 [ 1120.017113] shmem_get_inode+0x84/0x780 [ 1120.021097] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1120.025950] shmem_file_setup+0x66/0x90 [ 1120.029932] __x64_sys_memfd_create+0x2a2/0x470 [ 1120.034606] ? memfd_fcntl+0x1550/0x1550 [ 1120.038669] ? do_syscall_64+0x26/0x610 [ 1120.042649] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1120.047230] ? trace_hardirqs_on+0x67/0x230 [ 1120.051556] do_syscall_64+0x103/0x610 [ 1120.055448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1120.060728] RIP: 0033:0x457e29 [ 1120.063928] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1120.082824] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1120.090529] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1120.097800] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1120.105068] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1120.112344] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f619bb686d4 [ 1120.119614] R13: 00000000004c67eb R14: 00000000004dbdb0 R15: 0000000000000005 [ 1120.130924] protocol 88fb is buggy, dev hsr_slave_0 [ 1120.136048] protocol 88fb is buggy, dev hsr_slave_1 16:59:07 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001dd, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009508, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1120.177555] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1120.209337] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1120.209337] 16:59:07 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001de, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:07 executing program 5 (fault-call:2 fault-nth:2): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1120.280865] protocol 88fb is buggy, dev hsr_slave_0 [ 1120.286019] protocol 88fb is buggy, dev hsr_slave_1 16:59:07 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x74000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009600, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1120.375301] FAULT_INJECTION: forcing a failure. [ 1120.375301] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.396727] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1120.396727] [ 1120.411606] CPU: 0 PID: 5074 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1120.418820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.428172] Call Trace: [ 1120.430761] dump_stack+0x172/0x1f0 [ 1120.434393] should_fail.cold+0xa/0x1b [ 1120.438272] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1120.443367] ? lock_downgrade+0x810/0x810 [ 1120.447507] ? ___might_sleep+0x163/0x280 [ 1120.451654] __should_failslab+0x121/0x190 [ 1120.455882] should_failslab+0x9/0x14 [ 1120.459668] kmem_cache_alloc+0x2be/0x710 [ 1120.463802] ? current_time+0x6b/0x140 [ 1120.467674] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1120.472849] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1120.477417] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1120.482939] ? timespec64_trunc+0xf0/0x180 [ 1120.487160] __d_alloc+0x2e/0x8c0 [ 1120.490612] d_alloc_pseudo+0x1e/0x30 [ 1120.494403] alloc_file_pseudo+0xe2/0x280 [ 1120.498540] ? alloc_file+0x4d0/0x4d0 [ 1120.502335] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1120.507862] ? kasan_check_write+0x14/0x20 [ 1120.512088] __shmem_file_setup.part.0+0x108/0x2b0 [ 1120.517007] shmem_file_setup+0x66/0x90 [ 1120.520970] __x64_sys_memfd_create+0x2a2/0x470 [ 1120.525629] ? memfd_fcntl+0x1550/0x1550 [ 1120.529679] ? do_syscall_64+0x26/0x610 [ 1120.533643] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1120.538214] ? trace_hardirqs_on+0x67/0x230 [ 1120.542527] do_syscall_64+0x103/0x610 [ 1120.546412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1120.551589] RIP: 0033:0x457e29 [ 1120.554768] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1120.573654] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1120.581349] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1120.589013] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1120.596280] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1120.603557] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f619bb686d4 [ 1120.610814] R13: 00000000004c67eb R14: 00000000004dbdb0 R15: 0000000000000005 16:59:07 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001df, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009601, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:07 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001e0, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:07 executing program 5 (fault-call:2 fault-nth:3): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)={r0}) getsockopt$rose(r3, 0x104, 0x7, &(0x7f0000000040), &(0x7f0000000200)=0x4) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1120.738835] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:07 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001e1, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009602, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1120.840885] protocol 88fb is buggy, dev hsr_slave_0 [ 1120.846056] protocol 88fb is buggy, dev hsr_slave_1 [ 1120.851453] FAULT_INJECTION: forcing a failure. [ 1120.851453] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.869938] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1120.880559] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1120.880559] [ 1120.919946] CPU: 0 PID: 5103 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1120.927179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.936546] Call Trace: [ 1120.939153] dump_stack+0x172/0x1f0 [ 1120.942797] should_fail.cold+0xa/0x1b [ 1120.946700] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1120.951814] ? lock_downgrade+0x810/0x810 [ 1120.955979] ? ___might_sleep+0x163/0x280 [ 1120.960144] __should_failslab+0x121/0x190 [ 1120.964387] should_failslab+0x9/0x14 16:59:07 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001e2, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1120.968189] kmem_cache_alloc+0x2be/0x710 [ 1120.972343] ? current_time+0x6b/0x140 [ 1120.976240] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1120.981362] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1120.985948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1120.991484] ? timespec64_trunc+0xf0/0x180 [ 1120.991503] __d_alloc+0x2e/0x8c0 [ 1120.991522] d_alloc_pseudo+0x1e/0x30 [ 1120.991537] alloc_file_pseudo+0xe2/0x280 [ 1120.991552] ? alloc_file+0x4d0/0x4d0 [ 1120.991569] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1120.991589] ? kasan_check_write+0x14/0x20 [ 1121.016505] __shmem_file_setup.part.0+0x108/0x2b0 [ 1121.016525] shmem_file_setup+0x66/0x90 [ 1121.016546] __x64_sys_memfd_create+0x2a2/0x470 [ 1121.034312] ? memfd_fcntl+0x1550/0x1550 [ 1121.038385] ? do_syscall_64+0x26/0x610 [ 1121.042383] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1121.046960] ? trace_hardirqs_on+0x67/0x230 [ 1121.051283] do_syscall_64+0x103/0x610 [ 1121.055163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1121.060339] RIP: 0033:0x457e29 [ 1121.063523] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1121.082407] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1121.090097] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1121.097358] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1121.104613] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1121.111866] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f619bb686d4 16:59:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3f, 0x101000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000180)={r3, 0x2}) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) getpid() 16:59:08 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x7a000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:08 executing program 5 (fault-call:2 fault-nth:4): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1121.119128] R13: 00000000004c67eb R14: 00000000004dbdb0 R15: 0000000000000005 16:59:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009603, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1121.196676] FAULT_INJECTION: forcing a failure. [ 1121.196676] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.208129] CPU: 1 PID: 5118 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1121.215316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1121.215324] Call Trace: [ 1121.227294] dump_stack+0x172/0x1f0 [ 1121.230928] should_fail.cold+0xa/0x1b [ 1121.234816] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1121.239920] ? lock_downgrade+0x810/0x810 [ 1121.244066] ? ___might_sleep+0x163/0x280 [ 1121.248218] __should_failslab+0x121/0x190 [ 1121.252465] should_failslab+0x9/0x14 [ 1121.256265] kmem_cache_alloc+0x2be/0x710 [ 1121.260423] __alloc_file+0x27/0x300 [ 1121.264141] alloc_empty_file+0x72/0x170 [ 1121.268201] alloc_file+0x5e/0x4d0 [ 1121.271744] alloc_file_pseudo+0x189/0x280 [ 1121.275981] ? alloc_file+0x4d0/0x4d0 [ 1121.279781] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1121.285321] ? kasan_check_write+0x14/0x20 [ 1121.289561] __shmem_file_setup.part.0+0x108/0x2b0 [ 1121.294495] shmem_file_setup+0x66/0x90 [ 1121.298475] __x64_sys_memfd_create+0x2a2/0x470 [ 1121.303145] ? memfd_fcntl+0x1550/0x1550 [ 1121.307203] ? do_syscall_64+0x26/0x610 [ 1121.311180] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1121.315764] ? trace_hardirqs_on+0x67/0x230 [ 1121.320089] do_syscall_64+0x103/0x610 [ 1121.323981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1121.329169] RIP: 0033:0x457e29 [ 1121.332363] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1121.351262] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1121.358969] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1121.366232] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1121.373527] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1121.380793] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f619bb686d4 [ 1121.388060] R13: 00000000004c67eb R14: 00000000004dbdb0 R15: 0000000000000005 16:59:08 executing program 5 (fault-call:2 fault-nth:5): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:08 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001e3, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1121.480995] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1121.480995] 16:59:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x3e01, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x9, 0x2}) 16:59:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009604, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1121.524199] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1121.553299] FAULT_INJECTION: forcing a failure. [ 1121.553299] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.603593] CPU: 1 PID: 5134 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1121.610824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1121.620191] Call Trace: [ 1121.622789] dump_stack+0x172/0x1f0 [ 1121.626498] should_fail.cold+0xa/0x1b [ 1121.630377] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1121.635479] ? lock_downgrade+0x810/0x810 [ 1121.639617] ? ___might_sleep+0x163/0x280 [ 1121.643753] __should_failslab+0x121/0x190 [ 1121.647976] should_failslab+0x9/0x14 [ 1121.651764] kmem_cache_alloc+0x2be/0x710 [ 1121.655894] ? notify_change+0x6d5/0xfb0 [ 1121.659944] ? do_sys_ftruncate+0x41e/0x550 [ 1121.664258] getname_flags+0xd6/0x5b0 [ 1121.668047] getname+0x1a/0x20 [ 1121.671228] do_sys_open+0x2c9/0x5d0 [ 1121.674931] ? filp_open+0x80/0x80 [ 1121.678458] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1121.683200] ? do_syscall_64+0x26/0x610 [ 1121.687164] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1121.692531] ? do_syscall_64+0x26/0x610 [ 1121.696502] __x64_sys_open+0x7e/0xc0 [ 1121.700291] do_syscall_64+0x103/0x610 [ 1121.704169] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1121.709341] RIP: 0033:0x411f11 [ 1121.712523] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1121.731409] RSP: 002b:00007f619bb67a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1121.739104] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 1121.746363] RDX: 00007f619bb67afa RSI: 0000000000000002 RDI: 00007f619bb67af0 16:59:08 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001e4, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1121.754161] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1121.761420] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 1121.768676] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009605, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1121.837071] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1121.847471] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1121.847471] 16:59:08 executing program 5 (fault-call:2 fault-nth:6): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:08 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40, 0x0) ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f0000000180)=""/162) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:08 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001e5, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1121.995604] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1121.995604] [ 1122.055106] FAULT_INJECTION: forcing a failure. [ 1122.055106] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1122.066964] CPU: 1 PID: 5171 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1122.066976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1122.066981] Call Trace: [ 1122.067005] dump_stack+0x172/0x1f0 [ 1122.089701] should_fail.cold+0xa/0x1b [ 1122.093744] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1122.098836] ? mark_held_locks+0x100/0x100 [ 1122.103062] should_fail_alloc_page+0x50/0x60 [ 1122.107541] __alloc_pages_nodemask+0x1a1/0x710 [ 1122.112209] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1122.117207] ? find_held_lock+0x35/0x130 [ 1122.121263] cache_grow_begin+0x9c/0x8c0 [ 1122.125331] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1122.130857] ? check_preemption_disabled+0x48/0x290 [ 1122.135864] kmem_cache_alloc+0x645/0x710 [ 1122.139997] ? notify_change+0x6d5/0xfb0 [ 1122.144043] ? do_sys_ftruncate+0x41e/0x550 [ 1122.148356] getname_flags+0xd6/0x5b0 [ 1122.152157] getname+0x1a/0x20 [ 1122.155339] do_sys_open+0x2c9/0x5d0 [ 1122.159040] ? filp_open+0x80/0x80 [ 1122.162572] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1122.167314] ? do_syscall_64+0x26/0x610 [ 1122.171274] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1122.176623] ? do_syscall_64+0x26/0x610 [ 1122.180584] __x64_sys_open+0x7e/0xc0 [ 1122.184372] do_syscall_64+0x103/0x610 [ 1122.188249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1122.193425] RIP: 0033:0x411f11 [ 1122.196606] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1122.215490] RSP: 002b:00007f619bb67a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1122.223195] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 1122.230446] RDX: 00007f619bb67afa RSI: 0000000000000002 RDI: 00007f619bb67af0 [ 1122.237698] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1122.244962] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 16:59:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009606, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:09 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) r4 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x42) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000040)={{0x6, 0xfffffffffffffffb}}, 0x10) [ 1122.252217] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x3e02, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:09 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001e6, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:09 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001e7, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1122.336934] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 16:59:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009607, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x400000) ioctl$TIOCSTI(r4, 0x5412, 0x3746) [ 1122.474145] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:09 executing program 5 (fault-call:2 fault-nth:7): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1122.528650] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1122.528650] 16:59:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009608, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1122.575226] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1122.605955] FAULT_INJECTION: forcing a failure. [ 1122.605955] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1122.617827] CPU: 1 PID: 5205 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1122.625015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1122.634370] Call Trace: [ 1122.636972] dump_stack+0x172/0x1f0 [ 1122.640606] should_fail.cold+0xa/0x1b [ 1122.644501] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1122.649614] ? mark_held_locks+0x100/0x100 [ 1122.653857] should_fail_alloc_page+0x50/0x60 [ 1122.658352] __alloc_pages_nodemask+0x1a1/0x710 [ 1122.663030] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1122.668045] ? find_held_lock+0x35/0x130 [ 1122.672120] cache_grow_begin+0x9c/0x8c0 [ 1122.676191] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1122.681734] ? check_preemption_disabled+0x48/0x290 [ 1122.686756] kmem_cache_alloc+0x645/0x710 [ 1122.690909] ? notify_change+0x6d5/0xfb0 [ 1122.694972] ? do_sys_ftruncate+0x41e/0x550 [ 1122.699301] getname_flags+0xd6/0x5b0 [ 1122.703106] getname+0x1a/0x20 [ 1122.706308] do_sys_open+0x2c9/0x5d0 [ 1122.710031] ? filp_open+0x80/0x80 [ 1122.713575] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1122.718332] ? do_syscall_64+0x26/0x610 [ 1122.722397] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1122.727769] ? do_syscall_64+0x26/0x610 [ 1122.731747] __x64_sys_open+0x7e/0xc0 [ 1122.735558] do_syscall_64+0x103/0x610 [ 1122.739453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1122.744665] RIP: 0033:0x411f11 [ 1122.747860] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1122.767268] RSP: 002b:00007f619bb67a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 16:59:09 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001e8, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1122.774981] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 1122.782251] RDX: 00007f619bb67afa RSI: 0000000000000002 RDI: 00007f619bb67af0 [ 1122.789519] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1122.796787] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 1122.804056] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:09 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf4ffffff, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) [ 1122.876934] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 16:59:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009700, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x5013fb, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:09 executing program 5 (fault-call:2 fault-nth:8): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:09 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001e9, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009701, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:09 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001ea, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x101) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000000000000000002000000000"]) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1123.070035] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1123.070035] [ 1123.076505] FAULT_INJECTION: forcing a failure. [ 1123.076505] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.129230] CPU: 0 PID: 5237 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1123.136462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1123.145818] Call Trace: [ 1123.148406] dump_stack+0x172/0x1f0 [ 1123.152033] should_fail.cold+0xa/0x1b [ 1123.155917] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1123.161012] ? lock_downgrade+0x810/0x810 [ 1123.165154] ? ___might_sleep+0x163/0x280 [ 1123.169294] __should_failslab+0x121/0x190 [ 1123.173515] should_failslab+0x9/0x14 [ 1123.177301] kmem_cache_alloc_trace+0x2d1/0x760 [ 1123.181956] ? ___might_sleep+0x163/0x280 [ 1123.186103] ? __might_sleep+0x95/0x190 [ 1123.190071] apparmor_file_alloc_security+0x112/0x940 [ 1123.195260] security_file_alloc+0x69/0xb0 [ 1123.199484] __alloc_file+0xac/0x300 [ 1123.203194] alloc_empty_file+0x72/0x170 [ 1123.207255] path_openat+0xef/0x4690 [ 1123.210955] ? __lock_acquire+0x53b/0x4700 [ 1123.215189] ? getname+0x1a/0x20 [ 1123.218540] ? do_sys_open+0x2c9/0x5d0 [ 1123.222413] ? __x64_sys_open+0x7e/0xc0 [ 1123.226390] ? do_syscall_64+0x103/0x610 [ 1123.230439] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1123.235796] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1123.240461] ? __lock_is_held+0xb6/0x140 [ 1123.244524] ? __alloc_fd+0x430/0x530 [ 1123.248312] do_filp_open+0x1a1/0x280 [ 1123.252106] ? may_open_dev+0x100/0x100 [ 1123.256070] ? lock_downgrade+0x810/0x810 [ 1123.260211] ? kasan_check_read+0x11/0x20 [ 1123.264346] ? do_raw_spin_unlock+0x57/0x270 [ 1123.268759] ? _raw_spin_unlock+0x2d/0x50 [ 1123.272891] ? __alloc_fd+0x430/0x530 [ 1123.276683] do_sys_open+0x3fe/0x5d0 [ 1123.280387] ? filp_open+0x80/0x80 [ 1123.283923] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1123.288669] ? do_syscall_64+0x26/0x610 [ 1123.292633] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1123.297983] ? do_syscall_64+0x26/0x610 [ 1123.301944] __x64_sys_open+0x7e/0xc0 [ 1123.305733] do_syscall_64+0x103/0x610 [ 1123.309610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1123.314792] RIP: 0033:0x411f11 [ 1123.317970] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1123.336854] RSP: 002b:00007f619bb67a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1123.344545] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 1123.351800] RDX: 00007f619bb67afa RSI: 0000000000000002 RDI: 00007f619bb67af0 [ 1123.359052] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1123.366315] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 16:59:10 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001eb, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1123.373568] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:10 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009702, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1123.444856] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1123.444856] 16:59:10 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001ec, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0xfffffffffffffee5) sendmsg$xdp(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x2c, 0x5, r3, 0x11}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000200)="a6dd1c93cbe3c1163cf82efe8a2712fbc926b4278bde606891f050fea5c2445a9d662b17d8318a4008499a3e5495fe12a4093a6fcc64ce9f65746f62c645bc7f4bf50136548833e423afb34689421a0e354c6a119ee15e68f6b75f49738048ef75654bf76effefe407e5b083b84ebcb470c6ed7c01034eef47eb5cf68943b4e43f8a9f1d01fa13af5006f7c6035fea23dd183ac9ce2393e3c0333a1516965e7988808370f22aa728407e", 0xaa}, {&(0x7f00000002c0)="5de06c22104b4d17e2dc0cc11cdd3098da081d08c10bdc9b49215677710646d1c7236a269adfc5de57583d0bbf20b1c826c2229721bb44eab1dafdd599c9ae78", 0x40}], 0x2, 0x0, 0x0, 0x44001}, 0x4) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x1, 0x0) ioctl$SIOCX25GCAUSEDIAG(r5, 0x89e6, &(0x7f0000000040)={0x6ffa, 0xfffffffffffffff9}) 16:59:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009703, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:10 executing program 5 (fault-call:2 fault-nth:9): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:10 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001ed, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x24000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:10 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1123.737458] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1123.737458] 16:59:10 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001ee, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x501801, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xffffffffffffff87) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009704, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1123.881300] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1123.881300] [ 1123.911854] FAULT_INJECTION: forcing a failure. [ 1123.911854] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.923197] CPU: 1 PID: 5287 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1123.930382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1123.930388] Call Trace: [ 1123.930411] dump_stack+0x172/0x1f0 [ 1123.930433] should_fail.cold+0xa/0x1b [ 1123.930451] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1123.930466] ? lock_downgrade+0x810/0x810 [ 1123.930483] ? ___might_sleep+0x163/0x280 [ 1123.963360] __should_failslab+0x121/0x190 [ 1123.967600] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1123.972371] should_failslab+0x9/0x14 [ 1123.976172] kmem_cache_alloc_trace+0x2d1/0x760 [ 1123.980846] ? lockdep_init_map+0x10c/0x5b0 [ 1123.985176] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1123.989934] __kthread_create_on_node+0xf2/0x460 [ 1123.994690] ? lock_acquire+0x16f/0x3f0 [ 1123.998670] ? kthread_parkme+0xb0/0xb0 [ 1124.002664] ? mutex_trylock+0x1e0/0x1e0 [ 1124.006725] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1124.011483] kthread_create_on_node+0xbb/0xf0 [ 1124.015981] ? __kthread_create_on_node+0x460/0x460 [ 1124.021003] ? lockdep_init_map+0x10c/0x5b0 [ 1124.025330] ? lockdep_init_map+0x10c/0x5b0 [ 1124.029669] lo_ioctl+0xafb/0x20d0 [ 1124.033218] ? lo_rw_aio+0x1530/0x1530 [ 1124.037114] blkdev_ioctl+0xee8/0x1c40 [ 1124.041007] ? blkpg_ioctl+0xa90/0xa90 [ 1124.044901] ? find_held_lock+0x35/0x130 [ 1124.048962] ? debug_check_no_obj_freed+0x200/0x464 [ 1124.053985] ? kasan_check_read+0x11/0x20 [ 1124.058135] ? __fget+0x340/0x540 [ 1124.061589] ? find_held_lock+0x35/0x130 [ 1124.065651] ? __fget+0x340/0x540 [ 1124.069110] block_ioctl+0xee/0x130 [ 1124.072744] ? blkdev_fallocate+0x410/0x410 [ 1124.077069] do_vfs_ioctl+0xd6e/0x1390 [ 1124.080963] ? ioctl_preallocate+0x210/0x210 [ 1124.085373] ? __fget+0x367/0x540 [ 1124.088834] ? iterate_fd+0x360/0x360 [ 1124.092636] ? do_sys_open+0x31d/0x5d0 [ 1124.096535] ? security_file_ioctl+0x93/0xc0 [ 1124.100944] ksys_ioctl+0xab/0xd0 [ 1124.104405] __x64_sys_ioctl+0x73/0xb0 [ 1124.108298] do_syscall_64+0x103/0x610 [ 1124.112190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1124.117380] RIP: 0033:0x457c97 [ 1124.120569] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1124.139470] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1124.147181] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1124.154450] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1124.161716] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1124.168984] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1124.176255] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:11 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001ef, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:11 executing program 5 (fault-call:2 fault-nth:10): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1124.280885] net_ratelimit: 14 callbacks suppressed [ 1124.280895] protocol 88fb is buggy, dev hsr_slave_0 [ 1124.285969] protocol 88fb is buggy, dev hsr_slave_1 16:59:11 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfa010000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:11 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001f0, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f00000001c0)={0x3, 0x1, [0x8000, 0x80000000, 0xe85, 0xd69, 0x8, 0x7, 0x6, 0xfffffffffffffff9]}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x581000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x2000008) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x80002, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$BLKROGET(r4, 0x125e, &(0x7f0000000040)) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 16:59:11 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009705, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1124.394971] FAULT_INJECTION: forcing a failure. [ 1124.394971] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.433981] CPU: 1 PID: 5302 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1124.441217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1124.450576] Call Trace: [ 1124.453170] dump_stack+0x172/0x1f0 [ 1124.456809] should_fail.cold+0xa/0x1b [ 1124.460701] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1124.465803] ? lock_downgrade+0x810/0x810 [ 1124.469954] ? ___might_sleep+0x163/0x280 [ 1124.474114] __should_failslab+0x121/0x190 [ 1124.478355] should_failslab+0x9/0x14 [ 1124.482156] kmem_cache_alloc+0x2be/0x710 [ 1124.486308] ? __schedule+0x1387/0x1cc0 [ 1124.490287] __kernfs_new_node+0xef/0x690 [ 1124.494432] ? _raw_spin_unlock_irq+0x28/0x90 [ 1124.498928] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1124.503685] ? __lock_acquire+0x53b/0x4700 [ 1124.507923] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1124.512422] ? __schedule+0x1387/0x1cc0 [ 1124.516408] kernfs_new_node+0x99/0x130 [ 1124.520385] kernfs_create_dir_ns+0x52/0x160 [ 1124.524796] internal_create_group+0x7f8/0xc40 [ 1124.529379] ? bd_set_size+0x89/0xb0 [ 1124.533104] ? remove_files.isra.0+0x190/0x190 [ 1124.537957] sysfs_create_group+0x20/0x30 [ 1124.542116] lo_ioctl+0xf8f/0x20d0 [ 1124.545661] ? lo_rw_aio+0x1530/0x1530 [ 1124.549558] blkdev_ioctl+0xee8/0x1c40 [ 1124.553449] ? blkpg_ioctl+0xa90/0xa90 [ 1124.557335] ? find_held_lock+0x35/0x130 [ 1124.561398] ? debug_check_no_obj_freed+0x200/0x464 [ 1124.566419] ? kasan_check_read+0x11/0x20 [ 1124.570575] ? __fget+0x340/0x540 [ 1124.574030] ? find_held_lock+0x35/0x130 [ 1124.578099] ? __fget+0x340/0x540 [ 1124.581563] block_ioctl+0xee/0x130 [ 1124.585645] ? blkdev_fallocate+0x410/0x410 [ 1124.589970] do_vfs_ioctl+0xd6e/0x1390 [ 1124.593874] ? ioctl_preallocate+0x210/0x210 [ 1124.598285] ? __fget+0x367/0x540 [ 1124.601743] ? iterate_fd+0x360/0x360 [ 1124.605544] ? do_sys_open+0x31d/0x5d0 [ 1124.609446] ? security_file_ioctl+0x93/0xc0 [ 1124.613861] ksys_ioctl+0xab/0xd0 [ 1124.617317] __x64_sys_ioctl+0x73/0xb0 [ 1124.621213] do_syscall_64+0x103/0x610 [ 1124.625108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1124.630296] RIP: 0033:0x457c97 [ 1124.633486] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1124.652384] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1124.660095] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1124.667359] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1124.674634] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1124.681901] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1124.689168] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1124.696690] protocol 88fb is buggy, dev hsr_slave_0 [ 1124.701832] protocol 88fb is buggy, dev hsr_slave_1 16:59:11 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001f1, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1124.792118] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1124.792118] [ 1124.803433] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 16:59:11 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfbffffff, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:11 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009706, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200000, 0x0) 16:59:11 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001f2, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:11 executing program 5 (fault-call:2 fault-nth:11): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1124.986132] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1124.986132] [ 1125.000852] protocol 88fb is buggy, dev hsr_slave_0 [ 1125.006007] protocol 88fb is buggy, dev hsr_slave_1 [ 1125.080850] protocol 88fb is buggy, dev hsr_slave_0 [ 1125.085982] protocol 88fb is buggy, dev hsr_slave_1 [ 1125.091311] protocol 88fb is buggy, dev hsr_slave_0 [ 1125.096374] protocol 88fb is buggy, dev hsr_slave_1 16:59:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:12 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001f3, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009707, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@empty}}, &(0x7f00000003c0)=0xe8) r7 = getegid() r8 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f00000005c0)=0x0, &(0x7f0000000600), &(0x7f0000000640)) fstat(r3, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getpid() fstat(r2, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000cc0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000d00)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000e00)=0xe8) r16 = getgid() sendmmsg$unix(r0, &(0x7f0000000f40)=[{&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000080)}, {&(0x7f0000000180)="684d2b9f1cc3186cf3a1f4a2c91055743fc0b4be40d1740deff8ece7528aa96b82e1504dc3fbee9b10ed33450029971f548df05f3d019a", 0x37}, {&(0x7f00000001c0)="4646185cb1eb93ee311ee7135befd9f40098e82cd3dcb7f8cf4c2d5edc7e6fb69fd51f9f11d7887a9769e051b6603ed44b78a9a901217255a9de41c7d0e1bee86aea26df214e549cbf1a620652c5abd0359d52e7851df4d14c68", 0x5a}], 0x3, &(0x7f0000000400)=[@cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x20, 0x1, 0x1, [r3, r3, r1, r0]}], 0x40, 0x20000000}, {&(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f00000004c0)="82f95310050a459c099a038ecddd897f8189ec3768d2bf8089a4d294f6", 0x1d}, {&(0x7f0000000500)="0b709417a9bf642fcdf0025418ab7b02aef86e0be0bcfd8d2f2de0fb03274453b4ccef5b2eb44e2cfd9baf5c548ffed83cc512dae5f3dcaac8d853e623abe9b8848e3fd12b121b59391677295292f0c0eb4cc086c54b71cb6ac11114e2dae5447a060b84bd46c755c1aa26ba26f1219b4ae996207acaecea099823de14fff9", 0x7f}], 0x2, &(0x7f0000000700)=[@rights={0x38, 0x1, 0x1, [r3, r4, r2, r2, r4, r4, r1, r1, r1]}, @rights={0x20, 0x1, 0x1, [r2, r3, r4]}, @rights={0x18, 0x1, 0x1, [r1, r0]}, @rights={0x30, 0x1, 0x1, [r0, r3, r2, r3, r1, r0, r3, r2]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}], 0xc0, 0x44}, {&(0x7f00000007c0)=@abs={0xdf53bbeeecb48f96, 0x0, 0x4e20}, 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000840)="91ad1a3287040c3886d18bd5e7ec2586dc714d", 0x13}, {&(0x7f0000000880)="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", 0xfd}, {&(0x7f0000000980)="e58db2bfb56bb9fe11e66a608f3e3e0b43d6fe7a65261633c22f4b3453c8d243d2487220b034caf30a41c9ed92f9e7e393d6153640bf642e62600c298cb96f9141cc1abd4ba2551743f4d71bae62d42e55a217876d45097e1bf41839809dcf1774a9b9ce3f676daddcd1eccf4794a9eede", 0x71}, {&(0x7f0000000a00)="7a2aaa9ca22cc11c125d93afe5e56e4c7ab4ecc9f79b58148a27bcb21acae11b0cc96711585fcb07c97962799e2be4e1c68109f821d89eeea675cd5b09528304f351856edc9e8ea993ba56b0346bfe1fc45dc03eb9a432be09c4d16064c577cee806dd620608cfe7cfeaa6f55136e12c0a130d67cf305de1536d967563ed3373a1b035", 0x83}, {&(0x7f0000000ac0)="f43762bc5d14ef065a7bfcc53b88d0f0472995a2ce2e4c8cd3f98b68ec1da366fd2b7d1d8be331cee79606f9146649ae2413ecebf8ade9a8", 0x38}], 0x5, &(0x7f0000000e40)=[@rights={0x30, 0x1, 0x1, [r0, r1, r2, r1, r2, r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x30, 0x1, 0x1, [r0, r3, r1, r4, r1, r2, r1]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @rights={0x20, 0x1, 0x1, [r1, r4, r1, r3]}, @rights={0x28, 0x1, 0x1, [r4, r2, r0, r2, r2]}], 0xe8}], 0x3, 0xc000) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1125.164506] FAULT_INJECTION: forcing a failure. [ 1125.164506] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.199150] CPU: 0 PID: 5345 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1125.206395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1125.215749] Call Trace: [ 1125.218350] dump_stack+0x172/0x1f0 [ 1125.221983] should_fail.cold+0xa/0x1b [ 1125.225878] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1125.230985] ? lock_downgrade+0x810/0x810 [ 1125.235146] ? ___might_sleep+0x163/0x280 [ 1125.239311] __should_failslab+0x121/0x190 [ 1125.243550] should_failslab+0x9/0x14 [ 1125.247343] kmem_cache_alloc+0x2be/0x710 [ 1125.251480] ? __lock_acquire+0x53b/0x4700 [ 1125.255706] __kernfs_new_node+0xef/0x690 [ 1125.259840] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1125.264582] ? __lock_acquire+0x53b/0x4700 [ 1125.268813] kernfs_new_node+0x99/0x130 [ 1125.272776] kernfs_create_dir_ns+0x52/0x160 [ 1125.277183] internal_create_group+0x7f8/0xc40 [ 1125.281762] ? bd_set_size+0x89/0xb0 [ 1125.285482] ? remove_files.isra.0+0x190/0x190 [ 1125.290057] sysfs_create_group+0x20/0x30 [ 1125.294197] lo_ioctl+0xf8f/0x20d0 [ 1125.297734] ? lo_rw_aio+0x1530/0x1530 [ 1125.301623] blkdev_ioctl+0xee8/0x1c40 [ 1125.305496] ? blkpg_ioctl+0xa90/0xa90 [ 1125.309368] ? find_held_lock+0x35/0x130 [ 1125.313419] ? debug_check_no_obj_freed+0x200/0x464 [ 1125.318423] ? kasan_check_read+0x11/0x20 [ 1125.322556] ? __fget+0x340/0x540 [ 1125.326004] ? find_held_lock+0x35/0x130 [ 1125.330048] ? __fget+0x340/0x540 [ 1125.333488] block_ioctl+0xee/0x130 [ 1125.337099] ? blkdev_fallocate+0x410/0x410 [ 1125.341406] do_vfs_ioctl+0xd6e/0x1390 [ 1125.345280] ? ioctl_preallocate+0x210/0x210 [ 1125.349674] ? __fget+0x367/0x540 [ 1125.353114] ? iterate_fd+0x360/0x360 [ 1125.356901] ? do_sys_open+0x31d/0x5d0 [ 1125.360796] ? security_file_ioctl+0x93/0xc0 [ 1125.365189] ksys_ioctl+0xab/0xd0 [ 1125.368633] __x64_sys_ioctl+0x73/0xb0 [ 1125.372510] do_syscall_64+0x103/0x610 [ 1125.376387] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1125.381562] RIP: 0033:0x457c97 [ 1125.384741] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1125.403626] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 16:59:12 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001f4, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1125.411318] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1125.418571] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1125.425834] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1125.433092] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1125.440345] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009708, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) r5 = dup3(r2, r4, 0x80000) r6 = dup(r0) fanotify_mark(r5, 0x4, 0x1000, r6, &(0x7f0000000180)='./file0\x00') r7 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 16:59:12 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:12 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001f5, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1125.629927] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 16:59:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x3, 0x26002) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xb706) fcntl$addseals(r0, 0x409, 0x2) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000180)={0x4, 0x0, [{}, {}, {}, {}]}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) write$UHID_INPUT2(r3, &(0x7f0000000000)={0xc, 0x29, "45e017c2494504aa5846045b875456a89b85a3097c8753114d32a0600881f563291aa275eb71d6f793"}, 0x2f) 16:59:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009800, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:12 executing program 5 (fault-call:2 fault-nth:12): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1125.712110] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1125.712110] [ 1125.867084] FAULT_INJECTION: forcing a failure. [ 1125.867084] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.897766] CPU: 0 PID: 5381 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1125.904988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1125.914343] Call Trace: [ 1125.916955] dump_stack+0x172/0x1f0 [ 1125.920588] should_fail.cold+0xa/0x1b [ 1125.924480] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1125.929587] ? lock_downgrade+0x810/0x810 [ 1125.933736] ? ___might_sleep+0x163/0x280 [ 1125.937897] __should_failslab+0x121/0x190 [ 1125.942138] should_failslab+0x9/0x14 [ 1125.945943] kmem_cache_alloc+0x2be/0x710 [ 1125.950097] ? lock_downgrade+0x810/0x810 [ 1125.954244] ? kasan_check_read+0x11/0x20 [ 1125.958396] __kernfs_new_node+0xef/0x690 [ 1125.962545] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1125.967314] ? wait_for_completion+0x440/0x440 [ 1125.971932] ? mutex_unlock+0xd/0x10 [ 1125.975650] ? kernfs_activate+0x192/0x1f0 [ 1125.979896] kernfs_new_node+0x99/0x130 [ 1125.983886] __kernfs_create_file+0x51/0x340 [ 1125.988297] sysfs_add_file_mode_ns+0x222/0x560 [ 1125.992976] internal_create_group+0x35b/0xc40 [ 1125.997555] ? bd_set_size+0x89/0xb0 [ 1126.001280] ? remove_files.isra.0+0x190/0x190 [ 1126.005987] sysfs_create_group+0x20/0x30 [ 1126.010136] lo_ioctl+0xf8f/0x20d0 [ 1126.013679] ? lo_rw_aio+0x1530/0x1530 [ 1126.017569] blkdev_ioctl+0xee8/0x1c40 [ 1126.021460] ? blkpg_ioctl+0xa90/0xa90 [ 1126.025348] ? find_held_lock+0x35/0x130 [ 1126.029413] ? debug_check_no_obj_freed+0x200/0x464 [ 1126.034435] ? kasan_check_read+0x11/0x20 [ 1126.038594] ? __fget+0x340/0x540 [ 1126.042049] ? find_held_lock+0x35/0x130 [ 1126.046113] ? __fget+0x340/0x540 [ 1126.049566] block_ioctl+0xee/0x130 [ 1126.053192] ? blkdev_fallocate+0x410/0x410 [ 1126.057515] do_vfs_ioctl+0xd6e/0x1390 [ 1126.061405] ? ioctl_preallocate+0x210/0x210 [ 1126.065815] ? __fget+0x367/0x540 [ 1126.069269] ? iterate_fd+0x360/0x360 [ 1126.073074] ? do_sys_open+0x31d/0x5d0 [ 1126.076976] ? security_file_ioctl+0x93/0xc0 [ 1126.081392] ksys_ioctl+0xab/0xd0 [ 1126.084848] __x64_sys_ioctl+0x73/0xb0 [ 1126.088749] do_syscall_64+0x103/0x610 [ 1126.092645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1126.097836] RIP: 0033:0x457c97 [ 1126.101037] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1126.119943] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1126.127654] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1126.134918] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1126.142191] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1126.149456] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1126.156720] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x5200, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:13 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001f6, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009801, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x100, r5, 0x0, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x80, @mcast1}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x5, @rand_addr="3f6ef937dce7086b752d3bc8952ad85a", 0x9}}}}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x880}, 0x4004000) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:13 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:13 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001f7, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1126.269612] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 16:59:13 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001f8, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:13 executing program 5 (fault-call:2 fault-nth:13): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:13 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='p\t\x1d\xb2\x00\xac\x98\x13~-\x90\x9d\xe5\xd6\x16\xfb\xd8,d\x8a\xe3^\xa6\x1d\xc5\xa7d\n;\xf0\x82\xa9\xeb9)J\xa2,\xe8*\xa70[\x96S\xd1\xb8\xec\xf8\xc2\x1f\xe8\f\xbeP\r\x8e/\x16\x9a\x13\xdd\xfa\xb3>\x00\x8f\xaa\xc2\x84$\xd0\x1ca\xef\xa7\x1f\n\xb3\x04\'\xbe\xaf\xbf\x93\xc9P)\xb1\xb9\xf7\xb3e2`0{+%\xc2\xc1\xd6g\xe6\x92\xd9', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000080)=r2) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000200)={&(0x7f0000000040)=[0x10001, 0x4, 0x8], 0x3, 0x1, 0x5, 0x9, 0x5, 0x3ff, {0x8, 0x2, 0xfca, 0x5, 0x4, 0x20, 0xffff, 0x30000000, 0x7, 0xfffffffffffffffe, 0xffffe00000000000, 0xfffffffffffffff8, 0x2, 0x0, "6a9a27acf80b20a1ec03d1af56ef66eb4fdfe96f12748587529090f72135745b"}}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x3) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x20000, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0xbe}) 16:59:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009802, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1126.376572] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1126.376572] 16:59:13 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001f9, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1126.491869] FAULT_INJECTION: forcing a failure. [ 1126.491869] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.510943] CPU: 0 PID: 5409 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1126.518169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.527525] Call Trace: [ 1126.530134] dump_stack+0x172/0x1f0 [ 1126.533775] should_fail.cold+0xa/0x1b [ 1126.537671] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1126.542787] ? lock_downgrade+0x810/0x810 [ 1126.546964] ? ___might_sleep+0x163/0x280 [ 1126.551128] __should_failslab+0x121/0x190 [ 1126.555386] should_failslab+0x9/0x14 [ 1126.559191] kmem_cache_alloc+0x2be/0x710 [ 1126.563345] ? lock_downgrade+0x810/0x810 [ 1126.567494] ? kasan_check_read+0x11/0x20 [ 1126.571652] __kernfs_new_node+0xef/0x690 [ 1126.575802] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1126.580567] ? wait_for_completion+0x440/0x440 [ 1126.585684] ? mutex_unlock+0xd/0x10 [ 1126.589402] ? kernfs_activate+0x192/0x1f0 [ 1126.593647] kernfs_new_node+0x99/0x130 [ 1126.597631] __kernfs_create_file+0x51/0x340 [ 1126.602043] sysfs_add_file_mode_ns+0x222/0x560 [ 1126.606728] internal_create_group+0x35b/0xc40 [ 1126.611309] ? bd_set_size+0x89/0xb0 [ 1126.615033] ? remove_files.isra.0+0x190/0x190 [ 1126.619632] sysfs_create_group+0x20/0x30 [ 1126.623784] lo_ioctl+0xf8f/0x20d0 [ 1126.627337] ? lo_rw_aio+0x1530/0x1530 [ 1126.631226] blkdev_ioctl+0xee8/0x1c40 [ 1126.635119] ? blkpg_ioctl+0xa90/0xa90 [ 1126.639005] ? find_held_lock+0x35/0x130 [ 1126.643069] ? debug_check_no_obj_freed+0x200/0x464 [ 1126.648095] ? kasan_check_read+0x11/0x20 [ 1126.652249] ? __fget+0x340/0x540 [ 1126.655703] ? find_held_lock+0x35/0x130 [ 1126.659763] ? __fget+0x340/0x540 [ 1126.663223] block_ioctl+0xee/0x130 [ 1126.666851] ? blkdev_fallocate+0x410/0x410 [ 1126.671175] do_vfs_ioctl+0xd6e/0x1390 [ 1126.675072] ? ioctl_preallocate+0x210/0x210 [ 1126.679483] ? __fget+0x367/0x540 [ 1126.682939] ? iterate_fd+0x360/0x360 [ 1126.686744] ? do_sys_open+0x31d/0x5d0 [ 1126.690640] ? security_file_ioctl+0x93/0xc0 [ 1126.695053] ksys_ioctl+0xab/0xd0 [ 1126.698515] __x64_sys_ioctl+0x73/0xb0 [ 1126.702407] do_syscall_64+0x103/0x610 [ 1126.706302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1126.711488] RIP: 0033:0x457c97 [ 1126.714679] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1126.733588] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 16:59:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x5c02, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) [ 1126.741298] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1126.748569] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1126.755840] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1126.763112] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1126.770391] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_S390_VCPU_FAULT(r3, 0x4008ae52, &(0x7f0000000180)=0x80000000) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009803, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1126.912097] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 16:59:13 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:13 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001fa, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) pipe(&(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x70, 0x7, 0x3f, 0xc000, 0x9, 0x0, 0x401, 0x11000, 0x4, 0x4, 0x101, 0x1, 0x6, 0x4, 0x4, 0x0, 0x7ff, 0x3, 0x200, 0x9, 0xd4e, 0x69223b7c, 0x3, 0x14, 0x4, 0x47, 0x8, 0xffffffff, 0x4, 0x5c82, 0x8, 0x9, 0x7fffffff, 0xffffffffffff4cdc, 0x7, 0x8, 0x1000, 0x0, 0x100, 0x4, @perf_config_ext={0x8, 0x2c53}, 0x24, 0x5, 0x3, 0x7, 0x1, 0xffffffffffff7fff, 0xb652}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffff9c, 0xc) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/unix\x00') r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 16:59:13 executing program 5 (fault-call:2 fault-nth:14): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1127.006744] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1127.006744] 16:59:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009804, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:13 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001fb, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1127.135438] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1127.135438] 16:59:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x24080, 0x0) [ 1127.177265] FAULT_INJECTION: forcing a failure. [ 1127.177265] name failslab, interval 1, probability 0, space 0, times 0 [ 1127.202811] CPU: 0 PID: 5451 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1127.210038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1127.219390] Call Trace: [ 1127.221987] dump_stack+0x172/0x1f0 16:59:14 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f0000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1127.225634] should_fail.cold+0xa/0x1b [ 1127.229531] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1127.234645] ? lock_downgrade+0x810/0x810 [ 1127.238807] ? ___might_sleep+0x163/0x280 [ 1127.242962] __should_failslab+0x121/0x190 [ 1127.247210] should_failslab+0x9/0x14 [ 1127.251020] kmem_cache_alloc+0x2be/0x710 [ 1127.255174] ? lock_downgrade+0x810/0x810 [ 1127.259329] ? kasan_check_read+0x11/0x20 [ 1127.263490] __kernfs_new_node+0xef/0x690 [ 1127.267643] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1127.272402] ? wait_for_completion+0x440/0x440 [ 1127.276998] ? mutex_unlock+0xd/0x10 [ 1127.280714] ? kernfs_activate+0x192/0x1f0 [ 1127.284951] kernfs_new_node+0x99/0x130 [ 1127.288933] __kernfs_create_file+0x51/0x340 [ 1127.293347] sysfs_add_file_mode_ns+0x222/0x560 [ 1127.298024] internal_create_group+0x35b/0xc40 [ 1127.302607] ? bd_set_size+0x89/0xb0 [ 1127.306328] ? remove_files.isra.0+0x190/0x190 [ 1127.310924] sysfs_create_group+0x20/0x30 [ 1127.315073] lo_ioctl+0xf8f/0x20d0 [ 1127.318623] ? lo_rw_aio+0x1530/0x1530 [ 1127.322513] blkdev_ioctl+0xee8/0x1c40 [ 1127.326410] ? blkpg_ioctl+0xa90/0xa90 [ 1127.330300] ? find_held_lock+0x35/0x130 [ 1127.334364] ? debug_check_no_obj_freed+0x200/0x464 [ 1127.339385] ? kasan_check_read+0x11/0x20 [ 1127.343533] ? __fget+0x340/0x540 [ 1127.346996] ? find_held_lock+0x35/0x130 [ 1127.351076] ? __fget+0x340/0x540 [ 1127.354536] block_ioctl+0xee/0x130 [ 1127.358161] ? blkdev_fallocate+0x410/0x410 [ 1127.362484] do_vfs_ioctl+0xd6e/0x1390 [ 1127.366376] ? ioctl_preallocate+0x210/0x210 [ 1127.370789] ? __fget+0x367/0x540 [ 1127.374246] ? iterate_fd+0x360/0x360 [ 1127.378048] ? do_sys_open+0x31d/0x5d0 [ 1127.381949] ? security_file_ioctl+0x93/0xc0 [ 1127.386363] ksys_ioctl+0xab/0xd0 [ 1127.389819] __x64_sys_ioctl+0x73/0xb0 [ 1127.393717] do_syscall_64+0x103/0x610 [ 1127.397609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1127.402798] RIP: 0033:0x457c97 [ 1127.405992] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1127.424903] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1127.432620] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1127.439895] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1127.447161] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1127.454435] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1127.461705] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:14 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001fc, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1127.485020] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 16:59:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009805, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:14 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001fd, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:14 executing program 5 (fault-call:2 fault-nth:15): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009806, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:14 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfc, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:14 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x10001fe, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1ff, 0x20000) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000040)={0x0, 0xff, 0xfffffffffffff801}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x106, 0x1004}}, 0x20) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1127.748003] FAULT_INJECTION: forcing a failure. [ 1127.748003] name failslab, interval 1, probability 0, space 0, times 0 [ 1127.759826] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1127.759826] [ 1127.795905] CPU: 0 PID: 5480 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1127.803134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1127.812492] Call Trace: [ 1127.815087] dump_stack+0x172/0x1f0 [ 1127.818739] should_fail.cold+0xa/0x1b [ 1127.822645] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1127.827757] ? lock_downgrade+0x810/0x810 [ 1127.831912] ? ___might_sleep+0x163/0x280 [ 1127.836064] __should_failslab+0x121/0x190 [ 1127.840302] should_failslab+0x9/0x14 [ 1127.844108] kmem_cache_alloc+0x2be/0x710 [ 1127.848258] ? lock_downgrade+0x810/0x810 [ 1127.852402] ? kasan_check_read+0x11/0x20 [ 1127.856562] __kernfs_new_node+0xef/0x690 [ 1127.860712] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1127.865482] ? wait_for_completion+0x440/0x440 [ 1127.870074] ? mutex_unlock+0xd/0x10 [ 1127.873788] ? kernfs_activate+0x192/0x1f0 [ 1127.878042] kernfs_new_node+0x99/0x130 [ 1127.882021] __kernfs_create_file+0x51/0x340 [ 1127.886432] sysfs_add_file_mode_ns+0x222/0x560 [ 1127.891109] internal_create_group+0x35b/0xc40 [ 1127.895692] ? bd_set_size+0x89/0xb0 [ 1127.899423] ? remove_files.isra.0+0x190/0x190 [ 1127.904017] sysfs_create_group+0x20/0x30 [ 1127.908167] lo_ioctl+0xf8f/0x20d0 [ 1127.911724] ? lo_rw_aio+0x1530/0x1530 [ 1127.915614] blkdev_ioctl+0xee8/0x1c40 [ 1127.919504] ? blkpg_ioctl+0xa90/0xa90 [ 1127.923396] ? find_held_lock+0x35/0x130 [ 1127.927460] ? debug_check_no_obj_freed+0x200/0x464 [ 1127.932483] ? kasan_check_read+0x11/0x20 [ 1127.936628] ? __fget+0x340/0x540 [ 1127.940081] ? find_held_lock+0x35/0x130 [ 1127.944144] ? __fget+0x340/0x540 [ 1127.947600] block_ioctl+0xee/0x130 [ 1127.951223] ? blkdev_fallocate+0x410/0x410 [ 1127.955549] do_vfs_ioctl+0xd6e/0x1390 [ 1127.959442] ? ioctl_preallocate+0x210/0x210 [ 1127.963853] ? __fget+0x367/0x540 [ 1127.967310] ? iterate_fd+0x360/0x360 [ 1127.971112] ? do_sys_open+0x31d/0x5d0 [ 1127.975012] ? security_file_ioctl+0x93/0xc0 [ 1127.979422] ksys_ioctl+0xab/0xd0 [ 1127.982878] __x64_sys_ioctl+0x73/0xb0 [ 1127.986775] do_syscall_64+0x103/0x610 [ 1127.990677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1127.995868] RIP: 0033:0x457c97 [ 1127.999063] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1128.017962] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1128.025672] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1128.032954] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1128.040226] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1128.047493] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1128.054855] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009807, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1128.091526] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 16:59:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000000000, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffe}) 16:59:15 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000201, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:15 executing program 5 (fault-call:2 fault-nth:16): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009808, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:15 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000300, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:15 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfd, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1128.333179] FAULT_INJECTION: forcing a failure. [ 1128.333179] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.346387] CPU: 0 PID: 5510 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1128.353587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1128.362934] Call Trace: [ 1128.365528] dump_stack+0x172/0x1f0 [ 1128.369159] should_fail.cold+0xa/0x1b [ 1128.373053] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1128.378152] ? lock_downgrade+0x810/0x810 [ 1128.382298] ? ___might_sleep+0x163/0x280 [ 1128.382316] __should_failslab+0x121/0x190 [ 1128.382332] should_failslab+0x9/0x14 [ 1128.390702] kmem_cache_alloc+0x2be/0x710 [ 1128.390718] ? lock_downgrade+0x810/0x810 [ 1128.390729] ? kasan_check_read+0x11/0x20 [ 1128.390747] __kernfs_new_node+0xef/0x690 [ 1128.411049] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1128.415796] ? wait_for_completion+0x440/0x440 [ 1128.420369] ? mutex_unlock+0xd/0x10 [ 1128.424068] ? kernfs_activate+0x192/0x1f0 [ 1128.428300] kernfs_new_node+0x99/0x130 [ 1128.432281] __kernfs_create_file+0x51/0x340 [ 1128.436684] sysfs_add_file_mode_ns+0x222/0x560 [ 1128.441352] internal_create_group+0x35b/0xc40 [ 1128.445919] ? bd_set_size+0x89/0xb0 [ 1128.449634] ? remove_files.isra.0+0x190/0x190 [ 1128.454212] sysfs_create_group+0x20/0x30 [ 1128.458364] lo_ioctl+0xf8f/0x20d0 [ 1128.461908] ? lo_rw_aio+0x1530/0x1530 [ 1128.465785] blkdev_ioctl+0xee8/0x1c40 [ 1128.469657] ? blkpg_ioctl+0xa90/0xa90 [ 1128.473539] ? find_held_lock+0x35/0x130 [ 1128.477586] ? debug_check_no_obj_freed+0x200/0x464 [ 1128.482592] ? kasan_check_read+0x11/0x20 [ 1128.486722] ? __fget+0x340/0x540 [ 1128.490162] ? find_held_lock+0x35/0x130 [ 1128.494205] ? __fget+0x340/0x540 [ 1128.497643] block_ioctl+0xee/0x130 [ 1128.501258] ? blkdev_fallocate+0x410/0x410 [ 1128.505564] do_vfs_ioctl+0xd6e/0x1390 [ 1128.509441] ? ioctl_preallocate+0x210/0x210 [ 1128.513847] ? __fget+0x367/0x540 [ 1128.517463] ? iterate_fd+0x360/0x360 [ 1128.521250] ? do_sys_open+0x31d/0x5d0 [ 1128.525127] ? security_file_ioctl+0x93/0xc0 [ 1128.529521] ksys_ioctl+0xab/0xd0 [ 1128.532969] __x64_sys_ioctl+0x73/0xb0 [ 1128.536844] do_syscall_64+0x103/0x610 [ 1128.540717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1128.545914] RIP: 0033:0x457c97 [ 1128.549095] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1128.568067] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1128.575761] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1128.583426] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1128.590689] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1128.597942] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1128.605195] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:15 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000301, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1128.654908] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1128.654908] [ 1128.666888] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 16:59:15 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000500, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:15 executing program 5 (fault-call:2 fault-nth:17): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009900, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) fcntl$setown(r0, 0x8, r2) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0xa0202, 0x0) setsockopt$TIPC_GROUP_LEAVE(r5, 0x10f, 0x88) r6 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5630000, 0x4000) readv(r5, &(0x7f0000000540)=[{&(0x7f0000000300)=""/142, 0x8e}, {&(0x7f00000003c0)=""/28, 0x1c}, {&(0x7f0000000400)=""/38, 0x26}, {&(0x7f0000000440)=""/240, 0xf0}], 0x4) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r6, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="89fffdff", @ANYRES16=r7, @ANYBLOB="040125bd7000fedbdf25010000000000000002410000000c001369623a6270713000"], 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x4) r8 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$EVIOCGABS0(r5, 0x80184540, &(0x7f00000002c0)=""/8) ioctl$KVM_SET_VCPU_EVENTS(r8, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1128.915290] FAULT_INJECTION: forcing a failure. [ 1128.915290] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.926642] CPU: 1 PID: 5538 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1128.933852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1128.933956] Call Trace: [ 1128.933980] dump_stack+0x172/0x1f0 [ 1128.949530] should_fail.cold+0xa/0x1b [ 1128.953419] ? kernel_text_address+0x73/0xf0 [ 1128.957833] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1128.962945] ? unwind_get_return_address+0x61/0xa0 [ 1128.967881] ? __save_stack_trace+0x8a/0xf0 [ 1128.972223] __should_failslab+0x121/0x190 [ 1128.976463] should_failslab+0x9/0x14 [ 1128.980262] kmem_cache_alloc+0x47/0x710 [ 1128.984322] ? save_stack+0xa9/0xd0 [ 1128.987948] ? save_stack+0x45/0xd0 [ 1128.991573] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1128.996673] ? kasan_slab_alloc+0xf/0x20 [ 1129.000740] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 1129.006369] idr_get_free+0x425/0x8d0 [ 1129.010186] idr_alloc_u32+0x19e/0x330 [ 1129.014087] ? __fprop_inc_percpu_max+0x230/0x230 [ 1129.018933] ? __lock_is_held+0xb6/0x140 [ 1129.022997] ? check_preemption_disabled+0x48/0x290 [ 1129.028023] idr_alloc_cyclic+0x132/0x270 [ 1129.032176] ? idr_alloc+0x150/0x150 [ 1129.035901] __kernfs_new_node+0x171/0x690 [ 1129.040144] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1129.044905] ? wait_for_completion+0x440/0x440 [ 1129.049498] ? mutex_unlock+0xd/0x10 [ 1129.053217] ? kernfs_activate+0x192/0x1f0 [ 1129.057453] kernfs_new_node+0x99/0x130 [ 1129.061435] __kernfs_create_file+0x51/0x340 [ 1129.065847] sysfs_add_file_mode_ns+0x222/0x560 [ 1129.070524] internal_create_group+0x35b/0xc40 [ 1129.075102] ? bd_set_size+0x89/0xb0 [ 1129.078822] ? remove_files.isra.0+0x190/0x190 [ 1129.083419] sysfs_create_group+0x20/0x30 [ 1129.087571] lo_ioctl+0xf8f/0x20d0 [ 1129.091116] ? lo_rw_aio+0x1530/0x1530 [ 1129.095011] blkdev_ioctl+0xee8/0x1c40 [ 1129.098901] ? blkpg_ioctl+0xa90/0xa90 [ 1129.102788] ? find_held_lock+0x35/0x130 [ 1129.106855] ? debug_check_no_obj_freed+0x200/0x464 [ 1129.111877] ? kasan_check_read+0x11/0x20 [ 1129.116023] ? __fget+0x340/0x540 [ 1129.119475] ? find_held_lock+0x35/0x130 [ 1129.123535] ? __fget+0x340/0x540 [ 1129.126991] block_ioctl+0xee/0x130 [ 1129.130623] ? blkdev_fallocate+0x410/0x410 [ 1129.134946] do_vfs_ioctl+0xd6e/0x1390 [ 1129.138840] ? ioctl_preallocate+0x210/0x210 [ 1129.143250] ? __fget+0x367/0x540 [ 1129.146707] ? iterate_fd+0x360/0x360 [ 1129.150513] ? do_sys_open+0x31d/0x5d0 [ 1129.154406] ? security_file_ioctl+0x93/0xc0 [ 1129.158820] ksys_ioctl+0xab/0xd0 [ 1129.162276] __x64_sys_ioctl+0x73/0xb0 [ 1129.166166] do_syscall_64+0x103/0x610 [ 1129.170060] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1129.175247] RIP: 0033:0x457c97 [ 1129.178437] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1129.197335] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1129.205042] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 16:59:15 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009901, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:16 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000501, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1129.212312] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1129.219578] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1129.226850] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1129.234115] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:16 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000600, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1129.300007] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 1129.337980] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1129.337980] 16:59:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SG_EMULATED_HOST(r3, 0x2203, &(0x7f0000000040)) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009902, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:16 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1129.515182] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 16:59:16 executing program 5 (fault-call:2 fault-nth:18): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:16 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000601, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101000, 0x0) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000080)={r5, 0x1000, 0x1, r6}) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009903, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:16 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000700, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009904, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400080, 0x0) r5 = dup2(r1, r0) renameat(r4, &(0x7f0000000040)='./file0\x00', r5, &(0x7f0000000080)='./file0\x00') r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r6, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:16 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff4, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1129.812092] FAULT_INJECTION: forcing a failure. [ 1129.812092] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.833821] CPU: 0 PID: 5594 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1129.841043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1129.850396] Call Trace: [ 1129.852990] dump_stack+0x172/0x1f0 [ 1129.856628] should_fail.cold+0xa/0x1b [ 1129.860530] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1129.865650] ? lock_downgrade+0x810/0x810 [ 1129.869801] ? ___might_sleep+0x163/0x280 [ 1129.873953] __should_failslab+0x121/0x190 [ 1129.878190] should_failslab+0x9/0x14 [ 1129.882087] kmem_cache_alloc_node+0x265/0x710 [ 1129.886672] ? find_held_lock+0x35/0x130 [ 1129.890742] __alloc_skb+0xd5/0x5e0 [ 1129.894374] ? skb_scrub_packet+0x440/0x440 [ 1129.898697] ? kasan_check_read+0x11/0x20 [ 1129.902849] alloc_uevent_skb+0x83/0x1e2 [ 1129.906913] kobject_uevent_env+0xa63/0x1030 [ 1129.911334] kobject_uevent+0x20/0x26 [ 1129.915134] lo_ioctl+0x100b/0x20d0 [ 1129.918765] ? lo_rw_aio+0x1530/0x1530 [ 1129.922663] blkdev_ioctl+0xee8/0x1c40 [ 1129.926560] ? blkpg_ioctl+0xa90/0xa90 [ 1129.930449] ? find_held_lock+0x35/0x130 [ 1129.934515] ? debug_check_no_obj_freed+0x200/0x464 [ 1129.939537] ? kasan_check_read+0x11/0x20 [ 1129.943692] ? __fget+0x340/0x540 [ 1129.947150] ? find_held_lock+0x35/0x130 [ 1129.951212] ? __fget+0x340/0x540 [ 1129.954691] block_ioctl+0xee/0x130 [ 1129.958319] ? blkdev_fallocate+0x410/0x410 [ 1129.962648] do_vfs_ioctl+0xd6e/0x1390 [ 1129.966551] ? ioctl_preallocate+0x210/0x210 [ 1129.970959] ? __fget+0x367/0x540 [ 1129.974420] ? iterate_fd+0x360/0x360 [ 1129.978223] ? do_sys_open+0x31d/0x5d0 [ 1129.982119] ? security_file_ioctl+0x93/0xc0 [ 1129.986532] ksys_ioctl+0xab/0xd0 [ 1129.989994] __x64_sys_ioctl+0x73/0xb0 [ 1129.993883] do_syscall_64+0x103/0x610 [ 1129.997777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1130.002963] RIP: 0033:0x457c97 [ 1130.006157] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1130.025053] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1130.032759] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1130.040035] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1130.047304] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1130.054569] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 16:59:16 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000701, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1130.061834] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1130.096714] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1130.096714] 16:59:16 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000801, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009905, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1130.136700] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 16:59:17 executing program 5 (fault-call:2 fault-nth:19): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:17 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000900, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1130.245403] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 16:59:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x400002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xffffffff, 0x4c0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0xd5, @mcast1, 0x9}, 0x1c) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xffffffff, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009906, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:17 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000901, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:17 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff5, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1130.520580] FAULT_INJECTION: forcing a failure. [ 1130.520580] name failslab, interval 1, probability 0, space 0, times 0 [ 1130.560883] CPU: 1 PID: 5629 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1130.568198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1130.577553] Call Trace: [ 1130.580177] dump_stack+0x172/0x1f0 [ 1130.584115] should_fail.cold+0xa/0x1b [ 1130.588012] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1130.593128] ? lock_downgrade+0x810/0x810 [ 1130.597283] ? ___might_sleep+0x163/0x280 [ 1130.601439] __should_failslab+0x121/0x190 [ 1130.605682] should_failslab+0x9/0x14 [ 1130.609485] kmem_cache_alloc_trace+0x2d1/0x760 [ 1130.614172] kobject_uevent_env+0x2fb/0x1030 [ 1130.618590] kobject_uevent+0x20/0x26 [ 1130.622395] lo_ioctl+0x100b/0x20d0 [ 1130.626029] ? lo_rw_aio+0x1530/0x1530 [ 1130.629923] blkdev_ioctl+0xee8/0x1c40 [ 1130.633822] ? blkpg_ioctl+0xa90/0xa90 [ 1130.637710] ? find_held_lock+0x35/0x130 [ 1130.641776] ? debug_check_no_obj_freed+0x200/0x464 [ 1130.646794] ? kasan_check_read+0x11/0x20 [ 1130.650959] ? __fget+0x340/0x540 [ 1130.654413] ? find_held_lock+0x35/0x130 [ 1130.658474] ? __fget+0x340/0x540 [ 1130.661939] block_ioctl+0xee/0x130 [ 1130.665564] ? blkdev_fallocate+0x410/0x410 [ 1130.669892] do_vfs_ioctl+0xd6e/0x1390 [ 1130.673784] ? ioctl_preallocate+0x210/0x210 [ 1130.678190] ? __fget+0x367/0x540 [ 1130.681650] ? iterate_fd+0x360/0x360 [ 1130.685453] ? do_sys_open+0x31d/0x5d0 [ 1130.689360] ? security_file_ioctl+0x93/0xc0 [ 1130.693770] ksys_ioctl+0xab/0xd0 [ 1130.697229] __x64_sys_ioctl+0x73/0xb0 [ 1130.701120] do_syscall_64+0x103/0x610 [ 1130.705015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1130.710199] RIP: 0033:0x457c97 [ 1130.713398] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1130.732295] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1130.740006] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1130.747274] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 16:59:17 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x464200) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000380)) r3 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x1, 0x102) getsockopt$TIPC_NODE_RECVQ_DEPTH(r3, 0x10f, 0x83, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.advise\x00', &(0x7f0000000180)=""/164, 0xa4) 16:59:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009907, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1130.755053] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1130.762326] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1130.769593] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1130.780972] net_ratelimit: 20 callbacks suppressed [ 1130.780980] protocol 88fb is buggy, dev hsr_slave_0 [ 1130.785972] protocol 88fb is buggy, dev hsr_slave_1 [ 1130.791580] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 16:59:17 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000a00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:17 executing program 5 (fault-call:2 fault-nth:20): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1130.874544] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1130.874544] 16:59:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7fff, 0x101000) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000040)=0x47d, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) renameat2(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000180)={0x6, 0x8000004, 0x800000}) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000200)=0x5, 0x4) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000240)) 16:59:17 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000a01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009908, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1130.920895] protocol 88fb is buggy, dev hsr_slave_0 [ 1130.926000] protocol 88fb is buggy, dev hsr_slave_1 [ 1130.996740] FAULT_INJECTION: forcing a failure. [ 1130.996740] name failslab, interval 1, probability 0, space 0, times 0 [ 1131.020910] CPU: 1 PID: 5654 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1131.028134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1131.037488] Call Trace: [ 1131.040075] dump_stack+0x172/0x1f0 [ 1131.043696] should_fail.cold+0xa/0x1b [ 1131.047570] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1131.052659] ? lock_downgrade+0x810/0x810 [ 1131.056794] ? ___might_sleep+0x163/0x280 [ 1131.060932] __should_failslab+0x121/0x190 [ 1131.065156] should_failslab+0x9/0x14 [ 1131.068944] kmem_cache_alloc_trace+0x2d1/0x760 [ 1131.073605] kobject_uevent_env+0x2fb/0x1030 [ 1131.078018] kobject_uevent+0x20/0x26 [ 1131.081813] lo_ioctl+0x100b/0x20d0 [ 1131.085428] ? lo_rw_aio+0x1530/0x1530 [ 1131.089303] blkdev_ioctl+0xee8/0x1c40 [ 1131.093175] ? blkpg_ioctl+0xa90/0xa90 [ 1131.097053] ? find_held_lock+0x35/0x130 [ 1131.101099] ? debug_check_no_obj_freed+0x200/0x464 [ 1131.106102] ? kasan_check_read+0x11/0x20 [ 1131.110232] ? __fget+0x340/0x540 [ 1131.113672] ? find_held_lock+0x35/0x130 [ 1131.117720] ? __fget+0x340/0x540 [ 1131.121166] block_ioctl+0xee/0x130 [ 1131.124775] ? blkdev_fallocate+0x410/0x410 [ 1131.129084] do_vfs_ioctl+0xd6e/0x1390 [ 1131.132961] ? ioctl_preallocate+0x210/0x210 [ 1131.137354] ? __fget+0x367/0x540 [ 1131.140808] ? iterate_fd+0x360/0x360 [ 1131.144593] ? do_sys_open+0x31d/0x5d0 [ 1131.148478] ? security_file_ioctl+0x93/0xc0 [ 1131.152871] ksys_ioctl+0xab/0xd0 [ 1131.156312] __x64_sys_ioctl+0x73/0xb0 [ 1131.160188] do_syscall_64+0x103/0x610 [ 1131.164074] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1131.169246] RIP: 0033:0x457c97 [ 1131.172423] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1131.191317] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1131.199016] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1131.206274] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1131.213531] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1131.220784] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1131.228039] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:18 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1131.283641] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 1131.308284] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1131.308284] [ 1131.320888] protocol 88fb is buggy, dev hsr_slave_0 [ 1131.326010] protocol 88fb is buggy, dev hsr_slave_1 [ 1131.331191] protocol 88fb is buggy, dev hsr_slave_0 [ 1131.336268] protocol 88fb is buggy, dev hsr_slave_1 [ 1131.341428] protocol 88fb is buggy, dev hsr_slave_0 [ 1131.346505] protocol 88fb is buggy, dev hsr_slave_1 16:59:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x7f02, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:18 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000b00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:18 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000180)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400203) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) getsockopt$inet6_dccp_int(r1, 0x21, 0x10, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) ioctl$VIDIOC_G_SELECTION(r2, 0xc040565e, 0xffffffffffffffff) 16:59:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009a00, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:18 executing program 5 (fault-call:2 fault-nth:21): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:18 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000b01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009a01, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = accept4(r0, &(0x7f0000000000)=@hci, &(0x7f0000000080)=0x80, 0x800) ioctl$sock_inet_sctp_SIOCINQ(r3, 0x541b, &(0x7f0000000180)) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1131.621385] FAULT_INJECTION: forcing a failure. [ 1131.621385] name failslab, interval 1, probability 0, space 0, times 0 [ 1131.648933] CPU: 0 PID: 5687 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1131.656161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1131.665519] Call Trace: [ 1131.668117] dump_stack+0x172/0x1f0 [ 1131.671750] should_fail.cold+0xa/0x1b [ 1131.675642] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1131.680748] ? lock_downgrade+0x810/0x810 [ 1131.684897] ? ___might_sleep+0x163/0x280 [ 1131.689050] __should_failslab+0x121/0x190 [ 1131.693293] should_failslab+0x9/0x14 [ 1131.697096] kmem_cache_alloc_node+0x265/0x710 [ 1131.701673] ? find_held_lock+0x35/0x130 [ 1131.705729] __alloc_skb+0xd5/0x5e0 [ 1131.709359] ? skb_scrub_packet+0x440/0x440 [ 1131.713675] ? kasan_check_read+0x11/0x20 [ 1131.717815] alloc_uevent_skb+0x83/0x1e2 [ 1131.721866] kobject_uevent_env+0xa63/0x1030 [ 1131.726266] kobject_uevent+0x20/0x26 [ 1131.730051] lo_ioctl+0x100b/0x20d0 [ 1131.733668] ? lo_rw_aio+0x1530/0x1530 [ 1131.737559] blkdev_ioctl+0xee8/0x1c40 [ 1131.741431] ? blkpg_ioctl+0xa90/0xa90 [ 1131.745304] ? find_held_lock+0x35/0x130 [ 1131.749355] ? debug_check_no_obj_freed+0x200/0x464 [ 1131.754658] ? kasan_check_read+0x11/0x20 [ 1131.758790] ? __fget+0x340/0x540 [ 1131.762231] ? find_held_lock+0x35/0x130 [ 1131.766275] ? __fget+0x340/0x540 [ 1131.769717] block_ioctl+0xee/0x130 [ 1131.773330] ? blkdev_fallocate+0x410/0x410 [ 1131.777638] do_vfs_ioctl+0xd6e/0x1390 [ 1131.781513] ? ioctl_preallocate+0x210/0x210 [ 1131.785905] ? __fget+0x367/0x540 [ 1131.789347] ? iterate_fd+0x360/0x360 [ 1131.793134] ? do_sys_open+0x31d/0x5d0 [ 1131.797015] ? security_file_ioctl+0x93/0xc0 [ 1131.801418] ksys_ioctl+0xab/0xd0 [ 1131.804861] __x64_sys_ioctl+0x73/0xb0 [ 1131.808738] do_syscall_64+0x103/0x610 [ 1131.812616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1131.817791] RIP: 0033:0x457c97 [ 1131.820969] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1131.840031] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1131.847723] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1131.854976] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1131.862228] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 16:59:18 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000c00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009a02, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1131.869484] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1131.876738] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:18 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000c01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:18 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffb, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1131.946872] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 1131.957176] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1131.957176] [ 1132.133529] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 16:59:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x8203, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009a03, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:19 executing program 5 (fault-call:2 fault-nth:22): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:19 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000d00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x501402, 0x0) mq_timedsend(r3, &(0x7f0000000180)="aa018b37f6740b1d268b18194741cf596cf79814d89236351465bd3c39ba421e873a3fb245690d562dbea93c0ec290fb0e832b88738b4926731def746ff3348370dfdc1e49f58f3bb5fe6193725722c60cf02ae4c9adcdb72de3fbc52c40336e20db196c80c112c8374d64439666c7a19efc7260f7bd7d36bbba086c43a81bdb1edba7e14424432a387e086fc6ecb37ffb7366e4c2cd3230eea4f518e76e08c4fdc78d26106ef737c1c7e92687176f7a29b3137d24925c9c022002b22c9b84a0b50e2d2298d53582e6abc065c924f56a1f4dd9ad2286fc23bbd235d8d94952e6dfbf0eb6b7a583f7292e4aab10e6a8b43be6dd34e71cca63ddf125e11f1196416bb22ffbd0ba0fee203a37bfdaa16241e7e0d8f6045ad3777ff894350b3ecfff9dbd02b72b73b9e378e7c85056ddede0097b7526f7899b127f4e5c3073097e3efa4127f93bd15d9626661bff120c58ceef8ea0d9dc48585c06869b345e4c188fe38c41b440323455343efc3d281be5be04e532969aa947c9bdc4f43eabead2dbfdc03462dfec9c352341a39b2595247a69800ab42e47a5884f79960bc76f36c017abcac085bcd6f097d741b3c014d1397d7ad84b815635920fb3b6fe212cad86504345fa1aa3e847fbca4051936534124f9158b158d6cc64b8b27a5287fed67258b589fd36ce651ca64dd108c1948f4fffc3bbd4998fb71996847219491d4d9d0dcbb08197ffb86d4e6813b9b8aab9724461b316e8d23f8d78ea5d18ded1560e868bd89b5115a9289960198a7a0d413158d66e624a92ccbadf51f62555c23311c859dfabd1d00a31c22c6be3e0e55424c0c1973bb14cee49ce3f6282fa2d8403cf7bc6974ee7667fe81ea0e3752ea684867ba01947776748bbf27a35f86b396df8439778ffa8ff7487670003013ce5e15e2849a7ee2912105313b6138e5a19945a459e54aabe835a86b10d0862e93542b14190946d527303d4939c6df4f382f21597e7590c931f6cdf74f64d65e9cd4b83c2a33db898daa301043783f9af4152edf6739dd69b0004e2c022413e3a7ed1e6be9a4cca68fe54c09b65b876c9598d168de9cb4290c778e17faaf930b89876512148d413f49cba8d501a40553c4b6f8172844cec1e542638384f273dd33c765b5f38fa214d3965facf39f2d3cdf320f1678c2608cd89f6e82afc070cfd776ef7a68dc7c89b33e722e80d8af47627c0d6efbd67f6c03b0f8405fe3c235c6e6ce3a871caf1225fe6787d54ac22452d44428932cb8c015adf308443d113e54b43e86e6a8e019aba7fc3e498740c7f7be022852284794cbf39766e12c820e7280923fa1e7a9c031a89e122e56c557b7918cef2f6d1c6a2a8a842d0d0c588d9b186d7482e8102535ddd30d3b2a23737c4cb0bb724822955cefde5a59f5d181d29aad2f7aba1e47b23507d79cceab075fa957db17f1f08a059962c024f25cd4703d708efd86b227723d62c977ecc26de3fe8ba971c6378fc3b9785cea2aea6894e9a01d924dc23b8820cd9b38bd6261346942ce55c6fc8866ae0b2ccd7fa87631cf2e3ac3b26b5bfe71f7a5b444524599b843aa82725c68009825036a1c535ade86b228a05a63a354db3fae11ddd0e7a6af4f7bc43c2e09b4af8469107cfb96377861ab1eb7d5d59bb3a3127a9989347f7149cc81a3b5e0ccb7cac2ec7785961a43ca2b9c1d3d068958d78d8f10cf5a4ebf884e9916d62028203a882055b9afb00ff946f0b3d482dea649abd06c831c246aaca6ec02d2902c8e44531d6b3df1c1822f4555f12ac3c6521109bb82eb832b284f0714c555f67d6a9028a822ed4e6b8abd70e45ed727ca42d29c97043184f39196fef48e5ff42e3024a22e4e3b5f429c2ab5dd4d4fb52a03d9cbd519b5de8dc3b917476fa7823bc64cdfbf4c911a4e52c53c63127d8c7db2b7c18854dc4e0f03380cd787db77d38c89e255474febdd0eda6837c3b19633b96d26a76f701801d69dea6d6f1c48e5b86ec49095ab04bf1c65430b665101a0045c77f83da9cac8368eda7d7f44ae74fa3642d2eb6960ab6efba298fe2d792f4ee64b9b9bbee81227a2b5f21b7940c781a93771514686311cea1f5b4838fc1e8fa80fc2e28a1c7404388c73b983ea30d1ae8de8e1aae7c062f1934fcc2c7e4828cc8dda6e3325afd3ba816d9d85f6b75dc902263d815e13bd57e0febe8587af1b7cce7f7d7a94dfe879ecddf0c8f1b25e6fefa8ff91dcad511619d714b395c1f14d6fcc51b1b7abf3579cfe0fe29c94f86e23b1a6ab98793ae333d165a769b743add9ae5a43f0c3963ded2e63ac8315d072dcb3e5295c7b7f92258389bf5da53645f1df17a523da58a84c2e6f43855fbc16475191d814f1b1e430282f9a9469b343977202f6ef7e01dabb19f7feb7bfbb3119f790a3db89f671528cd8db33206cafea9735310328ff097e24f5663e0144425067eee69d7ed440531065bede1c072fcb154248fd358088be5b8951ed9ba2f8b88cbe88c184d5af4744499f1f9de3f4192762161a591a2f833705ace93612eba9055ff45d6979ff569eaaa41f4f9eeb5812e597d00dabfbf107c4eebdb7d9939d24391d3aa4d93f6a90a28397980bfa405c3c0bc64759f7f22cb9b4d02406546adafa438349db38ad9e28c3a8fea5f229b69d39c6b0b831f7f9275c24c4576c55fc8ba8af7b8107224c059b76d5f87d19d0f57a1cfe027e86b3e37ded9dd9e864400a66f7c0051e85996e146d892977eb61077055d8bad93b9fdfb1d66ab69302d4132d4542433e4ddd97746c7a677cb97ec3deb2eeb20358ea6850becfaa5ef531d7210e01f3573131e68b99f77e7af9bfd806f8641cbeadb23cbea4868acbb050b056f8099ad38414ac9b01e1e82ae0f6368950f813a01cc698f80419d436c70490d2c18944ccc871648edc381c6e7734b44816751c2ff17207eb6b90e8c66ca9697bc8ecf7bb574940b0fd4d5fe9668fae45813edd65a314149cb4794699d321f723dc2948ed47be4937fd08e0942ec90e2ff356f45ca64b141f8b06b7b8185737fb4d7418a920b68ebf0b304115ebc377207897e56dd51304f75dc535d8160972d2177e042c459b77794feedb39b4c601b202eb27a21c957c0aa955f74d29920cafe980cbfeaa914739692a0890316d2803e0db80206ca17a1a9a4ced44309e98205a3270e786d299c605e505ac2e0ce70b0b66ba4f85a0756beb460dc5cc8b97fd08aa584ce6dd5cc11867da123dc357afc4f9d455ed8c03644abd13021281aa12035779663cf5a1cc1870b9cece0c4593fbc092b2e1bde7a290107a6cc6662b51c6eab56f305720d60762b0a3dbbee256a15975a606e09b2e4ca036187625186fda56ee24b9ecb3342aa86d5fc14548117ce648cc245d6b326e0fe489998ecd6b996d564aeb40ef336f19f20fdb0def17f8e97019b0e5a53c66d4d3ee3a24d0b1c551c74ffe87969c9f59bf7634520539196165f648ff40479d46333604bf0984fbde13c530356924f95f5810f3c6cbd360a1b2b3f7d1fd7bfdc0965e9ccd05c78f61e2a26c623ce0e082ca07252608b52e6ca0f7ab7a507753dfdd79ec3873dedb00754fd8e3b4e2f504bde926c3fbedc5b37393ecb68f333bdefaece640e09ce20838122375007fdeb229dc70e6605cf0c55ac250a556508bb2cfaf00a52d4395ef27c3f4d849719a0e8b642cae6d13c5e39963216d05d56c823e71049c05ea504c3d09caa38bad1034cb171eacae6967ee070aeb42e4b74e0edf34545218199ac1a3114d88dc376a8a7e6bce4dd6d3d0b58d47cce33c5ac457e05ea93489b804f0a4d752f196a279c6ce3a6de86a51e0a2b77a6413145b15d5f392a82b75d152525ebdb482273d408dda620f12eefcebf03aba105454e42ba11770783bb21957895ae37a7680f8bc4ee6722213ed8e6f64cfc7b561698aa6266ae00097f820232288f69312f390663f09823fedea86c9f2b281d554fe6e48ec51e78b3373e56e81b22e2533eff85d347f3c4a1e54d178623894c39d9f9abccbf65a6b1906ba8f71ace1a4fa6b5c45916efdabe7a028ba503ead647a4424c797d447ffc49b65be1e3080408e3e2e3d46a46c345c3bdad434a21a85ce17c65a2336dda8b8bea1b0e15443f09d1efd3807cd9d3099e603da2d8494df252b6c47e4f734c1e9afadbe9624cdaefdc943cd750bcc0d9b8b3b117aa6bbb7fe2fe342bfef345f865844b8cec7716717474ef38325b4e7e04cf2c7ab2e730b1fc4954d351773e0cc7e786a424b160aff87c40e1db0e28e6753bb02c7931bc91fb2f7dd902d2096f2c5b2d036b4ce4f5c0df8e465ac9f3205c111919928c1e5d35a90e699651e313972e654ddc7e2c73e79e7bd90fd55ae5706d4972145a9f022bfedb8e3930bf95fd5d4335b049507008e802d76c31b8073ce25273079485bf571bf2c130b4b262fc68b393f901791295d393985810b1beba2612931a22d36dfb16a0d38239abd24f92de30c56c59f964de688840fa7c40915bf770ba3b4e956edaabff7a6de326ded8bf301f1796d28a6b57ad34923e33efd65815809463ab4c335c5fbe600581375eb774e84616f43ab30180dd6fde10defb032cfd9b2b44bde955dc2b78a06fff9d7b46abc6bfbe7573f2fbb90d5c1c7905f2de79a0809375a4c1bfe7c6a17081f58aba7aef61d6fb23cbeabca9b090154a65597a128d163a713ced7f844caa7e71373e046dd541d10ab1ec0fb743110366ee69f97d8472c229598c501658150605e5de204c010811b6c2caf65b51fe6de45390322ca06609b24a69866c3a388a3f157a0270c5b4f95d7ee35a54b3910a6807debc1756c9f8796258b7d0c3e8fd110e2db5fd75126c80eae7c647da901f661901ba11a633f30faa27eee7ac0cac3a52113ed58af44a3333c1ef552b5e286a7dc21af65e3b15d6e5d4f2b38e88e94bb73c1d849d478e3007c6a582a6c93fe5a2029691a3f7719f5634eeb7fa69fbf90919703da4fd339069d1b6ff823ed03c405490f9b812743af1416f052cf61755ee552b538f5c27b17c127ba89f5a23330d3525366f43d5304ec9dd02a1151560d751d19184028b2aa96f48ce03507aaaece925351fd28b26de02634ec30bf9890a131a592d7def030b359a78fcce50b6325e0fddddfc378f8fc59c00ca7d599be7bfdd1621604697f9a533798d9749a358a80621cefb5d07c615343e684bc070b6e45ce98b3e677453722e11b634564683238754ffa111480e231786dcd8ed639cca4b0a81ae1bf5e71758a6eee9effead5aa6c495e1103cf56475a2b728c6dbfe77c39409f40fa86f3ee4a47248aefcdfd25ef1f2985d2e048a005054f65c1e16676ef08a07d5d928962f6af78cc5f26ac454bed213d7de90e43f9a2661168f6d606c27cb427ecce825d3ae391bcc6f6a6fea8fffdc9084113a73812ad7b9dba8f67c3c2aa9f6d6b12b39bc127f11188cd4edfdd541ebe007d5e8e93d02eef6f198afe5f395457d22970fbf6a3d10ec6884b39aeda322b1c3f2fb3ce87ec4db71ac4e70b4d91f03794c6e4d91dfc8bff562d16b2d5cd28385782a7f240b0980e25d16dc63a0060ef3d5cc784f6bb2aed9af61e15b4e68c100a3898727bc3a3b25a46f895d1158d413057e69844abc41f4cef7eb718a61665f6e8393df78280578afca6c788e3e8e204fb82933c190cebaba8e1a5d016e7101260fa88c705abd2a94d0d4035f184816cbd1dae1745c7620d07815237d178000167ddb77a3c61704a999deb31c470b9f7f396bf84ecc94528756ca", 0x1000, 0x80, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 16:59:19 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffe, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:19 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000d01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1132.289633] FAULT_INJECTION: forcing a failure. [ 1132.289633] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.301592] CPU: 1 PID: 5720 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1132.308793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1132.318147] Call Trace: [ 1132.320746] dump_stack+0x172/0x1f0 [ 1132.324390] should_fail.cold+0xa/0x1b [ 1132.328282] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1132.333403] ? lock_downgrade+0x810/0x810 [ 1132.337553] ? ___might_sleep+0x163/0x280 [ 1132.341710] __should_failslab+0x121/0x190 [ 1132.345953] should_failslab+0x9/0x14 [ 1132.349849] kmem_cache_alloc_node_trace+0x270/0x720 [ 1132.354963] ? __alloc_skb+0xd5/0x5e0 [ 1132.358773] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1132.364228] __kmalloc_node_track_caller+0x3d/0x70 [ 1132.369162] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1132.373836] __alloc_skb+0x10b/0x5e0 [ 1132.377555] ? skb_scrub_packet+0x440/0x440 [ 1132.381879] ? kasan_check_read+0x11/0x20 [ 1132.386022] alloc_uevent_skb+0x83/0x1e2 [ 1132.390075] kobject_uevent_env+0xa63/0x1030 [ 1132.394480] kobject_uevent+0x20/0x26 [ 1132.398269] lo_ioctl+0x100b/0x20d0 [ 1132.401884] ? lo_rw_aio+0x1530/0x1530 [ 1132.405761] blkdev_ioctl+0xee8/0x1c40 [ 1132.409635] ? blkpg_ioctl+0xa90/0xa90 [ 1132.413516] ? find_held_lock+0x35/0x130 [ 1132.417564] ? debug_check_no_obj_freed+0x200/0x464 [ 1132.422589] ? kasan_check_read+0x11/0x20 [ 1132.426723] ? __fget+0x340/0x540 [ 1132.430159] ? find_held_lock+0x35/0x130 [ 1132.434205] ? __fget+0x340/0x540 [ 1132.437647] block_ioctl+0xee/0x130 [ 1132.441259] ? blkdev_fallocate+0x410/0x410 [ 1132.445570] do_vfs_ioctl+0xd6e/0x1390 [ 1132.449469] ? ioctl_preallocate+0x210/0x210 [ 1132.453863] ? __fget+0x367/0x540 [ 1132.457303] ? iterate_fd+0x360/0x360 [ 1132.461092] ? do_sys_open+0x31d/0x5d0 [ 1132.465412] ? security_file_ioctl+0x93/0xc0 [ 1132.469810] ksys_ioctl+0xab/0xd0 [ 1132.473254] __x64_sys_ioctl+0x73/0xb0 [ 1132.477132] do_syscall_64+0x103/0x610 [ 1132.481011] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1132.486183] RIP: 0033:0x457c97 [ 1132.489369] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1132.508253] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1132.515948] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1132.523200] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1132.530458] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1132.537709] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1132.544963] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009a04, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:19 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000e00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1132.588624] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 16:59:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7, 0x441) r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x420200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x3}) [ 1132.647990] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1132.647990] 16:59:19 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1132.862062] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 16:59:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x8700, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009a05, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:19 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000e01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dsp\x00', 0x101000, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000480), 0x4) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000000)={0x4, 0x200, 0x10001, 0x5}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$tipc(r1, &(0x7f0000000400)={&(0x7f00000001c0)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x3}}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000200)="a8276b2e51aeb2ced8f9416cdbf9c43f73ff9759bc", 0x15}, {&(0x7f0000000240)="a17372aa6d2fc0c4593c701522f193be2aca0b151c5fbf718989a2867e4cabe51f46570a78e51f33bd11214b07110fa788d3c24c2e1127087471e33a0adac0eb00e4e086bce4a5d2e86239f157fbcc3e9dac8fb6a95daa7634b85c9240d65882f1fc6e2b23d720", 0x67}], 0x2, &(0x7f0000000300)="36bfc57250e85ac88dd30c66ab5fba990612619074bfcd74fec3c89759988e52dbb7842fbe94a88d19ed85cbf36be97d21168ecd93355d41758ef73280fc1566f1d705041954e519e8a53626a598193408fc9629af9ddc05d23d13761e3ba7d336120c1c34a9fedfc35b343a6fe48adb71cddd8c27a30bf714f8ff67c08776646db75f81161edb82503b46e0cde9bb2cea97d6f96e0fcdc838584c8425a5d26d1bed9be5ed6c1a233c17e5bdff53798b283f55b3248de485993079612de38bafb12e0bbc05a349db27df7c44387cd3dcf325e8866c1da8a3", 0xd8, 0x4000000}, 0x20000090) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4100, 0x0) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000080)={0x5, 0x0, 0x8000}) ioctl$GIO_FONTX(r4, 0x4b6b, &(0x7f0000000180)=""/17) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:19 executing program 5 (fault-call:2 fault-nth:23): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:19 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:19 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000f00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009a06, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:19 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x400080, 0x0) r0 = socket$isdn_base(0x22, 0x3, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400208) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = accept4$llc(0xffffffffffffff9c, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x10, 0x80800) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0x7}, &(0x7f0000000240)=0x8) prctl$PR_CAPBSET_DROP(0x18, 0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000280)={r7, @in={{0x2, 0x4e21, @rand_addr=0x1}}, 0x9, 0xffffffffffffff4f, 0x95d2, 0x5, 0x1}, &(0x7f0000000340)=0x98) sendto$llc(r6, &(0x7f0000000180)="ae4a4c2746df926feddf2a1f81e5ed9b2a2a7b1a5dcc105f9377f118b9860d871fbf53018d6e11b6eb657cfca55ac03013657084185f3d6a4faea2f828abcbfd9b2f751a63e3aad329130672f90a220154f6e1ff01502681e465fe01a4574ab9347e1181f30cd7f583", 0x69, 0x2000c001, &(0x7f0000000080)={0x1a, 0x308, 0x1, 0x1, 0x10000, 0x4, @local}, 0x10) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1133.119451] FAULT_INJECTION: forcing a failure. [ 1133.119451] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.139022] CPU: 0 PID: 5768 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1133.146250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1133.155606] Call Trace: [ 1133.158199] dump_stack+0x172/0x1f0 [ 1133.161844] should_fail.cold+0xa/0x1b [ 1133.165736] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1133.170845] ? lock_downgrade+0x810/0x810 [ 1133.174996] ? ___might_sleep+0x163/0x280 [ 1133.179152] __should_failslab+0x121/0x190 [ 1133.183400] should_failslab+0x9/0x14 [ 1133.187207] kmem_cache_alloc_node_trace+0x270/0x720 [ 1133.192326] ? __alloc_skb+0xd5/0x5e0 [ 1133.196134] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1133.201595] __kmalloc_node_track_caller+0x3d/0x70 [ 1133.206530] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1133.211202] __alloc_skb+0x10b/0x5e0 [ 1133.214917] ? skb_scrub_packet+0x440/0x440 [ 1133.219241] ? kasan_check_read+0x11/0x20 [ 1133.223399] alloc_uevent_skb+0x83/0x1e2 [ 1133.227463] kobject_uevent_env+0xa63/0x1030 [ 1133.231884] kobject_uevent+0x20/0x26 [ 1133.235687] lo_ioctl+0x100b/0x20d0 [ 1133.239327] ? lo_rw_aio+0x1530/0x1530 [ 1133.243217] blkdev_ioctl+0xee8/0x1c40 [ 1133.247135] ? blkpg_ioctl+0xa90/0xa90 [ 1133.251023] ? find_held_lock+0x35/0x130 [ 1133.255084] ? debug_check_no_obj_freed+0x200/0x464 [ 1133.260106] ? kasan_check_read+0x11/0x20 [ 1133.264253] ? __fget+0x340/0x540 [ 1133.267712] ? find_held_lock+0x35/0x130 [ 1133.271770] ? __fget+0x340/0x540 [ 1133.275231] block_ioctl+0xee/0x130 [ 1133.278855] ? blkdev_fallocate+0x410/0x410 [ 1133.283184] do_vfs_ioctl+0xd6e/0x1390 [ 1133.287081] ? ioctl_preallocate+0x210/0x210 [ 1133.291493] ? __fget+0x367/0x540 [ 1133.294951] ? iterate_fd+0x360/0x360 [ 1133.298757] ? do_sys_open+0x31d/0x5d0 [ 1133.302654] ? security_file_ioctl+0x93/0xc0 [ 1133.307068] ksys_ioctl+0xab/0xd0 [ 1133.310522] __x64_sys_ioctl+0x73/0xb0 [ 1133.314416] do_syscall_64+0x103/0x610 [ 1133.318313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1133.323496] RIP: 0033:0x457c97 [ 1133.326686] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1133.345677] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1133.353395] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1133.360675] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1133.367940] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1133.375211] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1133.382481] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:20 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1000f01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1133.439980] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 16:59:20 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:20 executing program 5 (fault-call:2 fault-nth:24): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1133.487342] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1133.487342] 16:59:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x9c02, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009a07, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:20 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001001, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:20 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1133.729756] FAULT_INJECTION: forcing a failure. [ 1133.729756] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.760492] CPU: 1 PID: 5808 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1133.767712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1133.767722] Call Trace: [ 1133.779669] dump_stack+0x172/0x1f0 [ 1133.783304] should_fail.cold+0xa/0x1b [ 1133.787212] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1133.792336] ? lock_downgrade+0x810/0x810 [ 1133.796483] ? ___might_sleep+0x163/0x280 [ 1133.796500] __should_failslab+0x121/0x190 [ 1133.796516] should_failslab+0x9/0x14 [ 1133.804870] kmem_cache_alloc+0x2be/0x710 [ 1133.804884] ? __fget+0x367/0x540 [ 1133.804906] getname_flags+0xd6/0x5b0 [ 1133.804922] do_mkdirat+0xa0/0x2a0 [ 1133.804940] ? __ia32_sys_mknod+0xb0/0xb0 [ 1133.827693] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1133.832432] ? do_syscall_64+0x26/0x610 [ 1133.836395] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1133.841742] ? do_syscall_64+0x26/0x610 [ 1133.845700] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1133.850271] __x64_sys_mkdir+0x5c/0x80 [ 1133.854144] do_syscall_64+0x103/0x610 [ 1133.858022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1133.863194] RIP: 0033:0x457247 16:59:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009a08, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:20 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001100, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1133.866372] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1133.885257] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1133.892950] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1133.900204] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 1133.907471] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1133.914725] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1133.921976] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:20 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001101, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:20 executing program 5 (fault-call:2 fault-nth:25): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1134.047625] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1134.047625] 16:59:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000000)=0x1000) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009b00, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:21 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1134.182882] FAULT_INJECTION: forcing a failure. [ 1134.182882] name failslab, interval 1, probability 0, space 0, times 0 [ 1134.206646] CPU: 0 PID: 5836 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1134.213885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1134.223237] Call Trace: [ 1134.225831] dump_stack+0x172/0x1f0 [ 1134.229463] should_fail.cold+0xa/0x1b [ 1134.229483] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1134.238452] ? lock_downgrade+0x810/0x810 [ 1134.238469] ? ___might_sleep+0x163/0x280 [ 1134.238486] __should_failslab+0x121/0x190 [ 1134.246743] should_failslab+0x9/0x14 [ 1134.246757] kmem_cache_alloc+0x2be/0x710 [ 1134.246771] ? __fget+0x367/0x540 [ 1134.258922] getname_flags+0xd6/0x5b0 [ 1134.258945] do_mkdirat+0xa0/0x2a0 [ 1134.266170] ? __ia32_sys_mknod+0xb0/0xb0 [ 1134.266186] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1134.266210] ? do_syscall_64+0x26/0x610 [ 1134.273855] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1134.273868] ? do_syscall_64+0x26/0x610 [ 1134.273883] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1134.273903] __x64_sys_mkdir+0x5c/0x80 [ 1134.273917] do_syscall_64+0x103/0x610 [ 1134.273933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1134.282621] RIP: 0033:0x457247 [ 1134.282636] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1134.282645] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1134.291944] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1134.291953] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 1134.291961] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1134.291970] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1134.291978] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x9c03, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009b01, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:21 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001200, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_getscheduler(r2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000480)={0x20, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x02'}]}]}, 0x20}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x4a100, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r6, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009b02, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:21 executing program 5 (fault-call:2 fault-nth:26): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:21 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x7ffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:21 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001201, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0xc) kcmp(r4, r5, 0x3, r2, r2) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x200000) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) preadv(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/210, 0xd2}, {&(0x7f00000002c0)=""/155, 0x9b}], 0x2, 0x0) [ 1134.647213] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1134.647213] [ 1134.679696] FAULT_INJECTION: forcing a failure. [ 1134.679696] name failslab, interval 1, probability 0, space 0, times 0 [ 1134.698704] CPU: 0 PID: 5874 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1134.705922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1134.715280] Call Trace: [ 1134.717880] dump_stack+0x172/0x1f0 [ 1134.721515] should_fail.cold+0xa/0x1b [ 1134.725410] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1134.730528] ? ___might_sleep+0x163/0x280 [ 1134.734683] __should_failslab+0x121/0x190 [ 1134.738935] should_failslab+0x9/0x14 [ 1134.742743] kmem_cache_alloc+0x2be/0x710 [ 1134.746904] ? unwind_get_return_address+0x61/0xa0 [ 1134.751839] ? __save_stack_trace+0x8a/0xf0 [ 1134.756171] ? ratelimit_state_init+0xb0/0xb0 [ 1134.760668] ext4_alloc_inode+0x1f/0x640 [ 1134.764729] ? ratelimit_state_init+0xb0/0xb0 [ 1134.769229] alloc_inode+0x66/0x190 [ 1134.772861] new_inode_pseudo+0x19/0xf0 [ 1134.776837] new_inode+0x1f/0x40 [ 1134.780207] __ext4_new_inode+0x3cb/0x52c0 [ 1134.784453] ? putname+0xef/0x130 [ 1134.787912] ? do_syscall_64+0x103/0x610 [ 1134.791973] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1134.797338] ? d_splice_alias+0x6c1/0xcc0 [ 1134.801489] ? find_held_lock+0x35/0x130 [ 1134.805549] ? debug_check_no_obj_freed+0x200/0x464 [ 1134.810570] ? ext4_free_inode+0x1470/0x1470 [ 1134.814987] ? lock_downgrade+0x810/0x810 [ 1134.819138] ? dquot_get_next_dqblk+0x180/0x180 [ 1134.823824] ? __lock_is_held+0xb6/0x140 [ 1134.827883] ? check_preemption_disabled+0x48/0x290 [ 1134.832909] ext4_mkdir+0x3d5/0xdf0 [ 1134.836548] ? ext4_init_dot_dotdot+0x520/0x520 [ 1134.841222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1134.846760] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1134.852307] ? security_inode_permission+0xd5/0x110 [ 1134.857322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1134.862859] ? security_inode_mkdir+0xee/0x120 [ 1134.867443] vfs_mkdir+0x433/0x690 [ 1134.870989] do_mkdirat+0x234/0x2a0 [ 1134.874624] ? __ia32_sys_mknod+0xb0/0xb0 [ 1134.878774] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1134.883533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1134.888895] ? do_syscall_64+0x26/0x610 [ 1134.892876] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1134.897461] __x64_sys_mkdir+0x5c/0x80 [ 1134.901355] do_syscall_64+0x103/0x610 [ 1134.905270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1134.910456] RIP: 0033:0x457247 [ 1134.913647] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1134.932545] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1134.940257] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 16:59:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009b03, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1134.947526] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 1134.954797] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1134.962062] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1134.969326] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:21 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001300, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1135.082583] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 16:59:21 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001301, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xac03, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:22 executing program 5 (fault-call:2 fault-nth:27): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget(0x1, 0x0, 0x681) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000480)='./file0\x00', r6, r4) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000400)={{0x7ff, r3, r5, r6, r7, 0x8, 0xfff}, 0x80000001, 0xf31, 0x6}) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000540)=0x0) setpgid(r11, r12) ioctl$KVM_SET_VCPU_EVENTS(r10, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:22 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001400, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009b04, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:22 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1135.311609] FAULT_INJECTION: forcing a failure. [ 1135.311609] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.369813] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1135.369813] [ 1135.372033] CPU: 1 PID: 5896 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1135.387719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1135.397079] Call Trace: [ 1135.399692] dump_stack+0x172/0x1f0 [ 1135.403330] should_fail.cold+0xa/0x1b [ 1135.407222] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1135.412329] ? lock_downgrade+0x810/0x810 [ 1135.416481] ? ___might_sleep+0x163/0x280 [ 1135.420634] __should_failslab+0x121/0x190 [ 1135.424880] should_failslab+0x9/0x14 [ 1135.428683] kmem_cache_alloc+0x2be/0x710 [ 1135.432839] ? __d_lookup+0x433/0x760 [ 1135.436643] ? lookup_dcache+0x23/0x140 [ 1135.440621] ? d_lookup+0xf9/0x260 [ 1135.444160] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1135.448752] __d_alloc+0x2e/0x8c0 [ 1135.452209] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1135.457228] d_alloc+0x4d/0x2b0 [ 1135.460512] __lookup_hash+0xcd/0x190 [ 1135.464318] filename_create+0x1a7/0x4f0 [ 1135.468384] ? kern_path_mountpoint+0x40/0x40 [ 1135.472883] ? strncpy_from_user+0x2a8/0x380 [ 1135.477298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1135.482834] ? getname_flags+0x277/0x5b0 [ 1135.486929] do_mkdirat+0xb5/0x2a0 [ 1135.490473] ? __ia32_sys_mknod+0xb0/0xb0 [ 1135.494620] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1135.499380] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1135.504741] ? do_syscall_64+0x26/0x610 [ 1135.508719] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1135.513309] __x64_sys_mkdir+0x5c/0x80 [ 1135.517221] do_syscall_64+0x103/0x610 [ 1135.521121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1135.526305] RIP: 0033:0x457247 [ 1135.529505] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1135.548403] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1135.556120] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1135.563385] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 16:59:22 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001401, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1135.570650] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1135.577918] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1135.585182] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/hwrng\x00', 0x40, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000680)=0xff93) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x9, 0x2, &(0x7f0000000280)=[{&(0x7f00000001c0)="5ed5287f1feda6c4606b72fae759d8fe12bf0618b97b59d6cbdde811d05fcbe83b0269d3a4b43871d41288469cbb297fa1cdc092a4fd80dc56112abe097e5d280fe4a496", 0x44, 0x10001}, {&(0x7f0000000240)="796b90f84ad72fc58d32", 0xa, 0xe61}], 0x2410, &(0x7f0000000540)={[{@fat=@uid={'uid', 0x3d, r2}}, {@dots='dots'}, {@fat=@sys_immutable='sys_immutable'}], [{@fsname={'fsname', 0x3d, '/dev/admmidi#\x00'}}, {@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, '/dev/admmidi#\x00'}}, {@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r4}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x32, 0x37, 0x77, 0x65, 0x7f, 0x65, 0x77], 0x2d, [0x35, 0x31, 0x30, 0x77], 0x2d, [0x64, 0x63, 0x66, 0x64], 0x2d, [0x36, 0x38, 0x7f, 0x33], 0x2d, [0x76, 0x62, 0x0, 0x77, 0x3f, 0x0, 0x30, 0x77]}}}]}) r5 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r6, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) r7 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x80000) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000640)='fsuuid') ioctl$PPPIOCGUNIT(r7, 0x80047456, &(0x7f0000000040)) r8 = getpid() ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000500)=0x0) setpgid(r8, r9) 16:59:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009b05, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:22 executing program 5 (fault-call:2 fault-nth:28): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:22 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001500, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1135.680347] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1135.680347] 16:59:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x501c00, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xd802, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009b06, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:22 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1135.828580] FAULT_INJECTION: forcing a failure. [ 1135.828580] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.845578] CPU: 1 PID: 5935 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1135.852786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1135.862152] Call Trace: [ 1135.864740] dump_stack+0x172/0x1f0 [ 1135.868364] should_fail.cold+0xa/0x1b [ 1135.872246] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1135.877362] ? ___might_sleep+0x163/0x280 [ 1135.881499] __should_failslab+0x121/0x190 [ 1135.885723] should_failslab+0x9/0x14 [ 1135.889507] kmem_cache_alloc+0x2be/0x710 [ 1135.893642] ? rcu_read_lock_sched_held+0x110/0x130 [ 1135.898652] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1135.904176] ? __mark_inode_dirty+0x241/0x1290 [ 1135.908746] ext4_mb_new_blocks+0x5a8/0x3c70 [ 1135.913163] ? ext4_find_extent+0x76e/0x9d0 [ 1135.917478] ext4_ext_map_blocks+0x3094/0x4e50 [ 1135.922052] ? ext4_ext_release+0x10/0x10 [ 1135.926195] ? __lock_is_held+0xb6/0x140 [ 1135.930259] ext4_map_blocks+0x8ec/0x1a20 [ 1135.934398] ? ext4_issue_zeroout+0x170/0x170 [ 1135.938880] ? kasan_check_write+0x14/0x20 [ 1135.943102] ? __brelse+0x95/0xb0 [ 1135.946546] ext4_getblk+0xc4/0x510 [ 1135.950160] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1135.954470] ? ext4_free_inode+0x1470/0x1470 [ 1135.958865] ext4_bread+0x8f/0x230 [ 1135.962394] ? ext4_getblk+0x510/0x510 [ 1135.966274] ext4_append+0x155/0x370 [ 1135.969977] ext4_mkdir+0x61b/0xdf0 [ 1135.973601] ? ext4_init_dot_dotdot+0x520/0x520 [ 1135.978255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1135.983777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1135.989300] ? security_inode_permission+0xd5/0x110 [ 1135.994303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1135.999822] ? security_inode_mkdir+0xee/0x120 [ 1136.004407] vfs_mkdir+0x433/0x690 [ 1136.007939] do_mkdirat+0x234/0x2a0 [ 1136.011554] ? __ia32_sys_mknod+0xb0/0xb0 [ 1136.015688] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1136.020441] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1136.025788] ? do_syscall_64+0x26/0x610 [ 1136.029749] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1136.034407] __x64_sys_mkdir+0x5c/0x80 [ 1136.038279] do_syscall_64+0x103/0x610 [ 1136.042155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1136.047325] RIP: 0033:0x457247 [ 1136.050506] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1136.069393] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 16:59:22 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001501, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1136.077084] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1136.084336] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 1136.091589] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1136.098841] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1136.106094] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009b07, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:23 executing program 5 (fault-call:2 fault-nth:29): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1136.269830] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1136.269830] 16:59:23 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001600, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:23 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1136.369377] FAULT_INJECTION: forcing a failure. [ 1136.369377] name failslab, interval 1, probability 0, space 0, times 0 [ 1136.380739] CPU: 1 PID: 5959 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1136.387928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1136.397279] Call Trace: [ 1136.399872] dump_stack+0x172/0x1f0 [ 1136.403505] should_fail.cold+0xa/0x1b [ 1136.407400] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1136.412503] ? save_stack+0xa9/0xd0 [ 1136.416129] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1136.421067] __should_failslab+0x121/0x190 [ 1136.425305] should_failslab+0x9/0x14 [ 1136.429109] kmem_cache_alloc+0x47/0x710 [ 1136.433176] ? ext4_es_scan+0x6f0/0x6f0 [ 1136.437147] ? do_raw_write_lock+0x124/0x290 [ 1136.441563] __es_insert_extent+0x2cc/0xf20 [ 1136.445891] ext4_es_insert_extent+0x2b7/0xa40 [ 1136.450477] ? ext4_es_scan_clu+0x50/0x50 [ 1136.454632] ? rcu_read_lock_sched_held+0x110/0x130 [ 1136.459646] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1136.465184] ? ext4_es_find_extent_range+0xff/0x600 [ 1136.470207] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1136.475061] ? ext4_rereserve_cluster+0x240/0x240 [ 1136.479901] ? ext4_find_extent+0x76e/0x9d0 [ 1136.484223] ? ext4_find_extent+0x6a6/0x9d0 [ 1136.488548] ext4_ext_map_blocks+0x216a/0x4e50 [ 1136.493139] ? ext4_ext_release+0x10/0x10 [ 1136.497287] ? __lock_is_held+0xb6/0x140 [ 1136.501383] ? lock_acquire+0x16f/0x3f0 [ 1136.505361] ? ext4_map_blocks+0x424/0x1a20 [ 1136.509696] ext4_map_blocks+0xecb/0x1a20 [ 1136.513867] ? ext4_issue_zeroout+0x170/0x170 [ 1136.518365] ? kasan_check_write+0x14/0x20 [ 1136.522607] ? __brelse+0x95/0xb0 [ 1136.526068] ext4_getblk+0xc4/0x510 [ 1136.529701] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1136.534034] ? ext4_free_inode+0x1470/0x1470 [ 1136.538445] ext4_bread+0x8f/0x230 [ 1136.541990] ? ext4_getblk+0x510/0x510 [ 1136.545896] ext4_append+0x155/0x370 [ 1136.549621] ext4_mkdir+0x61b/0xdf0 [ 1136.553256] ? ext4_init_dot_dotdot+0x520/0x520 [ 1136.557928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1136.563460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1136.569002] ? security_inode_permission+0xd5/0x110 [ 1136.574034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1136.579584] ? security_inode_mkdir+0xee/0x120 [ 1136.584516] vfs_mkdir+0x433/0x690 [ 1136.588065] do_mkdirat+0x234/0x2a0 [ 1136.591696] ? __ia32_sys_mknod+0xb0/0xb0 [ 1136.595846] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1136.600610] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1136.605972] ? do_syscall_64+0x26/0x610 [ 1136.609954] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1136.614539] __x64_sys_mkdir+0x5c/0x80 [ 1136.618429] do_syscall_64+0x103/0x610 [ 1136.622411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1136.627606] RIP: 0033:0x457247 [ 1136.630799] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1136.649698] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1136.657406] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 16:59:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$cec(&(0x7f0000001640)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet6_tcp_buf(r1, 0x6, 0xb, &(0x7f0000001680)=""/125, &(0x7f0000001700)=0x7d) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009b08, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1136.664672] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 1136.671935] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1136.679204] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1136.686471] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:23 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001601, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000000)={0x2}) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xe803, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:23 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001700, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1136.746582] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 16:59:23 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009c00, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1136.867348] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1136.867348] 16:59:23 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0xb143) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$rose(r1, &(0x7f0000000040)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x0, [@null, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x40) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x1000) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1136.949991] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1136.949991] [ 1137.000893] net_ratelimit: 20 callbacks suppressed [ 1137.000901] protocol 88fb is buggy, dev hsr_slave_0 [ 1137.011016] protocol 88fb is buggy, dev hsr_slave_1 16:59:23 executing program 5 (fault-call:2 fault-nth:30): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:23 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001701, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xeb03, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:24 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001800, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009c01, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1137.160880] protocol 88fb is buggy, dev hsr_slave_0 [ 1137.165981] protocol 88fb is buggy, dev hsr_slave_1 16:59:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xffffffffffff8000, 0x200800) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000000180)={0x24, "919aadd78434b869aa07eed062863eacf2c1f6b1cb03045fed71709b9a03acd530f3b8543239ccf44fb1d41b7d920b6f1975ce22e5e51e85741e348119c604b4ab5fb29e7567ac7d4402f1a5ca80005fe13746e0b9bd721f87654ba1a25d92554baee3e1e16e55b508778823e9a6101622b59108205393ad7be9ce1a1987458a"}) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x1) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000640)={'filter\x00', 0x7, 0x4, 0x570, 0x130, 0x270, 0x0, 0x488, 0x488, 0x488, 0x4, &(0x7f0000000600), {[{{@uncond, 0xf0, 0x130}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0xfffffffffffffff7, 0x1, 0x46}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffff00, 0x0, @mac, {[0x0, 0x0, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}, 0x101, 0x171, 0x2638, 0xcc4, 0x200, 0x100000000, 'hsr0\x00', 'ip6erspan0\x00', {0xff}, {}, 0x0, 0x20}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@broadcast, @remote, @remote, 0x8, 0xffffffff}}}, {{@arp={@broadcast, @remote, 0x0, 0xff000000, @mac=@broadcast, {[0xff, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0x0, 0xff, 0xff, 0xff]}, 0x1, 0xd5, 0x0, 0x9, 0x5, 0xfffffffffffffff9, '\x00', 'team0\x00', {}, {0xff}, 0x0, 0x1}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x81, 'system_u:object_r:urandom_device_t:s0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5c0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) write$binfmt_elf32(r3, &(0x7f0000000c00)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x4, 0x7, 0x56800000, 0x5, 0x3, 0x3f, 0xc4f, 0x341, 0x38, 0xf7, 0x3ff, 0x8, 0x20, 0x1, 0x9, 0x3, 0x837e}, [{0x60000005, 0x401, 0xac, 0xfffffffffffffff7, 0x6, 0x0, 0x2, 0x4}, {0x70000007, 0x0, 0x8, 0x100000000, 0x7fffffff, 0x8, 0x2394, 0x5}], "5835d00b0159272b698874ca4f5dce32634a83a9f46acb523c337bf0a2e3a800de379de82a62dacd7c163d0e6d9fc5a1da3d3e428c2ed28e7e24bee9721270600b0130534bc20e1e7845434ef52a27d8135a536898034c44e4b34e1019c25a7c22"}, 0xd9) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e20, @empty}, 0x10) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) writev(r4, &(0x7f00000005c0)=[{&(0x7f00000002c0)="e24d90aaf0c1c3ef5330b40f790abffb14aeb5858f7c61c67efd3ec00b067b8c887cd9912b05b85c558cbd1dc780fc619bf90bbc67c145b500c4c961a6908314538af95925151158a4f8ba68bc9cc971e1a5a69652a13f7b0303f3f5a19b0fad40cdf11225431b2edd5dc7d2a3d19bb668120c852422eacde86e6630525d1a75908abd43c1ff", 0x86}, {&(0x7f0000000380)="b5204699d342674a212d343770745eb708abe5d497d8f9fbf0bb8eab068e61f1f6c71a0de2afd83fdbe98f7a3cef47e95176627be1152b638da418c51d2e017c66e8736842", 0x45}, {&(0x7f0000000400)="2e747c367851579ac327146d1e680cc3175cbf0f3bda6b677f28637e7002c7652ab730abbc94a00f5ff4c34189d10a1b3f4542236f05e910660477a54f4532deacedf7e9599f8fe4d8a60648d087034e6bdc36d7f94486c4d10b5268315a69d6337cd8832e91a246ba7efebcf2e1c85edbdb9727a5c5a4899ec3f0f40a94a6925df141a62e3ad3ea0725d52a824f7b10d5745c73717eeaa3a82fd02a9fcf3eeccff9b61dbcc6de", 0xa7}, {&(0x7f00000004c0)="fb53145fb7c5d8e1a11bdf6a11976f18e005ae446c9e7079ec269e46d673f3cea55ac359c76896ab8c0f9bcc41ef51b6836a084f41a303de8cf131453b54b2ec78e610e60fc6b04b84297de8c477dc09ca95b4ae097a1461c09657289e1af2340b594e6186a6c562f595fd7c0503fa75c68ad4cae650c608018a903b394c9ec5081c3be3214fcb7658d2094eeaebbd43d5a5afdf871393c8692bca801c0cc5f80d97f9e2f2aec77b0711719f298314d663c93f563aec706e3c8ffcd4702228f1f63e41032efbffa41cacddbbd100e66d65d9", 0xd2}], 0x4) 16:59:24 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1137.251269] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1137.251269] 16:59:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$getown(r1, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={r2, 0x0, r3}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) r6 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r7, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:24 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001801, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1137.369251] FAULT_INJECTION: forcing a failure. [ 1137.369251] name failslab, interval 1, probability 0, space 0, times 0 [ 1137.398957] CPU: 0 PID: 6017 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1137.406193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1137.415548] Call Trace: [ 1137.418150] dump_stack+0x172/0x1f0 [ 1137.421788] should_fail.cold+0xa/0x1b [ 1137.425681] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1137.430793] ? ___might_sleep+0x163/0x280 [ 1137.434941] __should_failslab+0x121/0x190 [ 1137.439186] should_failslab+0x9/0x14 [ 1137.442990] kmem_cache_alloc+0x2be/0x710 [ 1137.447145] ? rcu_read_lock_sched_held+0x110/0x130 [ 1137.452166] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1137.457704] ? __mark_inode_dirty+0x241/0x1290 [ 1137.462290] ext4_mb_new_blocks+0x5a8/0x3c70 [ 1137.466709] ? ext4_find_extent+0x76e/0x9d0 [ 1137.471057] ext4_ext_map_blocks+0x3094/0x4e50 [ 1137.475646] ? ext4_ext_release+0x10/0x10 [ 1137.479798] ? __lock_is_held+0xb6/0x140 [ 1137.483899] ext4_map_blocks+0x8ec/0x1a20 [ 1137.488063] ? ext4_issue_zeroout+0x170/0x170 [ 1137.492564] ? kasan_check_write+0x14/0x20 [ 1137.496824] ? __brelse+0x95/0xb0 [ 1137.500288] ext4_getblk+0xc4/0x510 [ 1137.503915] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1137.508237] ? ext4_free_inode+0x1470/0x1470 [ 1137.512640] ext4_bread+0x8f/0x230 [ 1137.516167] ? ext4_getblk+0x510/0x510 [ 1137.520046] ext4_append+0x155/0x370 [ 1137.523753] ext4_mkdir+0x61b/0xdf0 [ 1137.527376] ? ext4_init_dot_dotdot+0x520/0x520 [ 1137.532033] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1137.537565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1137.543092] ? security_inode_permission+0xd5/0x110 [ 1137.548095] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1137.553620] ? security_inode_mkdir+0xee/0x120 [ 1137.558200] vfs_mkdir+0x433/0x690 [ 1137.561732] do_mkdirat+0x234/0x2a0 [ 1137.565347] ? __ia32_sys_mknod+0xb0/0xb0 [ 1137.569481] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1137.574224] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1137.579571] ? do_syscall_64+0x26/0x610 [ 1137.583894] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1137.588571] __x64_sys_mkdir+0x5c/0x80 [ 1137.592447] do_syscall_64+0x103/0x610 [ 1137.596325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1137.601512] RIP: 0033:0x457247 [ 1137.604691] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1137.623575] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1137.631266] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1137.638519] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 1137.640848] protocol 88fb is buggy, dev hsr_slave_0 [ 1137.645787] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1137.650865] protocol 88fb is buggy, dev hsr_slave_1 [ 1137.658056] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 16:59:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009c02, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1137.663168] protocol 88fb is buggy, dev hsr_slave_0 [ 1137.670306] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1137.675357] protocol 88fb is buggy, dev hsr_slave_1 [ 1137.687784] protocol 88fb is buggy, dev hsr_slave_0 [ 1137.692904] protocol 88fb is buggy, dev hsr_slave_1 16:59:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:24 executing program 5 (fault-call:2 fault-nth:31): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:24 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001900, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009c03, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:24 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x326000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1137.891759] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1137.891759] 16:59:24 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80084504, &(0x7f0000000100)=[0x20000]) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f0000000000)={0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) r5 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x3, 0x1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f0000000200)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) [ 1137.977356] FAULT_INJECTION: forcing a failure. [ 1137.977356] name failslab, interval 1, probability 0, space 0, times 0 [ 1137.988716] CPU: 1 PID: 6043 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1137.995921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1138.005279] Call Trace: [ 1138.007862] dump_stack+0x172/0x1f0 [ 1138.011490] should_fail.cold+0xa/0x1b [ 1138.015368] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1138.020459] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1138.025469] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1138.030394] __should_failslab+0x121/0x190 [ 1138.034614] should_failslab+0x9/0x14 [ 1138.038398] kmem_cache_alloc+0x47/0x710 [ 1138.042446] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1138.047460] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 1138.052201] ? ext4_es_scan+0x6f0/0x6f0 [ 1138.056282] ? do_raw_write_lock+0x124/0x290 [ 1138.060682] __es_insert_extent+0x2cc/0xf20 [ 1138.064993] ext4_es_insert_extent+0x2b7/0xa40 [ 1138.069562] ? ext4_es_scan_clu+0x50/0x50 [ 1138.073711] ext4_map_blocks+0xba2/0x1a20 [ 1138.077850] ? ext4_issue_zeroout+0x170/0x170 [ 1138.082345] ? kasan_check_write+0x14/0x20 [ 1138.086565] ? __brelse+0x95/0xb0 [ 1138.090011] ext4_getblk+0xc4/0x510 [ 1138.093629] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1138.097938] ? ext4_free_inode+0x1470/0x1470 [ 1138.102337] ext4_bread+0x8f/0x230 [ 1138.105866] ? ext4_getblk+0x510/0x510 [ 1138.109753] ext4_append+0x155/0x370 [ 1138.113457] ext4_mkdir+0x61b/0xdf0 [ 1138.117082] ? ext4_init_dot_dotdot+0x520/0x520 [ 1138.121739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1138.127346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1138.132900] ? security_inode_permission+0xd5/0x110 [ 1138.137909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1138.143432] ? security_inode_mkdir+0xee/0x120 [ 1138.148004] vfs_mkdir+0x433/0x690 [ 1138.151536] do_mkdirat+0x234/0x2a0 [ 1138.155151] ? __ia32_sys_mknod+0xb0/0xb0 [ 1138.159286] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1138.164031] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1138.169385] ? do_syscall_64+0x26/0x610 [ 1138.173345] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1138.177917] __x64_sys_mkdir+0x5c/0x80 [ 1138.181790] do_syscall_64+0x103/0x610 [ 1138.185663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1138.190835] RIP: 0033:0x457247 [ 1138.194019] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1138.212904] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1138.220598] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 16:59:25 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001901, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1138.227853] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 1138.235113] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1138.242377] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1138.249632] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:25 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001a00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xf401, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009c04, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:25 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001a01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1138.334175] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 16:59:25 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009c05, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:25 executing program 5 (fault-call:2 fault-nth:32): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1138.527028] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1138.527028] 16:59:25 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001b00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x100400200) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000040)={0x8, [0x5, 0xfff, 0x7f, 0xff, 0x401, 0x3, 0x9, 0xfffffffffffffff8]}, &(0x7f0000000080)=0x14) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400000000000200, 0x0) r3 = mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2, 0x8010, r0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000240)={0x10, 0x0, &(0x7f00000001c0)=[@enter_looper, @free_buffer={0x40086303, r3}], 0x25, 0x0, &(0x7f0000000200)="d0a907a680548037883efa3992ee40ef7b77c67b3cfdb804869595d6d435c925f9fc3beb7a"}) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009c06, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1138.667439] FAULT_INJECTION: forcing a failure. [ 1138.667439] name failslab, interval 1, probability 0, space 0, times 0 [ 1138.695651] CPU: 1 PID: 6086 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1138.702878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1138.712228] Call Trace: [ 1138.714822] dump_stack+0x172/0x1f0 [ 1138.718460] should_fail.cold+0xa/0x1b [ 1138.722349] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1138.727451] ? lock_downgrade+0x810/0x810 [ 1138.731604] ? ___might_sleep+0x163/0x280 [ 1138.735752] __should_failslab+0x121/0x190 [ 1138.739993] should_failslab+0x9/0x14 [ 1138.743795] kmem_cache_alloc_trace+0x2d1/0x760 [ 1138.748465] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1138.754515] ? _copy_from_user+0xdd/0x150 [ 1138.758658] copy_mount_options+0x5c/0x440 [ 1138.762887] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1138.768426] ksys_mount+0xa7/0x150 [ 1138.771965] __x64_sys_mount+0xbe/0x150 [ 1138.775936] do_syscall_64+0x103/0x610 [ 1138.779811] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1138.784991] RIP: 0033:0x45a89a [ 1138.788170] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1138.807055] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1138.814765] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1138.822017] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1138.829280] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1138.836536] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1138.843789] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:25 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:25 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001b01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:25 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001c00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1138.941322] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1138.941322] 16:59:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xf403, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:25 executing program 5 (fault-call:2 fault-nth:33): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009c07, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1139.149439] FAULT_INJECTION: forcing a failure. [ 1139.149439] name failslab, interval 1, probability 0, space 0, times 0 [ 1139.160874] CPU: 0 PID: 6115 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1139.168081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1139.177438] Call Trace: [ 1139.180033] dump_stack+0x172/0x1f0 [ 1139.183674] should_fail.cold+0xa/0x1b [ 1139.187572] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1139.192685] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1139.197707] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1139.202646] __should_failslab+0x121/0x190 [ 1139.206889] should_failslab+0x9/0x14 [ 1139.210694] kmem_cache_alloc+0x47/0x710 [ 1139.214754] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1139.219782] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 1139.224547] ? ext4_es_scan+0x6f0/0x6f0 [ 1139.228525] ? do_raw_write_lock+0x124/0x290 [ 1139.232950] __es_insert_extent+0x2cc/0xf20 [ 1139.237285] ext4_es_insert_extent+0x2b7/0xa40 [ 1139.241884] ? ext4_es_scan_clu+0x50/0x50 [ 1139.246055] ext4_map_blocks+0xba2/0x1a20 [ 1139.250230] ? ext4_issue_zeroout+0x170/0x170 [ 1139.254734] ? kasan_check_write+0x14/0x20 [ 1139.258970] ? __brelse+0x95/0xb0 [ 1139.262418] ext4_getblk+0xc4/0x510 [ 1139.266034] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1139.270344] ? ext4_free_inode+0x1470/0x1470 [ 1139.274740] ext4_bread+0x8f/0x230 [ 1139.278453] ? ext4_getblk+0x510/0x510 [ 1139.282332] ext4_append+0x155/0x370 [ 1139.286051] ext4_mkdir+0x61b/0xdf0 [ 1139.289671] ? ext4_init_dot_dotdot+0x520/0x520 [ 1139.294326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1139.299850] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1139.305376] ? security_inode_permission+0xd5/0x110 [ 1139.310391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1139.315916] ? security_inode_mkdir+0xee/0x120 [ 1139.320484] vfs_mkdir+0x433/0x690 [ 1139.324013] do_mkdirat+0x234/0x2a0 [ 1139.327630] ? __ia32_sys_mknod+0xb0/0xb0 [ 1139.331762] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1139.336503] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1139.341864] ? do_syscall_64+0x26/0x610 [ 1139.345829] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1139.350398] __x64_sys_mkdir+0x5c/0x80 [ 1139.354270] do_syscall_64+0x103/0x610 [ 1139.358142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1139.363314] RIP: 0033:0x457247 [ 1139.366493] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1139.385382] RSP: 002b:00007f619bb67a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1139.393075] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 16:59:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009c08, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:26 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001c01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1139.400329] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 1139.407584] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1139.414838] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1139.422090] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:26 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1139.494294] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1139.494294] [ 1139.518677] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 16:59:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x204000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000400200) kexec_load(0x4, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000180)="19075551b02f55b53cab5fff7cba56dca4407bf49f2948beef52336f114f993fa64e142f1e497373acf85da6e7ce8c67bd9339f5df481cb68c31fe8af05ae183a31755fd66f6f7481c97f398dcb887bf4d6d28cb6e9a49e8361d57d99c14740f8aca33da54b7a861c3373e4f0cd2df2916fd175e7f2071ee42b7611d7f27d0003cecbd50e04d50056ec89106c9ec3995031295cdb4f150c834fc40c48c1b33", 0x9f, 0xff, 0x4}, {&(0x7f0000000040)="bac6534acedf5f7f88419db7d5a5ae982eb1eb9df6c718c6652dd219eb73beb948a82015f095de8769e4b2a05bb46b563884ee1260e9581a51af91e5f25f0b636d254696074df70eedf2b9e0a11094ce7cc595c9ce13d9e5142e8c9b3f1e2471da8c61b1", 0x64, 0xffffffffffff0000, 0x1000}, {&(0x7f0000000240)="ba5ea9cd3b0f17aa229c29551b324c46495eb2ade96e031a954e4dc2448c27191757cac010fd953ddc11102cf04d2087cec0953908966e715dc966097eefa730f55bc0fdcd4e6d0f7cc05cca980973059f4a6bf685b41e740af6b948", 0x5c, 0x3, 0x4}], 0x3a0002) ioctl(r1, 0x3000000000, &(0x7f0000000340)="5c03bfcd8b63c3711a78624df3e166d5f2598129dfa868c3666cbdca8fdf995aa86dc2932db3430964750e7bd68af850ef2fe3cd999b545e8c3d53760918a16df01e8e7841590d5ac46e0dd0267e5e55971a076aad9b8937cfdf2cf2faa35da0bd5d828af4c7f1794f7578e5c997a1be9204b98d3ca8af116b7686dbd8c8e511124b202cd240a32dc564c06e3ba0b1592badcdd7a70a42ad70245eeea9b1547b4d67a466286b85fe087fc8fc0e44abe08ecb45b20762d47d063f962728bd74ec3a8f231246685d4cab1dbdc8e2c3d4cc4c7170505f26150d5c62af306d1a32") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) fstat(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r4, r5) syz_genetlink_get_family_id$fou(&(0x7f0000000440)='fou\x00') r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r6, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009d00, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:26 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001d00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xf803, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:26 executing program 5 (fault-call:2 fault-nth:34): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:26 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001d01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009d01, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:26 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001e00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) open(&(0x7f0000000000)='./file0\x00', 0x1ac40, 0x100) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:26 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1139.864123] FAULT_INJECTION: forcing a failure. [ 1139.864123] name failslab, interval 1, probability 0, space 0, times 0 [ 1139.881017] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1139.881017] [ 1139.924484] CPU: 0 PID: 6149 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1139.931701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1139.931707] Call Trace: [ 1139.931730] dump_stack+0x172/0x1f0 [ 1139.931760] should_fail.cold+0xa/0x1b [ 1139.931778] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1139.931794] ? lock_downgrade+0x810/0x810 [ 1139.931809] ? ___might_sleep+0x163/0x280 [ 1139.931831] __should_failslab+0x121/0x190 [ 1139.931852] should_failslab+0x9/0x14 [ 1139.964623] kmem_cache_alloc+0x2be/0x710 [ 1139.964640] ? fs_reclaim_acquire+0x20/0x20 [ 1139.964657] ? find_held_lock+0x35/0x130 [ 1139.964675] getname_flags+0xd6/0x5b0 [ 1139.988934] user_path_at_empty+0x2f/0x50 [ 1139.993076] do_mount+0x15e/0x2d30 [ 1139.996602] ? copy_mount_options+0x5c/0x440 [ 1140.001000] ? copy_mount_string+0x40/0x40 [ 1140.005222] ? kmem_cache_alloc_trace+0x354/0x760 [ 1140.010070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1140.015595] ? _copy_from_user+0xdd/0x150 [ 1140.019730] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1140.025259] ? copy_mount_options+0x30e/0x440 [ 1140.029747] ksys_mount+0xdb/0x150 [ 1140.033276] __x64_sys_mount+0xbe/0x150 [ 1140.037239] do_syscall_64+0x103/0x610 [ 1140.041115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1140.046287] RIP: 0033:0x45a89a [ 1140.049470] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 16:59:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009d02, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1140.068355] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1140.076050] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1140.083306] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1140.090561] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1140.097829] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1140.105085] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xfc00, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:27 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001e01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:27 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001f00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009d03, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:27 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:27 executing program 5 (fault-call:2 fault-nth:35): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) r3 = shmget$private(0x0, 0x4000, 0x401, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_LOCK(r3, 0xb) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000000)=0x80) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x22c7) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) [ 1140.347623] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1140.347623] [ 1140.452327] FAULT_INJECTION: forcing a failure. [ 1140.452327] name failslab, interval 1, probability 0, space 0, times 0 [ 1140.476899] CPU: 0 PID: 6189 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1140.484117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1140.493473] Call Trace: [ 1140.496065] dump_stack+0x172/0x1f0 [ 1140.496087] should_fail.cold+0xa/0x1b [ 1140.496107] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1140.508708] ? lock_downgrade+0x810/0x810 [ 1140.508728] ? ___might_sleep+0x163/0x280 [ 1140.508745] __should_failslab+0x121/0x190 [ 1140.508762] should_failslab+0x9/0x14 [ 1140.525055] kmem_cache_alloc+0x2be/0x710 [ 1140.529221] ? find_held_lock+0x35/0x130 [ 1140.533289] ? cache_grow_end+0xa4/0x190 [ 1140.537364] getname_flags+0xd6/0x5b0 [ 1140.541263] user_path_at_empty+0x2f/0x50 [ 1140.545422] do_mount+0x15e/0x2d30 [ 1140.548969] ? copy_mount_options+0x5c/0x440 [ 1140.553385] ? copy_mount_string+0x40/0x40 [ 1140.557622] ? kmem_cache_alloc_trace+0x354/0x760 [ 1140.562475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1140.568015] ? copy_mount_options+0x30e/0x440 [ 1140.572521] ksys_mount+0xdb/0x150 [ 1140.576066] __x64_sys_mount+0xbe/0x150 [ 1140.580052] do_syscall_64+0x103/0x610 [ 1140.584416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1140.589605] RIP: 0033:0x45a89a 16:59:27 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1001f01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1140.592811] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1140.611726] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1140.619437] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1140.626711] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1140.633978] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1140.641239] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 16:59:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009d04, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1140.641248] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1140.672191] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 16:59:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x220000, 0x0) pipe2(&(0x7f0000000040), 0x800) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x5, 0x81) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 16:59:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xfc03, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:27 executing program 5 (fault-call:2 fault-nth:36): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:27 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002000, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009d05, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:27 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009d06, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1140.866543] FAULT_INJECTION: forcing a failure. [ 1140.866543] name failslab, interval 1, probability 0, space 0, times 0 [ 1140.896424] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1140.896424] [ 1140.934848] CPU: 0 PID: 6214 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1140.942065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1140.951428] Call Trace: [ 1140.954010] dump_stack+0x172/0x1f0 [ 1140.957626] should_fail.cold+0xa/0x1b [ 1140.961505] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1140.966595] ? lock_downgrade+0x810/0x810 [ 1140.970730] ? ___might_sleep+0x163/0x280 [ 1140.974871] __should_failslab+0x121/0x190 [ 1140.979095] should_failslab+0x9/0x14 [ 1140.982879] kmem_cache_alloc+0x2be/0x710 [ 1140.987011] ? lock_downgrade+0x810/0x810 [ 1140.991149] alloc_vfsmnt+0x28/0x780 [ 1140.994853] vfs_kern_mount.part.0+0x2a/0x410 [ 1140.999335] do_mount+0x581/0x2d30 [ 1141.002865] ? copy_mount_options+0x41/0x440 [ 1141.007276] ? copy_mount_string+0x40/0x40 [ 1141.011497] ? kmem_cache_alloc_trace+0x354/0x760 [ 1141.016327] ? _copy_from_user+0xdd/0x150 [ 1141.020465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1141.026000] ? copy_mount_options+0x30e/0x440 [ 1141.030484] ksys_mount+0xdb/0x150 [ 1141.034013] __x64_sys_mount+0xbe/0x150 [ 1141.037977] do_syscall_64+0x103/0x610 [ 1141.041855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1141.047030] RIP: 0033:0x45a89a [ 1141.050211] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1141.069097] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1141.076800] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a 16:59:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'hwsim0\x00', 0x8000}) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) 16:59:27 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002001, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1141.084143] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1141.091399] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1141.098661] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1141.105918] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:28 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002100, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:28 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009d07, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1141.224698] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1141.224698] 16:59:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r3, 0xc0405519, &(0x7f0000000400)={0x5, 0x6, 0x10000, 0x6, 'syz0\x00', 0x3}) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_GET_DIRTY_LOG(r4, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000ff7000/0x7000)=nil}) connect$tipc(r4, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x43, 0x3, 0x4}}, 0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x8000, 0x1ff, 0x4, 0x6, 0x81}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000200)={r5, 0x9, 0x10, 0x5, 0x5}, &(0x7f0000000240)=0x18) r6 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_open_dev$usb(&(0x7f0000000480)='/dev/bus/usb/00#/00#\x00', 0x86e2, 0x844230f86cde5fd8) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) connect$vsock_dgram(r3, &(0x7f0000000440)={0x28, 0x0, 0x2710, @hyper}, 0x10) ioctl$KVM_SET_VCPU_EVENTS(r7, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2}) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f00000004c0)) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000280)={{{@in=@initdev, @in=@empty}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) 16:59:28 executing program 5 (fault-call:2 fault-nth:37): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:28 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002101, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009d08, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:28 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1a0f000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:28 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002200, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1141.475748] QAT: Invalid ioctl [ 1141.479689] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1141.479689] 16:59:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000300)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x1000002b3) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYPTR], 0x1}}, 0x44881) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000000)={0x0, 0xd9}) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) io_submit(0x0, 0x0, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x80000001, 0x9, 0x8000}) shutdown(r1, 0x1) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) pread64(r3, 0x0, 0xa45af78e, 0x0) 16:59:28 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002201, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009e00, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1141.596318] FAULT_INJECTION: forcing a failure. [ 1141.596318] name failslab, interval 1, probability 0, space 0, times 0 [ 1141.613954] CPU: 0 PID: 6270 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1141.621176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1141.630532] Call Trace: [ 1141.633133] dump_stack+0x172/0x1f0 [ 1141.636775] should_fail.cold+0xa/0x1b [ 1141.640665] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1141.640682] ? lock_downgrade+0x810/0x810 [ 1141.640703] ? ___might_sleep+0x163/0x280 [ 1141.649933] __should_failslab+0x121/0x190 [ 1141.649952] should_failslab+0x9/0x14 [ 1141.649968] __kmalloc_track_caller+0x2d8/0x740 [ 1141.649982] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1141.649997] ? alloc_vfsmnt+0x28/0x780 [ 1141.666801] ? kstrdup_const+0x66/0x80 [ 1141.666821] kstrdup+0x3a/0x70 [ 1141.666835] kstrdup_const+0x66/0x80 [ 1141.666851] alloc_vfsmnt+0xba/0x780 [ 1141.680036] vfs_kern_mount.part.0+0x2a/0x410 16:59:28 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1141.680058] do_mount+0x581/0x2d30 [ 1141.680074] ? copy_mount_options+0x41/0x440 [ 1141.680091] ? copy_mount_string+0x40/0x40 [ 1141.686978] ? kmem_cache_alloc_trace+0x354/0x760 [ 1141.686999] ? _copy_from_user+0xdd/0x150 [ 1141.687019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1141.687034] ? copy_mount_options+0x30e/0x440 [ 1141.695221] ksys_mount+0xdb/0x150 [ 1141.695241] __x64_sys_mount+0xbe/0x150 [ 1141.695264] do_syscall_64+0x103/0x610 [ 1141.695287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1141.703186] RIP: 0033:0x45a89a [ 1141.703202] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1141.703210] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1141.703224] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1141.703234] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1141.703243] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 16:59:28 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002300, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009e01, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1141.703250] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1141.703258] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:28 executing program 5 (fault-call:2 fault-nth:38): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:28 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002301, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:28 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002400, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009e02, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:28 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1142.005387] FAULT_INJECTION: forcing a failure. [ 1142.005387] name failslab, interval 1, probability 0, space 0, times 0 [ 1142.006212] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1142.006212] [ 1142.024179] CPU: 0 PID: 6304 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1142.034598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1142.043952] Call Trace: [ 1142.046548] dump_stack+0x172/0x1f0 [ 1142.050193] should_fail.cold+0xa/0x1b [ 1142.054096] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1142.059213] ? lock_downgrade+0x810/0x810 [ 1142.063368] ? ___might_sleep+0x163/0x280 [ 1142.067522] __should_failslab+0x121/0x190 [ 1142.071759] should_failslab+0x9/0x14 [ 1142.075564] kmem_cache_alloc_trace+0x2d1/0x760 [ 1142.080361] ? kasan_check_read+0x11/0x20 [ 1142.084512] ? do_raw_spin_unlock+0x57/0x270 [ 1142.088920] ? kill_litter_super+0x60/0x60 [ 1142.093164] sget_userns+0x11b/0xd30 [ 1142.096880] ? kill_litter_super+0x60/0x60 [ 1142.101119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1142.106662] ? ns_test_super+0x50/0x50 [ 1142.110559] ? ns_test_super+0x50/0x50 [ 1142.114458] ? kill_litter_super+0x60/0x60 [ 1142.118690] sget+0x10c/0x150 [ 1142.121805] mount_bdev+0xff/0x3c0 [ 1142.125352] ? finish_unfinished+0x1120/0x1120 [ 1142.129946] get_super_block+0x35/0x40 [ 1142.133843] mount_fs+0x106/0x3ff [ 1142.137298] ? emergency_thaw_all+0x1a0/0x1a0 [ 1142.141796] ? __init_waitqueue_head+0x36/0x90 [ 1142.146383] vfs_kern_mount.part.0+0x6f/0x410 [ 1142.150885] do_mount+0x581/0x2d30 [ 1142.154429] ? copy_mount_options+0x41/0x440 [ 1142.158846] ? copy_mount_string+0x40/0x40 [ 1142.163081] ? kmem_cache_alloc_trace+0x354/0x760 [ 1142.167931] ? _copy_from_user+0xdd/0x150 [ 1142.172086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1142.177627] ? copy_mount_options+0x30e/0x440 [ 1142.182133] ksys_mount+0xdb/0x150 [ 1142.185683] __x64_sys_mount+0xbe/0x150 [ 1142.189669] do_syscall_64+0x103/0x610 [ 1142.193570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1142.198768] RIP: 0033:0x45a89a [ 1142.201959] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1142.220860] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1142.228578] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1142.235852] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1142.243125] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1142.250395] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1142.257668] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000300)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x1000002b3) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYPTR], 0x1}}, 0x44881) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000000)={0x0, 0xd9}) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) io_submit(0x0, 0x0, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x80000001, 0x9, 0x8000}) shutdown(r1, 0x1) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) pread64(r3, 0x0, 0xa45af78e, 0x0) 16:59:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009e03, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:29 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002401, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:29 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000300)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x1000002b3) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYPTR], 0x1}}, 0x44881) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000000)={0x0, 0xd9}) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) io_submit(0x0, 0x0, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x80000001, 0x9, 0x8000}) shutdown(r1, 0x1) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) pread64(r3, 0x0, 0xa45af78e, 0x0) 16:59:29 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002500, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:29 executing program 5 (fault-call:2 fault-nth:39): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:29 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002501, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1142.615245] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1142.615245] 16:59:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009e04, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:29 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2300000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1142.686150] FAULT_INJECTION: forcing a failure. [ 1142.686150] name failslab, interval 1, probability 0, space 0, times 0 [ 1142.729861] CPU: 1 PID: 6342 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1142.737079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1142.737086] Call Trace: [ 1142.737116] dump_stack+0x172/0x1f0 [ 1142.737136] should_fail.cold+0xa/0x1b [ 1142.737155] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1142.762191] ? lock_downgrade+0x810/0x810 [ 1142.766340] ? ___might_sleep+0x163/0x280 [ 1142.770491] __should_failslab+0x121/0x190 [ 1142.774738] should_failslab+0x9/0x14 [ 1142.778551] kmem_cache_alloc+0x2be/0x710 [ 1142.782693] ? find_held_lock+0x35/0x130 [ 1142.786748] getname_kernel+0x53/0x370 [ 1142.790625] kern_path+0x20/0x40 [ 1142.793983] lookup_bdev.part.0+0x7b/0x1b0 [ 1142.798204] ? blkdev_open+0x290/0x290 [ 1142.802075] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1142.807521] ? rcu_read_lock_sched_held+0x110/0x130 [ 1142.812529] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1142.818055] blkdev_get_by_path+0x81/0x130 [ 1142.822288] mount_bdev+0x5d/0x3c0 [ 1142.825819] ? finish_unfinished+0x1120/0x1120 [ 1142.830388] get_super_block+0x35/0x40 [ 1142.834266] mount_fs+0x106/0x3ff [ 1142.837705] ? emergency_thaw_all+0x1a0/0x1a0 [ 1142.842187] ? __init_waitqueue_head+0x36/0x90 [ 1142.846759] vfs_kern_mount.part.0+0x6f/0x410 [ 1142.851245] do_mount+0x581/0x2d30 [ 1142.854778] ? copy_mount_string+0x40/0x40 [ 1142.859002] ? __sanitizer_cov_trace_const_cmp8+0x13/0x20 [ 1142.864530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1142.870051] ? copy_mount_options+0x30e/0x440 [ 1142.874536] ksys_mount+0xdb/0x150 [ 1142.878064] __x64_sys_mount+0xbe/0x150 [ 1142.882030] do_syscall_64+0x103/0x610 [ 1142.885904] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1142.891080] RIP: 0033:0x45a89a [ 1142.894265] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1142.913149] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1142.920844] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a 16:59:29 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002600, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1142.928105] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1142.935360] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1142.942613] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1142.949868] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000300)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x1000002b3) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYPTR], 0x1}}, 0x44881) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000000)={0x0, 0xd9}) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) io_submit(0x0, 0x0, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x80000001, 0x9, 0x8000}) shutdown(r1, 0x1) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) pread64(r3, 0x0, 0xa45af78e, 0x0) 16:59:29 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002601, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:29 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002700, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009e05, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:30 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:30 executing program 5 (fault-call:2 fault-nth:40): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:30 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002701, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:30 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002800, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1143.212052] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1143.223741] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1143.223741] [ 1143.240933] net_ratelimit: 20 callbacks suppressed [ 1143.240940] protocol 88fb is buggy, dev hsr_slave_0 [ 1143.250988] protocol 88fb is buggy, dev hsr_slave_1 16:59:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009e06, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1143.381989] FAULT_INJECTION: forcing a failure. [ 1143.381989] name failslab, interval 1, probability 0, space 0, times 0 [ 1143.400886] protocol 88fb is buggy, dev hsr_slave_0 [ 1143.400905] CPU: 0 PID: 6383 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1143.405960] protocol 88fb is buggy, dev hsr_slave_1 [ 1143.413095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1143.413102] Call Trace: [ 1143.413125] dump_stack+0x172/0x1f0 [ 1143.413144] should_fail.cold+0xa/0x1b [ 1143.413162] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1143.433697] ? lock_downgrade+0x810/0x810 [ 1143.442662] ? ___might_sleep+0x163/0x280 [ 1143.442694] __should_failslab+0x121/0x190 [ 1143.442711] should_failslab+0x9/0x14 [ 1143.459068] kmem_cache_alloc_trace+0x2d1/0x760 [ 1143.463745] ? kasan_check_read+0x11/0x20 [ 1143.467892] ? do_raw_spin_unlock+0x57/0x270 [ 1143.472307] ? kill_litter_super+0x60/0x60 [ 1143.476577] sget_userns+0x11b/0xd30 [ 1143.480313] ? kill_litter_super+0x60/0x60 [ 1143.480330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1143.480345] ? ns_test_super+0x50/0x50 [ 1143.490176] ? ns_test_super+0x50/0x50 [ 1143.497924] ? kill_litter_super+0x60/0x60 [ 1143.502160] sget+0x10c/0x150 [ 1143.505271] mount_bdev+0xff/0x3c0 [ 1143.508819] ? finish_unfinished+0x1120/0x1120 [ 1143.511190] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1143.513409] get_super_block+0x35/0x40 [ 1143.526551] mount_fs+0x106/0x3ff [ 1143.530019] ? emergency_thaw_all+0x1a0/0x1a0 [ 1143.534521] ? __init_waitqueue_head+0x36/0x90 [ 1143.539111] vfs_kern_mount.part.0+0x6f/0x410 [ 1143.543612] do_mount+0x581/0x2d30 [ 1143.547166] ? copy_mount_options+0x41/0x440 [ 1143.551587] ? copy_mount_string+0x40/0x40 [ 1143.555835] ? kmem_cache_alloc_trace+0x354/0x760 [ 1143.560683] ? _copy_from_user+0xdd/0x150 [ 1143.564835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1143.570379] ? copy_mount_options+0x30e/0x440 [ 1143.574882] ksys_mount+0xdb/0x150 [ 1143.578429] __x64_sys_mount+0xbe/0x150 [ 1143.582412] do_syscall_64+0x103/0x610 [ 1143.586313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1143.591506] RIP: 0033:0x45a89a [ 1143.594708] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1143.613615] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1143.621326] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1143.628597] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1143.635867] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1143.643139] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1143.650408] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1143.704122] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 16:59:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:30 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002801, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009e07, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:30 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:30 executing program 5 (fault-call:2 fault-nth:41): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1143.848909] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1143.880860] protocol 88fb is buggy, dev hsr_slave_0 [ 1143.886078] protocol 88fb is buggy, dev hsr_slave_1 [ 1143.891238] protocol 88fb is buggy, dev hsr_slave_0 16:59:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:30 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002900, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009e08, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1143.896315] protocol 88fb is buggy, dev hsr_slave_1 [ 1143.901451] protocol 88fb is buggy, dev hsr_slave_0 [ 1143.906509] protocol 88fb is buggy, dev hsr_slave_1 [ 1144.003667] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1144.027773] FAULT_INJECTION: forcing a failure. [ 1144.027773] name failslab, interval 1, probability 0, space 0, times 0 [ 1144.056359] CPU: 1 PID: 6409 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1144.063593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1144.072947] Call Trace: [ 1144.075549] dump_stack+0x172/0x1f0 [ 1144.079185] should_fail.cold+0xa/0x1b [ 1144.083081] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1144.088192] ? lock_downgrade+0x810/0x810 [ 1144.092345] ? ___might_sleep+0x163/0x280 [ 1144.096510] __should_failslab+0x121/0x190 [ 1144.100753] should_failslab+0x9/0x14 [ 1144.104557] kmem_cache_alloc+0x2be/0x710 [ 1144.108707] ? find_held_lock+0x35/0x130 [ 1144.112780] getname_kernel+0x53/0x370 [ 1144.116670] kern_path+0x20/0x40 [ 1144.120041] lookup_bdev.part.0+0x7b/0x1b0 [ 1144.124278] ? blkdev_open+0x290/0x290 [ 1144.128175] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1144.133632] ? rcu_read_lock_sched_held+0x110/0x130 [ 1144.138647] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1144.144187] blkdev_get_by_path+0x81/0x130 [ 1144.148435] mount_bdev+0x5d/0x3c0 [ 1144.151975] ? finish_unfinished+0x1120/0x1120 [ 1144.156574] get_super_block+0x35/0x40 [ 1144.160474] mount_fs+0x106/0x3ff [ 1144.163932] ? emergency_thaw_all+0x1a0/0x1a0 [ 1144.168437] ? __init_waitqueue_head+0x36/0x90 [ 1144.173027] vfs_kern_mount.part.0+0x6f/0x410 [ 1144.177528] do_mount+0x581/0x2d30 [ 1144.181077] ? copy_mount_string+0x40/0x40 [ 1144.185324] ? copy_mount_options+0x242/0x440 [ 1144.189826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1144.195367] ? copy_mount_options+0x30e/0x440 [ 1144.199878] ksys_mount+0xdb/0x150 [ 1144.203433] __x64_sys_mount+0xbe/0x150 [ 1144.207422] do_syscall_64+0x103/0x610 [ 1144.211315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1144.216502] RIP: 0033:0x45a89a [ 1144.219694] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1144.238592] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1144.246302] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a 16:59:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1144.253574] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1144.260848] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1144.268115] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1144.275386] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:31 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4800000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:31 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002901, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1144.385827] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1144.385827] [ 1144.574126] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1144.574126] 16:59:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009f00, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:31 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002a00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:31 executing program 5 (fault-call:2 fault-nth:42): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:31 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:31 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002a01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009f01, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1144.692216] FAULT_INJECTION: forcing a failure. [ 1144.692216] name failslab, interval 1, probability 0, space 0, times 0 [ 1144.719612] CPU: 0 PID: 6446 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1144.726839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1144.736194] Call Trace: [ 1144.738792] dump_stack+0x172/0x1f0 16:59:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1144.742432] should_fail.cold+0xa/0x1b [ 1144.746329] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1144.751451] ? lock_downgrade+0x810/0x810 [ 1144.755614] ? ___might_sleep+0x163/0x280 [ 1144.759778] __should_failslab+0x121/0x190 [ 1144.764023] should_failslab+0x9/0x14 [ 1144.767825] kmem_cache_alloc_trace+0x2d1/0x760 [ 1144.772497] ? kasan_check_read+0x11/0x20 [ 1144.776645] ? do_raw_spin_unlock+0x57/0x270 [ 1144.781056] ? kill_litter_super+0x60/0x60 [ 1144.785293] sget_userns+0x11b/0xd30 [ 1144.789011] ? kill_litter_super+0x60/0x60 [ 1144.793256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1144.798794] ? ns_test_super+0x50/0x50 [ 1144.802683] ? ns_test_super+0x50/0x50 [ 1144.806574] ? kill_litter_super+0x60/0x60 [ 1144.810899] sget+0x10c/0x150 [ 1144.814019] mount_bdev+0xff/0x3c0 [ 1144.817563] ? finish_unfinished+0x1120/0x1120 [ 1144.822150] get_super_block+0x35/0x40 [ 1144.826051] mount_fs+0x106/0x3ff [ 1144.829510] ? emergency_thaw_all+0x1a0/0x1a0 [ 1144.834005] ? __init_waitqueue_head+0x36/0x90 [ 1144.838943] vfs_kern_mount.part.0+0x6f/0x410 [ 1144.843450] do_mount+0x581/0x2d30 [ 1144.846991] ? copy_mount_options+0x41/0x440 [ 1144.851404] ? copy_mount_string+0x40/0x40 [ 1144.855642] ? kmem_cache_alloc_trace+0x354/0x760 [ 1144.860749] ? _copy_from_user+0xdd/0x150 [ 1144.864902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1144.870447] ? copy_mount_options+0x30e/0x440 [ 1144.874946] ksys_mount+0xdb/0x150 [ 1144.878488] __x64_sys_mount+0xbe/0x150 [ 1144.882478] do_syscall_64+0x103/0x610 [ 1144.886373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1144.891562] RIP: 0033:0x45a89a [ 1144.894756] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1144.913653] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1144.921367] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1144.928633] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1144.935902] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 16:59:31 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002b00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1144.943172] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1144.950445] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:31 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:31 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002b01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1145.069201] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1145.069201] [ 1145.115953] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1145.155890] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1145.155890] 16:59:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:32 executing program 5 (fault-call:2 fault-nth:43): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:32 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009f02, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:32 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002c00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:32 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:32 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002c01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1145.272070] FAULT_INJECTION: forcing a failure. [ 1145.272070] name failslab, interval 1, probability 0, space 0, times 0 [ 1145.283489] CPU: 0 PID: 6479 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1145.290688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1145.300034] Call Trace: [ 1145.300058] dump_stack+0x172/0x1f0 [ 1145.300079] should_fail.cold+0xa/0x1b [ 1145.300096] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1145.315250] ? lock_downgrade+0x810/0x810 [ 1145.315269] ? ___might_sleep+0x163/0x280 [ 1145.315288] __should_failslab+0x121/0x190 [ 1145.315306] should_failslab+0x9/0x14 [ 1145.315332] kmem_cache_alloc_trace+0x2d1/0x760 [ 1145.323598] ? kasan_check_read+0x11/0x20 [ 1145.323615] ? do_raw_spin_unlock+0x57/0x270 [ 1145.323634] ? kill_litter_super+0x60/0x60 [ 1145.323650] sget_userns+0x11b/0xd30 [ 1145.323664] ? kill_litter_super+0x60/0x60 [ 1145.323679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1145.323693] ? ns_test_super+0x50/0x50 [ 1145.323707] ? ns_test_super+0x50/0x50 [ 1145.323720] ? kill_litter_super+0x60/0x60 [ 1145.323735] sget+0x10c/0x150 [ 1145.323753] mount_bdev+0xff/0x3c0 [ 1145.323767] ? finish_unfinished+0x1120/0x1120 [ 1145.323785] get_super_block+0x35/0x40 [ 1145.336445] mount_fs+0x106/0x3ff [ 1145.336465] ? emergency_thaw_all+0x1a0/0x1a0 [ 1145.336483] ? __init_waitqueue_head+0x36/0x90 [ 1145.336505] vfs_kern_mount.part.0+0x6f/0x410 [ 1145.406777] do_mount+0x581/0x2d30 [ 1145.410335] ? copy_mount_string+0x40/0x40 [ 1145.414578] ? audit_add_tree_rule.cold+0x3b/0x3b [ 1145.419422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1145.424961] ? copy_mount_options+0x30e/0x440 [ 1145.429467] ksys_mount+0xdb/0x150 [ 1145.433012] __x64_sys_mount+0xbe/0x150 [ 1145.436997] do_syscall_64+0x103/0x610 [ 1145.440894] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1145.446082] RIP: 0033:0x45a89a [ 1145.449279] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 16:59:32 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1145.468189] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1145.474464] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1145.475901] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1145.492424] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1145.499692] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1145.506974] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1145.514244] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009f03, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:32 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002d00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:32 executing program 5 (fault-call:2 fault-nth:44): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1145.592872] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1145.620953] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1145.620953] 16:59:32 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1145.742677] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1145.752812] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1145.752812] [ 1145.764748] FAULT_INJECTION: forcing a failure. [ 1145.764748] name failslab, interval 1, probability 0, space 0, times 0 [ 1145.793541] CPU: 1 PID: 6511 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1145.800753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1145.810102] Call Trace: [ 1145.812701] dump_stack+0x172/0x1f0 [ 1145.816334] should_fail.cold+0xa/0x1b [ 1145.820224] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1145.825328] ? lock_downgrade+0x810/0x810 [ 1145.829478] ? ___might_sleep+0x163/0x280 [ 1145.833634] __should_failslab+0x121/0x190 [ 1145.837875] should_failslab+0x9/0x14 [ 1145.841676] __kmalloc+0x2dc/0x740 [ 1145.845221] ? lockdep_init_map+0x10c/0x5b0 [ 1145.849543] ? prealloc_shrinker+0xdf/0x340 [ 1145.853870] prealloc_shrinker+0xdf/0x340 [ 1145.858020] sget_userns+0x7ef/0xd30 [ 1145.861738] ? kill_litter_super+0x60/0x60 [ 1145.865975] ? ns_test_super+0x50/0x50 [ 1145.869868] ? ns_test_super+0x50/0x50 [ 1145.873757] ? kill_litter_super+0x60/0x60 [ 1145.877990] sget+0x10c/0x150 [ 1145.881101] mount_bdev+0xff/0x3c0 [ 1145.884666] ? finish_unfinished+0x1120/0x1120 [ 1145.889255] get_super_block+0x35/0x40 [ 1145.893153] mount_fs+0x106/0x3ff [ 1145.896608] ? emergency_thaw_all+0x1a0/0x1a0 [ 1145.901107] ? __init_waitqueue_head+0x36/0x90 [ 1145.905698] vfs_kern_mount.part.0+0x6f/0x410 [ 1145.910195] do_mount+0x581/0x2d30 [ 1145.913735] ? copy_mount_options+0x41/0x440 [ 1145.918151] ? copy_mount_string+0x40/0x40 [ 1145.922385] ? kmem_cache_alloc_trace+0x354/0x760 [ 1145.927243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1145.932788] ? copy_mount_options+0x30e/0x440 [ 1145.937297] ksys_mount+0xdb/0x150 [ 1145.940850] __x64_sys_mount+0xbe/0x150 [ 1145.944833] do_syscall_64+0x103/0x610 [ 1145.948729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1145.953923] RIP: 0033:0x45a89a [ 1145.957114] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1145.976018] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1145.983729] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a 16:59:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:32 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x6800000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009f04, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:32 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002d01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:32 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:32 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002e00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1145.991031] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1145.998298] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1146.005564] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1146.012839] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:32 executing program 5 (fault-call:2 fault-nth:45): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:32 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1146.080427] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009f05, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1146.191453] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1146.213861] FAULT_INJECTION: forcing a failure. [ 1146.213861] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1146.225692] CPU: 1 PID: 6529 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1146.232877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1146.242230] Call Trace: [ 1146.244919] dump_stack+0x172/0x1f0 [ 1146.248554] should_fail.cold+0xa/0x1b [ 1146.252448] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1146.257565] should_fail_alloc_page+0x50/0x60 [ 1146.262071] __alloc_pages_nodemask+0x1a1/0x710 [ 1146.266750] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1146.271785] cache_grow_begin+0x9c/0x8c0 [ 1146.275852] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1146.281389] ? check_preemption_disabled+0x48/0x290 [ 1146.286414] kmem_cache_alloc_trace+0x67f/0x760 [ 1146.291095] ? kill_litter_super+0x60/0x60 [ 1146.295331] sget_userns+0x11b/0xd30 [ 1146.299045] ? kill_litter_super+0x60/0x60 [ 1146.303280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1146.308822] ? ns_test_super+0x50/0x50 [ 1146.312709] ? ns_test_super+0x50/0x50 [ 1146.316603] ? kill_litter_super+0x60/0x60 [ 1146.320845] sget+0x10c/0x150 [ 1146.323955] mount_bdev+0xff/0x3c0 [ 1146.327498] ? finish_unfinished+0x1120/0x1120 [ 1146.332083] get_super_block+0x35/0x40 [ 1146.335975] mount_fs+0x106/0x3ff [ 1146.339431] ? emergency_thaw_all+0x1a0/0x1a0 [ 1146.343926] ? __init_waitqueue_head+0x36/0x90 [ 1146.348517] vfs_kern_mount.part.0+0x6f/0x410 [ 1146.353020] do_mount+0x581/0x2d30 [ 1146.356559] ? copy_mount_options+0x41/0x440 [ 1146.360969] ? copy_mount_string+0x40/0x40 [ 1146.365202] ? kmem_cache_alloc_trace+0x354/0x760 [ 1146.370059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1146.375595] ? copy_mount_options+0x30e/0x440 [ 1146.380096] ksys_mount+0xdb/0x150 [ 1146.383639] __x64_sys_mount+0xbe/0x150 [ 1146.387620] do_syscall_64+0x103/0x610 [ 1146.391513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1146.396701] RIP: 0033:0x45a89a [ 1146.399892] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1146.418791] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1146.426500] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1146.433769] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 16:59:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1146.441040] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1146.448304] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1146.455571] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:33 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1146.489917] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1146.489917] [ 1146.525656] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:33 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002e01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1146.536504] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 1146.781915] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 16:59:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009f06, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:33 executing program 5 (fault-call:2 fault-nth:46): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:33 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002f00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:33 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x7400000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:33 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1002f01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1146.895258] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009f07, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1147.020124] FAULT_INJECTION: forcing a failure. [ 1147.020124] name failslab, interval 1, probability 0, space 0, times 0 [ 1147.044642] CPU: 1 PID: 6568 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1147.051863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1147.061207] Call Trace: [ 1147.063794] dump_stack+0x172/0x1f0 [ 1147.067414] should_fail.cold+0xa/0x1b [ 1147.071292] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1147.076391] ? lock_downgrade+0x810/0x810 [ 1147.080542] ? ___might_sleep+0x163/0x280 [ 1147.084676] __should_failslab+0x121/0x190 [ 1147.088899] should_failslab+0x9/0x14 [ 1147.092683] kmem_cache_alloc_trace+0x2d1/0x760 [ 1147.097342] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1147.102438] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1147.107357] __list_lru_init+0x3d3/0x6e0 [ 1147.111409] sget_userns+0x81e/0xd30 [ 1147.115106] ? kill_litter_super+0x60/0x60 [ 1147.119326] ? ns_test_super+0x50/0x50 [ 1147.123197] ? ns_test_super+0x50/0x50 [ 1147.127068] ? kill_litter_super+0x60/0x60 [ 1147.131308] sget+0x10c/0x150 [ 1147.134400] mount_bdev+0xff/0x3c0 [ 1147.137928] ? finish_unfinished+0x1120/0x1120 [ 1147.142497] get_super_block+0x35/0x40 [ 1147.146371] mount_fs+0x106/0x3ff [ 1147.149825] ? emergency_thaw_all+0x1a0/0x1a0 [ 1147.154305] ? __init_waitqueue_head+0x36/0x90 [ 1147.158878] vfs_kern_mount.part.0+0x6f/0x410 [ 1147.163361] do_mount+0x581/0x2d30 [ 1147.166888] ? copy_mount_options+0x41/0x440 [ 1147.171285] ? copy_mount_string+0x40/0x40 [ 1147.175507] ? kmem_cache_alloc_trace+0x354/0x760 [ 1147.180342] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1147.185863] ? copy_mount_options+0x30e/0x440 [ 1147.190347] ksys_mount+0xdb/0x150 [ 1147.193885] __x64_sys_mount+0xbe/0x150 [ 1147.197847] do_syscall_64+0x103/0x610 [ 1147.201727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1147.206907] RIP: 0033:0x45a89a [ 1147.210084] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1147.228979] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1147.236681] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1147.243937] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1147.251191] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1147.258447] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1147.265700] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1147.283104] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:34 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:34 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003000, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1147.315934] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1147.315934] [ 1147.445982] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue [ 1147.460289] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x8030000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:34 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003001, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x8000000009f08, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:34 executing program 5 (fault-call:2 fault-nth:47): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:34 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003100, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:34 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x7fffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1147.602313] FAULT_INJECTION: forcing a failure. [ 1147.602313] name failslab, interval 1, probability 0, space 0, times 0 [ 1147.604890] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:34 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003101, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1147.643131] CPU: 1 PID: 6604 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1147.650360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1147.659719] Call Trace: [ 1147.662323] dump_stack+0x172/0x1f0 [ 1147.665965] should_fail.cold+0xa/0x1b [ 1147.669870] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1147.674980] ? lock_downgrade+0x810/0x810 [ 1147.679144] ? ___might_sleep+0x163/0x280 [ 1147.683303] __should_failslab+0x121/0x190 [ 1147.687584] should_failslab+0x9/0x14 [ 1147.691372] kmem_cache_alloc_trace+0x2d1/0x760 [ 1147.696027] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1147.701131] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1147.706049] __list_lru_init+0x3d3/0x6e0 [ 1147.710096] sget_userns+0x81e/0xd30 [ 1147.713795] ? kill_litter_super+0x60/0x60 [ 1147.718015] ? ns_test_super+0x50/0x50 [ 1147.721884] ? ns_test_super+0x50/0x50 [ 1147.725752] ? kill_litter_super+0x60/0x60 [ 1147.729970] sget+0x10c/0x150 [ 1147.733064] mount_bdev+0xff/0x3c0 [ 1147.736590] ? finish_unfinished+0x1120/0x1120 [ 1147.741205] get_super_block+0x35/0x40 [ 1147.745085] mount_fs+0x106/0x3ff [ 1147.748523] ? emergency_thaw_all+0x1a0/0x1a0 [ 1147.753029] ? __init_waitqueue_head+0x36/0x90 [ 1147.757599] vfs_kern_mount.part.0+0x6f/0x410 [ 1147.762088] do_mount+0x581/0x2d30 [ 1147.765609] ? copy_mount_options+0x41/0x440 [ 1147.770002] ? copy_mount_string+0x40/0x40 [ 1147.774224] ? kmem_cache_alloc_trace+0x354/0x760 [ 1147.779075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1147.784599] ? copy_mount_options+0x30e/0x440 [ 1147.789080] ksys_mount+0xdb/0x150 [ 1147.792607] __x64_sys_mount+0xbe/0x150 [ 1147.796568] do_syscall_64+0x103/0x610 [ 1147.800443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1147.805613] RIP: 0033:0x45a89a [ 1147.808789] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1147.827669] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1147.835450] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1147.842703] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1147.849955] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1147.857204] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1147.864456] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a000, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:34 executing program 5 (fault-call:2 fault-nth:48): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1147.935449] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1148.042478] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1148.042478] [ 1148.044617] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1148.152915] FAULT_INJECTION: forcing a failure. [ 1148.152915] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.175028] CPU: 0 PID: 6632 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1148.182252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1148.191599] Call Trace: [ 1148.194196] dump_stack+0x172/0x1f0 [ 1148.197831] should_fail.cold+0xa/0x1b [ 1148.201725] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1148.206827] ? lock_downgrade+0x810/0x810 [ 1148.210981] ? ___might_sleep+0x163/0x280 [ 1148.215129] __should_failslab+0x121/0x190 [ 1148.219368] should_failslab+0x9/0x14 [ 1148.223171] kmem_cache_alloc_trace+0x2d1/0x760 [ 1148.227840] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1148.232952] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1148.237882] __list_lru_init+0x3d3/0x6e0 [ 1148.241949] sget_userns+0x81e/0xd30 [ 1148.245666] ? kill_litter_super+0x60/0x60 [ 1148.249901] ? ns_test_super+0x50/0x50 [ 1148.253791] ? ns_test_super+0x50/0x50 [ 1148.257675] ? kill_litter_super+0x60/0x60 [ 1148.261909] sget+0x10c/0x150 [ 1148.265023] mount_bdev+0xff/0x3c0 [ 1148.268562] ? finish_unfinished+0x1120/0x1120 [ 1148.273148] get_super_block+0x35/0x40 [ 1148.277046] mount_fs+0x106/0x3ff [ 1148.280505] ? emergency_thaw_all+0x1a0/0x1a0 [ 1148.285001] ? __init_waitqueue_head+0x36/0x90 [ 1148.289591] vfs_kern_mount.part.0+0x6f/0x410 [ 1148.294097] do_mount+0x581/0x2d30 [ 1148.297635] ? copy_mount_options+0x41/0x440 [ 1148.302047] ? copy_mount_string+0x40/0x40 [ 1148.306288] ? kmem_cache_alloc_trace+0x354/0x760 [ 1148.311143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1148.316682] ? copy_mount_options+0x30e/0x440 [ 1148.321182] ksys_mount+0xdb/0x150 [ 1148.324729] __x64_sys_mount+0xbe/0x150 [ 1148.328709] do_syscall_64+0x103/0x610 [ 1148.332602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1148.337785] RIP: 0033:0x45a89a [ 1148.340985] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1148.359883] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1148.367589] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1148.374857] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1148.382124] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1148.389390] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1148.396657] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1148.404917] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1148.404917] 16:59:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:35 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003200, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a001, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:35 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:35 executing program 5 (fault-call:2 fault-nth:49): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:35 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003201, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1148.531411] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a002, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:35 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003300, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1148.647033] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1148.687846] FAULT_INJECTION: forcing a failure. [ 1148.687846] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.706093] CPU: 1 PID: 6651 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1148.713312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1148.719347] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1148.719347] [ 1148.722660] Call Trace: 16:59:35 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1148.722685] dump_stack+0x172/0x1f0 [ 1148.722706] should_fail.cold+0xa/0x1b [ 1148.722723] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1148.722740] ? lock_downgrade+0x810/0x810 [ 1148.752621] ? ___might_sleep+0x163/0x280 [ 1148.756791] __should_failslab+0x121/0x190 [ 1148.761058] should_failslab+0x9/0x14 [ 1148.764866] kmem_cache_alloc_trace+0x2d1/0x760 [ 1148.769551] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1148.774679] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1148.776504] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1148.779623] __list_lru_init+0x3d3/0x6e0 [ 1148.792943] sget_userns+0x81e/0xd30 [ 1148.796666] ? kill_litter_super+0x60/0x60 [ 1148.800904] ? ns_test_super+0x50/0x50 [ 1148.804795] ? ns_test_super+0x50/0x50 [ 1148.808683] ? kill_litter_super+0x60/0x60 [ 1148.808699] sget+0x10c/0x150 [ 1148.808720] mount_bdev+0xff/0x3c0 [ 1148.808735] ? finish_unfinished+0x1120/0x1120 [ 1148.808752] get_super_block+0x35/0x40 [ 1148.816075] mount_fs+0x106/0x3ff [ 1148.816090] ? emergency_thaw_all+0x1a0/0x1a0 [ 1148.816106] ? __init_waitqueue_head+0x36/0x90 [ 1148.824210] vfs_kern_mount.part.0+0x6f/0x410 [ 1148.824229] do_mount+0x581/0x2d30 [ 1148.824243] ? copy_mount_options+0x41/0x440 [ 1148.824264] ? copy_mount_string+0x40/0x40 [ 1148.824279] ? kmem_cache_alloc_trace+0x354/0x760 [ 1148.824302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1148.831605] ? copy_mount_options+0x30e/0x440 [ 1148.831631] ksys_mount+0xdb/0x150 [ 1148.831650] __x64_sys_mount+0xbe/0x150 [ 1148.831668] do_syscall_64+0x103/0x610 [ 1148.831685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1148.831697] RIP: 0033:0x45a89a [ 1148.892084] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1148.910983] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1148.918699] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1148.925969] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1148.933238] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1148.940505] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1148.947771] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xd000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a003, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:35 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003301, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:35 executing program 5 (fault-call:2 fault-nth:50): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:35 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003400, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:36 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf4ffffff00000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1149.137530] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:36 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003401, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a004, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1149.201127] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1149.201127] [ 1149.235024] FAULT_INJECTION: forcing a failure. [ 1149.235024] name failslab, interval 1, probability 0, space 0, times 0 16:59:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1149.260883] CPU: 1 PID: 6691 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1149.268103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1149.268109] Call Trace: [ 1149.268132] dump_stack+0x172/0x1f0 [ 1149.268151] should_fail.cold+0xa/0x1b [ 1149.287613] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1149.292724] ? lock_downgrade+0x810/0x810 [ 1149.292744] ? ___might_sleep+0x163/0x280 [ 1149.292760] __should_failslab+0x121/0x190 [ 1149.292777] should_failslab+0x9/0x14 16:59:36 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003500, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1149.292790] kmem_cache_alloc_trace+0x2d1/0x760 [ 1149.292807] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1149.318873] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1149.323808] __list_lru_init+0x3d3/0x6e0 [ 1149.327867] sget_userns+0x81e/0xd30 [ 1149.331596] ? kill_litter_super+0x60/0x60 [ 1149.335831] ? ns_test_super+0x50/0x50 [ 1149.335848] ? ns_test_super+0x50/0x50 [ 1149.335863] ? kill_litter_super+0x60/0x60 [ 1149.335878] sget+0x10c/0x150 [ 1149.335898] mount_bdev+0xff/0x3c0 [ 1149.335914] ? finish_unfinished+0x1120/0x1120 [ 1149.335932] get_super_block+0x35/0x40 [ 1149.347905] mount_fs+0x106/0x3ff [ 1149.347925] ? emergency_thaw_all+0x1a0/0x1a0 [ 1149.347943] ? __init_waitqueue_head+0x36/0x90 [ 1149.347963] vfs_kern_mount.part.0+0x6f/0x410 [ 1149.380009] do_mount+0x581/0x2d30 [ 1149.383556] ? copy_mount_options+0x41/0x440 [ 1149.387994] ? copy_mount_string+0x40/0x40 [ 1149.392232] ? kmem_cache_alloc_trace+0x354/0x760 [ 1149.397084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1149.402622] ? copy_mount_options+0x30e/0x440 [ 1149.407122] ksys_mount+0xdb/0x150 [ 1149.410665] __x64_sys_mount+0xbe/0x150 [ 1149.414644] do_syscall_64+0x103/0x610 [ 1149.418540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.423727] RIP: 0033:0x45a89a [ 1149.426919] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1149.445819] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1149.453526] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1149.460797] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1149.468164] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1149.475427] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1149.482694] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1149.507862] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1149.633694] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1149.640855] net_ratelimit: 19 callbacks suppressed [ 1149.640862] protocol 88fb is buggy, dev hsr_slave_0 [ 1149.643145] protocol 88fb is buggy, dev hsr_slave_0 [ 1149.647991] protocol 88fb is buggy, dev hsr_slave_1 [ 1149.653013] protocol 88fb is buggy, dev hsr_slave_1 [ 1149.668748] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1149.668748] 16:59:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a005, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:36 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff00000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:36 executing program 5 (fault-call:2 fault-nth:51): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:36 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003501, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:36 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003600, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1149.783339] FAULT_INJECTION: forcing a failure. [ 1149.783339] name failslab, interval 1, probability 0, space 0, times 0 [ 1149.804080] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1149.816915] CPU: 1 PID: 6718 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1149.824127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1149.833479] Call Trace: [ 1149.836083] dump_stack+0x172/0x1f0 [ 1149.839717] should_fail.cold+0xa/0x1b [ 1149.843613] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1149.848722] ? lock_downgrade+0x810/0x810 [ 1149.852878] ? ___might_sleep+0x163/0x280 [ 1149.857033] __should_failslab+0x121/0x190 [ 1149.861270] should_failslab+0x9/0x14 [ 1149.865091] kmem_cache_alloc_trace+0x2d1/0x760 [ 1149.869762] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1149.874874] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1149.879810] __list_lru_init+0x3d3/0x6e0 [ 1149.883877] sget_userns+0x81e/0xd30 [ 1149.887592] ? kill_litter_super+0x60/0x60 [ 1149.891830] ? ns_test_super+0x50/0x50 [ 1149.895717] ? ns_test_super+0x50/0x50 [ 1149.899603] ? kill_litter_super+0x60/0x60 [ 1149.903839] sget+0x10c/0x150 [ 1149.906967] mount_bdev+0xff/0x3c0 [ 1149.910516] ? finish_unfinished+0x1120/0x1120 [ 1149.915109] get_super_block+0x35/0x40 [ 1149.918998] mount_fs+0x106/0x3ff [ 1149.922458] ? emergency_thaw_all+0x1a0/0x1a0 [ 1149.926966] ? __init_waitqueue_head+0x36/0x90 [ 1149.931561] vfs_kern_mount.part.0+0x6f/0x410 [ 1149.936064] do_mount+0x581/0x2d30 [ 1149.939607] ? copy_mount_options+0x41/0x440 [ 1149.944025] ? copy_mount_string+0x40/0x40 [ 1149.948262] ? kmem_cache_alloc_trace+0x354/0x760 [ 1149.953113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1149.958650] ? copy_mount_options+0x30e/0x440 [ 1149.963156] ksys_mount+0xdb/0x150 [ 1149.966700] __x64_sys_mount+0xbe/0x150 [ 1149.970679] do_syscall_64+0x103/0x610 [ 1149.974582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.979770] RIP: 0033:0x45a89a [ 1149.982973] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1150.001872] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1150.009578] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1150.016849] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1150.024118] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 16:59:36 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003601, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1150.031383] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1150.038651] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a006, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1150.120853] protocol 88fb is buggy, dev hsr_slave_0 [ 1150.126030] protocol 88fb is buggy, dev hsr_slave_1 [ 1150.131145] protocol 88fb is buggy, dev hsr_slave_0 [ 1150.136195] protocol 88fb is buggy, dev hsr_slave_1 [ 1150.141324] protocol 88fb is buggy, dev hsr_slave_0 [ 1150.146403] protocol 88fb is buggy, dev hsr_slave_1 16:59:37 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003700, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:37 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1150.187640] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1150.213532] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1150.213532] [ 1150.320395] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1150.320395] 16:59:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:37 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003701, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:37 executing program 5 (fault-call:2 fault-nth:52): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a007, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:37 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfa01000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:37 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003800, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1150.493673] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:37 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003801, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a008, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1150.567814] FAULT_INJECTION: forcing a failure. [ 1150.567814] name failslab, interval 1, probability 0, space 0, times 0 [ 1150.589871] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1150.589871] [ 1150.608663] CPU: 1 PID: 6762 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1150.615890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1150.615897] Call Trace: [ 1150.615921] dump_stack+0x172/0x1f0 [ 1150.615939] should_fail.cold+0xa/0x1b [ 1150.635381] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1150.635398] ? lock_downgrade+0x810/0x810 [ 1150.635416] ? ___might_sleep+0x163/0x280 [ 1150.648867] __should_failslab+0x121/0x190 [ 1150.653130] should_failslab+0x9/0x14 [ 1150.656938] kmem_cache_alloc_trace+0x2d1/0x760 [ 1150.661621] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1150.666740] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1150.671674] __list_lru_init+0x3d3/0x6e0 [ 1150.675735] sget_userns+0x81e/0xd30 [ 1150.679526] ? kill_litter_super+0x60/0x60 [ 1150.683756] ? ns_test_super+0x50/0x50 [ 1150.687632] ? ns_test_super+0x50/0x50 [ 1150.691516] ? kill_litter_super+0x60/0x60 [ 1150.695735] sget+0x10c/0x150 [ 1150.698832] mount_bdev+0xff/0x3c0 [ 1150.702357] ? finish_unfinished+0x1120/0x1120 [ 1150.706930] get_super_block+0x35/0x40 [ 1150.710805] mount_fs+0x106/0x3ff [ 1150.714245] ? emergency_thaw_all+0x1a0/0x1a0 [ 1150.718730] ? __init_waitqueue_head+0x36/0x90 [ 1150.723304] vfs_kern_mount.part.0+0x6f/0x410 [ 1150.727787] do_mount+0x581/0x2d30 [ 1150.731315] ? copy_mount_options+0x41/0x440 [ 1150.735714] ? copy_mount_string+0x40/0x40 [ 1150.739935] ? kmem_cache_alloc_trace+0x354/0x760 [ 1150.744771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1150.750296] ? copy_mount_options+0x30e/0x440 [ 1150.754793] ksys_mount+0xdb/0x150 [ 1150.758324] __x64_sys_mount+0xbe/0x150 [ 1150.762826] do_syscall_64+0x103/0x610 [ 1150.766703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1150.771886] RIP: 0033:0x45a89a [ 1150.775073] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1150.793958] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1150.801652] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1150.808916] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 16:59:37 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003900, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1150.816168] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1150.823424] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1150.830681] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1150.854182] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1150.993772] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1150.993772] [ 1151.007615] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:37 executing program 5 (fault-call:2 fault-nth:53): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:37 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfbffffff00000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a100, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x18000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:37 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003901, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a101, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1151.118408] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1151.189717] FAULT_INJECTION: forcing a failure. [ 1151.189717] name failslab, interval 1, probability 0, space 0, times 0 [ 1151.205057] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1151.205057] [ 1151.218293] CPU: 0 PID: 6804 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1151.225499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1151.234858] Call Trace: [ 1151.237458] dump_stack+0x172/0x1f0 [ 1151.241093] should_fail.cold+0xa/0x1b [ 1151.244992] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1151.250102] ? lock_downgrade+0x810/0x810 [ 1151.254258] ? ___might_sleep+0x163/0x280 [ 1151.258416] __should_failslab+0x121/0x190 [ 1151.262656] should_failslab+0x9/0x14 [ 1151.266462] kmem_cache_alloc_trace+0x2d1/0x760 [ 1151.271141] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1151.276260] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1151.281197] __list_lru_init+0x3d3/0x6e0 [ 1151.285264] sget_userns+0x81e/0xd30 [ 1151.288985] ? kill_litter_super+0x60/0x60 [ 1151.293225] ? ns_test_super+0x50/0x50 [ 1151.297117] ? ns_test_super+0x50/0x50 [ 1151.301001] ? kill_litter_super+0x60/0x60 [ 1151.305238] sget+0x10c/0x150 [ 1151.308348] mount_bdev+0xff/0x3c0 [ 1151.311890] ? finish_unfinished+0x1120/0x1120 [ 1151.316477] get_super_block+0x35/0x40 [ 1151.320357] mount_fs+0x106/0x3ff [ 1151.323804] ? emergency_thaw_all+0x1a0/0x1a0 [ 1151.328297] ? __init_waitqueue_head+0x36/0x90 [ 1151.332874] vfs_kern_mount.part.0+0x6f/0x410 [ 1151.337357] do_mount+0x581/0x2d30 [ 1151.340884] ? copy_mount_options+0x41/0x440 [ 1151.345282] ? copy_mount_string+0x40/0x40 [ 1151.349503] ? kmem_cache_alloc_trace+0x354/0x760 [ 1151.354335] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1151.359855] ? copy_mount_options+0x30e/0x440 [ 1151.364355] ksys_mount+0xdb/0x150 [ 1151.367882] __x64_sys_mount+0xbe/0x150 [ 1151.371853] do_syscall_64+0x103/0x610 [ 1151.375740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1151.380915] RIP: 0033:0x45a89a [ 1151.384092] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1151.402975] RSP: 002b:00007f619bb46a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1151.410665] RAX: ffffffffffffffda RBX: 00007f619bb46b30 RCX: 000000000045a89a [ 1151.417925] RDX: 00007f619bb46ad0 RSI: 0000000020000100 RDI: 00007f619bb46af0 [ 1151.425180] RBP: 0000000020000100 R08: 00007f619bb46b30 R09: 00007f619bb46ad0 [ 1151.432435] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 16:59:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:38 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff00000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1151.439688] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000003 16:59:38 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003a00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1151.483218] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a102, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:38 executing program 5 (fault-call:2 fault-nth:54): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:38 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003a01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1151.584148] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1151.584148] [ 1151.603593] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x1a0f0000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(0x0, 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:38 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff00000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:38 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003b00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1151.731966] FAULT_INJECTION: forcing a failure. [ 1151.731966] name failslab, interval 1, probability 0, space 0, times 0 [ 1151.770321] CPU: 1 PID: 6833 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 16:59:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a103, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1151.777557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1151.786913] Call Trace: [ 1151.789517] dump_stack+0x172/0x1f0 [ 1151.793165] should_fail.cold+0xa/0x1b [ 1151.797061] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1151.802170] ? lock_downgrade+0x810/0x810 [ 1151.806325] ? ___might_sleep+0x163/0x280 [ 1151.810475] __should_failslab+0x121/0x190 [ 1151.814717] should_failslab+0x9/0x14 [ 1151.818516] kmem_cache_alloc_trace+0x2d1/0x760 [ 1151.823191] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1151.828299] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1151.833235] __list_lru_init+0x3d3/0x6e0 [ 1151.837307] sget_userns+0x81e/0xd30 [ 1151.841019] ? kill_litter_super+0x60/0x60 [ 1151.845255] ? ns_test_super+0x50/0x50 [ 1151.849142] ? ns_test_super+0x50/0x50 [ 1151.853027] ? kill_litter_super+0x60/0x60 [ 1151.857258] sget+0x10c/0x150 [ 1151.860373] mount_bdev+0xff/0x3c0 [ 1151.863917] ? finish_unfinished+0x1120/0x1120 [ 1151.868506] get_super_block+0x35/0x40 [ 1151.872403] mount_fs+0x106/0x3ff [ 1151.875858] ? emergency_thaw_all+0x1a0/0x1a0 [ 1151.880352] ? __init_waitqueue_head+0x36/0x90 [ 1151.884943] vfs_kern_mount.part.0+0x6f/0x410 [ 1151.889446] do_mount+0x581/0x2d30 [ 1151.892984] ? copy_mount_options+0x41/0x440 [ 1151.897399] ? copy_mount_string+0x40/0x40 [ 1151.901723] ? kmem_cache_alloc_trace+0x354/0x760 [ 1151.906576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1151.912116] ? copy_mount_options+0x30e/0x440 [ 1151.916614] ksys_mount+0xdb/0x150 [ 1151.920161] __x64_sys_mount+0xbe/0x150 [ 1151.924143] do_syscall_64+0x103/0x610 [ 1151.928035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1151.933220] RIP: 0033:0x45a89a [ 1151.936414] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1151.955308] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1151.963012] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1151.970281] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 16:59:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(0x0, 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1151.977545] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1151.984815] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1151.992084] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:39 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003b01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:39 executing program 5 (fault-call:2 fault-nth:55): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(0x0, 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1152.150673] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1152.150673] 16:59:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a104, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:39 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003c00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1152.286634] FAULT_INJECTION: forcing a failure. [ 1152.286634] name failslab, interval 1, probability 0, space 0, times 0 [ 1152.308506] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue [ 1152.336281] CPU: 1 PID: 6860 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1152.343508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1152.343514] Call Trace: [ 1152.343538] dump_stack+0x172/0x1f0 [ 1152.343557] should_fail.cold+0xa/0x1b [ 1152.343574] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1152.368060] ? lock_downgrade+0x810/0x810 [ 1152.372202] ? ___might_sleep+0x163/0x280 [ 1152.376343] __should_failslab+0x121/0x190 [ 1152.380586] should_failslab+0x9/0x14 [ 1152.384372] kmem_cache_alloc_trace+0x2d1/0x760 [ 1152.389030] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1152.394120] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1152.399039] __list_lru_init+0x3d3/0x6e0 [ 1152.403093] sget_userns+0x81e/0xd30 [ 1152.406790] ? kill_litter_super+0x60/0x60 [ 1152.411015] ? ns_test_super+0x50/0x50 [ 1152.414890] ? ns_test_super+0x50/0x50 [ 1152.418766] ? kill_litter_super+0x60/0x60 [ 1152.422987] sget+0x10c/0x150 [ 1152.426080] mount_bdev+0xff/0x3c0 [ 1152.429608] ? finish_unfinished+0x1120/0x1120 [ 1152.434179] get_super_block+0x35/0x40 [ 1152.438051] mount_fs+0x106/0x3ff [ 1152.441517] ? emergency_thaw_all+0x1a0/0x1a0 [ 1152.445997] ? __init_waitqueue_head+0x36/0x90 [ 1152.450568] vfs_kern_mount.part.0+0x6f/0x410 [ 1152.455064] do_mount+0x581/0x2d30 [ 1152.458592] ? copy_mount_options+0x41/0x440 [ 1152.462999] ? copy_mount_string+0x40/0x40 [ 1152.467217] ? kmem_cache_alloc_trace+0x354/0x760 [ 1152.472049] ? _copy_from_user+0xdd/0x150 [ 1152.476205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1152.481729] ? copy_mount_options+0x30e/0x440 [ 1152.486218] ksys_mount+0xdb/0x150 [ 1152.489766] __x64_sys_mount+0xbe/0x150 [ 1152.493729] do_syscall_64+0x103/0x610 [ 1152.497613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1152.502787] RIP: 0033:0x45a89a [ 1152.505967] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1152.524850] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 16:59:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1152.532555] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1152.539812] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1152.547066] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1152.554321] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1152.561577] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x1e020000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:39 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff00000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a105, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:39 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003c01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:39 executing program 5 (fault-call:2 fault-nth:56): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a106, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:39 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003d00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:39 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1152.923390] FAULT_INJECTION: forcing a failure. [ 1152.923390] name failslab, interval 1, probability 0, space 0, times 0 [ 1152.951250] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1152.951250] 16:59:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1152.970849] CPU: 1 PID: 6894 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1152.978067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1152.987420] Call Trace: [ 1152.990021] dump_stack+0x172/0x1f0 [ 1152.993659] should_fail.cold+0xa/0x1b [ 1152.997548] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1153.002643] ? lock_downgrade+0x810/0x810 [ 1153.006797] ? ___might_sleep+0x163/0x280 [ 1153.010955] __should_failslab+0x121/0x190 [ 1153.015198] should_failslab+0x9/0x14 [ 1153.019000] kmem_cache_alloc_trace+0x2d1/0x760 [ 1153.023761] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1153.028875] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1153.033808] __list_lru_init+0x3d3/0x6e0 [ 1153.037879] sget_userns+0x81e/0xd30 [ 1153.041597] ? kill_litter_super+0x60/0x60 [ 1153.045865] ? ns_test_super+0x50/0x50 [ 1153.049849] ? ns_test_super+0x50/0x50 [ 1153.053740] ? kill_litter_super+0x60/0x60 [ 1153.057979] sget+0x10c/0x150 [ 1153.061096] mount_bdev+0xff/0x3c0 [ 1153.064641] ? finish_unfinished+0x1120/0x1120 [ 1153.069229] get_super_block+0x35/0x40 [ 1153.073125] mount_fs+0x106/0x3ff [ 1153.076585] ? emergency_thaw_all+0x1a0/0x1a0 [ 1153.081084] ? __init_waitqueue_head+0x36/0x90 [ 1153.085677] vfs_kern_mount.part.0+0x6f/0x410 [ 1153.090187] do_mount+0x581/0x2d30 [ 1153.093730] ? copy_mount_options+0x41/0x440 [ 1153.098144] ? copy_mount_string+0x40/0x40 [ 1153.102382] ? kmem_cache_alloc_trace+0x354/0x760 [ 1153.107233] ? _copy_from_user+0xdd/0x150 [ 1153.111389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1153.116931] ? copy_mount_options+0x30e/0x440 [ 1153.121432] ksys_mount+0xdb/0x150 [ 1153.124988] __x64_sys_mount+0xbe/0x150 [ 1153.128967] do_syscall_64+0x103/0x610 [ 1153.132863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1153.138050] RIP: 0033:0x45a89a [ 1153.141242] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1153.160141] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1153.167852] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1153.175124] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1153.182393] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1153.189663] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1153.196941] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a107, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:40 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003d01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:40 executing program 5 (fault-call:2 fault-nth:57): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:40 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1153.429521] FAULT_INJECTION: forcing a failure. [ 1153.429521] name failslab, interval 1, probability 0, space 0, times 0 [ 1153.488158] CPU: 0 PID: 6926 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1153.495391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1153.504764] Call Trace: [ 1153.507375] dump_stack+0x172/0x1f0 [ 1153.511019] should_fail.cold+0xa/0x1b [ 1153.514912] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1153.520014] ? lock_downgrade+0x810/0x810 [ 1153.524170] ? ___might_sleep+0x163/0x280 [ 1153.528323] __should_failslab+0x121/0x190 [ 1153.532565] should_failslab+0x9/0x14 [ 1153.536367] kmem_cache_alloc_node_trace+0x270/0x720 [ 1153.536380] ? kmem_cache_alloc_trace+0x354/0x760 [ 1153.536396] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1153.551423] __kmalloc_node+0x3d/0x70 [ 1153.551442] kvmalloc_node+0x68/0x100 [ 1153.551457] __list_lru_init+0x4aa/0x6e0 [ 1153.551476] sget_userns+0x81e/0xd30 [ 1153.551491] ? kill_litter_super+0x60/0x60 [ 1153.551507] ? ns_test_super+0x50/0x50 [ 1153.574929] ? ns_test_super+0x50/0x50 [ 1153.578823] ? kill_litter_super+0x60/0x60 [ 1153.583066] sget+0x10c/0x150 [ 1153.586178] mount_bdev+0xff/0x3c0 [ 1153.589731] ? finish_unfinished+0x1120/0x1120 [ 1153.594332] get_super_block+0x35/0x40 [ 1153.598227] mount_fs+0x106/0x3ff [ 1153.601687] ? emergency_thaw_all+0x1a0/0x1a0 [ 1153.601704] ? __init_waitqueue_head+0x36/0x90 [ 1153.601730] vfs_kern_mount.part.0+0x6f/0x410 [ 1153.601749] do_mount+0x581/0x2d30 [ 1153.601763] ? copy_mount_options+0x41/0x440 [ 1153.601778] ? copy_mount_string+0x40/0x40 [ 1153.601792] ? kmem_cache_alloc_trace+0x354/0x760 [ 1153.601809] ? _copy_from_user+0xdd/0x150 [ 1153.601825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1153.615375] ? copy_mount_options+0x30e/0x440 [ 1153.615394] ksys_mount+0xdb/0x150 [ 1153.615410] __x64_sys_mount+0xbe/0x150 [ 1153.654007] do_syscall_64+0x103/0x610 [ 1153.657902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1153.663094] RIP: 0033:0x45a89a [ 1153.666289] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 16:59:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, 0x0) 16:59:40 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003e00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1153.671329] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1153.671329] [ 1153.685193] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1153.685207] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1153.685215] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1153.685223] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1153.685231] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 16:59:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a108, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1153.685238] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, 0x0) 16:59:40 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003e01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:40 executing program 5 (fault-call:2 fault-nth:58): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a200, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:40 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:40 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003f00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1153.990226] FAULT_INJECTION: forcing a failure. [ 1153.990226] name failslab, interval 1, probability 0, space 0, times 0 16:59:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, 0x0) [ 1154.036749] CPU: 0 PID: 6958 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1154.043972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1154.053325] Call Trace: [ 1154.055924] dump_stack+0x172/0x1f0 [ 1154.059562] should_fail.cold+0xa/0x1b [ 1154.063461] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1154.068575] ? lock_downgrade+0x810/0x810 [ 1154.072739] ? ___might_sleep+0x163/0x280 [ 1154.076895] __should_failslab+0x121/0x190 [ 1154.081133] should_failslab+0x9/0x14 [ 1154.084937] kmem_cache_alloc_trace+0x2d1/0x760 [ 1154.089620] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1154.094732] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1154.099669] __list_lru_init+0x3d3/0x6e0 [ 1154.103738] sget_userns+0x81e/0xd30 [ 1154.107453] ? kill_litter_super+0x60/0x60 [ 1154.111695] ? ns_test_super+0x50/0x50 [ 1154.115583] ? ns_test_super+0x50/0x50 [ 1154.119474] ? kill_litter_super+0x60/0x60 [ 1154.123715] sget+0x10c/0x150 [ 1154.126823] mount_bdev+0xff/0x3c0 [ 1154.130368] ? finish_unfinished+0x1120/0x1120 [ 1154.134958] get_super_block+0x35/0x40 [ 1154.138847] mount_fs+0x106/0x3ff [ 1154.142306] ? emergency_thaw_all+0x1a0/0x1a0 [ 1154.146802] ? __init_waitqueue_head+0x36/0x90 [ 1154.151391] vfs_kern_mount.part.0+0x6f/0x410 [ 1154.155892] do_mount+0x581/0x2d30 [ 1154.159437] ? copy_mount_options+0x41/0x440 [ 1154.163851] ? copy_mount_string+0x40/0x40 [ 1154.168090] ? kmem_cache_alloc_trace+0x354/0x760 [ 1154.172940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1154.178476] ? copy_mount_options+0x30e/0x440 [ 1154.182985] ksys_mount+0xdb/0x150 [ 1154.186535] __x64_sys_mount+0xbe/0x150 [ 1154.190518] do_syscall_64+0x103/0x610 [ 1154.194410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1154.199592] RIP: 0033:0x45a89a [ 1154.202870] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1154.221768] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1154.229473] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a 16:59:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a201, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1154.236739] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1154.244008] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1154.251274] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1154.258539] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1154.270556] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1154.270556] 16:59:41 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1003f01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x0, 0x401}) 16:59:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a202, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1154.472347] vhci_hcd: default hub control req: 0000 v0000 i0001 l0 [ 1154.552456] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 16:59:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:41 executing program 5 (fault-call:2 fault-nth:59): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:41 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffff0700, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x0, 0x401}) 16:59:41 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004000, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a203, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x0, 0x401}) [ 1154.663876] vhci_hcd: default hub control req: 0000 v0000 i0001 l0 16:59:41 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004001, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1154.741821] FAULT_INJECTION: forcing a failure. [ 1154.741821] name failslab, interval 1, probability 0, space 0, times 0 [ 1154.765486] CPU: 0 PID: 7002 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1154.772715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1154.782068] Call Trace: [ 1154.782093] dump_stack+0x172/0x1f0 16:59:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a204, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1154.782113] should_fail.cold+0xa/0x1b [ 1154.782131] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1154.782147] ? lock_downgrade+0x810/0x810 [ 1154.782162] ? ___might_sleep+0x163/0x280 [ 1154.782180] __should_failslab+0x121/0x190 [ 1154.782196] should_failslab+0x9/0x14 [ 1154.782209] kmem_cache_alloc_trace+0x2d1/0x760 [ 1154.782226] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1154.782246] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1154.782269] __list_lru_init+0x3d3/0x6e0 [ 1154.782290] sget_userns+0x81e/0xd30 [ 1154.782304] ? kill_litter_super+0x60/0x60 [ 1154.782320] ? ns_test_super+0x50/0x50 [ 1154.788515] ? ns_test_super+0x50/0x50 [ 1154.788531] ? kill_litter_super+0x60/0x60 [ 1154.788555] sget+0x10c/0x150 [ 1154.788573] mount_bdev+0xff/0x3c0 [ 1154.788588] ? finish_unfinished+0x1120/0x1120 [ 1154.797572] get_super_block+0x35/0x40 [ 1154.797591] mount_fs+0x106/0x3ff [ 1154.797610] ? emergency_thaw_all+0x1a0/0x1a0 [ 1154.797632] ? __init_waitqueue_head+0x36/0x90 [ 1154.805907] vfs_kern_mount.part.0+0x6f/0x410 [ 1154.805927] do_mount+0x581/0x2d30 [ 1154.805944] ? copy_mount_options+0x41/0x440 [ 1154.805965] ? copy_mount_string+0x40/0x40 [ 1154.813971] ? kmem_cache_alloc_trace+0x354/0x760 [ 1154.813990] ? _copy_from_user+0xdd/0x150 [ 1154.814010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1154.814025] ? copy_mount_options+0x30e/0x440 [ 1154.814045] ksys_mount+0xdb/0x150 [ 1154.814062] __x64_sys_mount+0xbe/0x150 [ 1154.814080] do_syscall_64+0x103/0x610 [ 1154.814099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1154.832789] RIP: 0033:0x45a89a [ 1154.832804] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1154.832812] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1154.832827] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1154.832837] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1154.832846] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1154.832854] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 16:59:41 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffff7f, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123}) 16:59:41 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004100, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1154.832862] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1154.844068] vhci_hcd: default hub control req: 0000 v0000 i0001 l0 [ 1155.093789] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1155.093789] [ 1155.130115] vhci_hcd: invalid port number 0 [ 1155.225165] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1155.225165] 16:59:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x24020000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a205, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:42 executing program 5 (fault-call:2 fault-nth:60): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:42 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004101, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123}) 16:59:42 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:42 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004200, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1155.359414] vhci_hcd: invalid port number 0 16:59:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20123}) 16:59:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a206, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:42 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004201, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1155.487688] vhci_hcd: invalid port number 0 [ 1155.495007] FAULT_INJECTION: forcing a failure. [ 1155.495007] name failslab, interval 1, probability 0, space 0, times 0 16:59:42 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000040)={0x200100000001, 0x2000000000000003, 0x100000001}) [ 1155.542325] CPU: 0 PID: 7044 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1155.549552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1155.558913] Call Trace: [ 1155.561524] dump_stack+0x172/0x1f0 [ 1155.565168] should_fail.cold+0xa/0x1b [ 1155.569096] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1155.574204] ? lock_downgrade+0x810/0x810 [ 1155.578359] ? ___might_sleep+0x163/0x280 [ 1155.578375] __should_failslab+0x121/0x190 [ 1155.578391] should_failslab+0x9/0x14 [ 1155.590540] kmem_cache_alloc_trace+0x2d1/0x760 [ 1155.595218] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1155.600328] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1155.605262] __list_lru_init+0x3d3/0x6e0 [ 1155.609354] sget_userns+0x81e/0xd30 [ 1155.613069] ? kill_litter_super+0x60/0x60 [ 1155.617311] ? ns_test_super+0x50/0x50 [ 1155.621200] ? ns_test_super+0x50/0x50 [ 1155.625092] ? kill_litter_super+0x60/0x60 [ 1155.629327] sget+0x10c/0x150 [ 1155.632442] mount_bdev+0xff/0x3c0 [ 1155.635988] ? finish_unfinished+0x1120/0x1120 [ 1155.640580] get_super_block+0x35/0x40 [ 1155.644486] mount_fs+0x106/0x3ff [ 1155.644506] ? emergency_thaw_all+0x1a0/0x1a0 [ 1155.644523] ? __init_waitqueue_head+0x36/0x90 [ 1155.644544] vfs_kern_mount.part.0+0x6f/0x410 [ 1155.644567] do_mount+0x581/0x2d30 [ 1155.652493] ? copy_mount_options+0x41/0x440 [ 1155.652515] ? copy_mount_string+0x40/0x40 [ 1155.652531] ? kmem_cache_alloc_trace+0x354/0x760 [ 1155.652551] ? _copy_from_user+0xdd/0x150 [ 1155.652574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1155.652588] ? copy_mount_options+0x30e/0x440 [ 1155.652607] ksys_mount+0xdb/0x150 [ 1155.652626] __x64_sys_mount+0xbe/0x150 [ 1155.652645] do_syscall_64+0x103/0x610 [ 1155.704226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1155.709413] RIP: 0033:0x45a89a [ 1155.712608] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1155.731518] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1155.739234] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1155.746509] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1155.755023] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1155.762293] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1155.769566] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:42 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004300, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1155.801986] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1155.801986] [ 1155.880871] net_ratelimit: 20 callbacks suppressed [ 1155.880878] protocol 88fb is buggy, dev hsr_slave_0 [ 1155.880910] protocol 88fb is buggy, dev hsr_slave_1 [ 1155.885918] protocol 88fb is buggy, dev hsr_slave_1 [ 1155.932365] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 16:59:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x25020000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:42 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='%dev=.']) 16:59:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a207, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0xbf87, 0x0) ioctl(r1, 0xefefeef7bfbfffa4, 0x0) 16:59:42 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004301, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:42 executing program 5 (fault-call:2 fault-nth:61): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:42 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004400, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1156.060112] FAULT_INJECTION: forcing a failure. [ 1156.060112] name failslab, interval 1, probability 0, space 0, times 0 [ 1156.095955] CPU: 0 PID: 7074 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 16:59:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1156.103182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1156.111385] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "%dev=." [ 1156.112533] Call Trace: [ 1156.112560] dump_stack+0x172/0x1f0 [ 1156.112579] should_fail.cold+0xa/0x1b [ 1156.132107] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1156.137221] ? lock_downgrade+0x810/0x810 [ 1156.141377] ? ___might_sleep+0x163/0x280 [ 1156.145538] __should_failslab+0x121/0x190 [ 1156.149780] should_failslab+0x9/0x14 [ 1156.153582] kmem_cache_alloc_trace+0x2d1/0x760 [ 1156.158256] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1156.163365] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1156.168303] __list_lru_init+0x3d3/0x6e0 [ 1156.172376] sget_userns+0x81e/0xd30 [ 1156.176091] ? kill_litter_super+0x60/0x60 [ 1156.180333] ? ns_test_super+0x50/0x50 [ 1156.184223] ? ns_test_super+0x50/0x50 [ 1156.188112] ? kill_litter_super+0x60/0x60 [ 1156.192345] sget+0x10c/0x150 [ 1156.195468] mount_bdev+0xff/0x3c0 [ 1156.199009] ? finish_unfinished+0x1120/0x1120 [ 1156.203600] get_super_block+0x35/0x40 [ 1156.207558] mount_fs+0x106/0x3ff 16:59:43 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004401, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1156.211023] ? emergency_thaw_all+0x1a0/0x1a0 [ 1156.215531] ? __init_waitqueue_head+0x36/0x90 [ 1156.220125] vfs_kern_mount.part.0+0x6f/0x410 [ 1156.224633] do_mount+0x581/0x2d30 [ 1156.228189] ? copy_mount_string+0x40/0x40 [ 1156.232447] ? copy_mount_options+0x255/0x440 [ 1156.236952] ? copy_mount_options+0x1d9/0x440 [ 1156.241468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1156.247011] ? copy_mount_options+0x30e/0x440 [ 1156.251518] ksys_mount+0xdb/0x150 [ 1156.251538] __x64_sys_mount+0xbe/0x150 [ 1156.251558] do_syscall_64+0x103/0x610 [ 1156.251578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1156.251589] RIP: 0033:0x45a89a [ 1156.251602] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1156.251610] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1156.251623] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1156.251632] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1156.251639] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1156.251649] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1156.268184] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1156.290122] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a208, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1156.360911] protocol 88fb is buggy, dev hsr_slave_0 [ 1156.366084] protocol 88fb is buggy, dev hsr_slave_1 [ 1156.371231] protocol 88fb is buggy, dev hsr_slave_0 [ 1156.376278] protocol 88fb is buggy, dev hsr_slave_1 [ 1156.381395] protocol 88fb is buggy, dev hsr_slave_0 [ 1156.386471] protocol 88fb is buggy, dev hsr_slave_1 [ 1156.408308] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1156.408308] [ 1156.443462] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 16:59:43 executing program 5 (fault-call:2 fault-nth:62): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1156.478112] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1156.585546] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue [ 1156.704083] FAULT_INJECTION: forcing a failure. [ 1156.704083] name failslab, interval 1, probability 0, space 0, times 0 [ 1156.730928] CPU: 0 PID: 7113 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1156.738143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1156.747501] Call Trace: [ 1156.750095] dump_stack+0x172/0x1f0 [ 1156.753733] should_fail.cold+0xa/0x1b [ 1156.757626] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1156.762733] ? lock_downgrade+0x810/0x810 [ 1156.766883] ? ___might_sleep+0x163/0x280 [ 1156.771035] __should_failslab+0x121/0x190 [ 1156.775275] should_failslab+0x9/0x14 [ 1156.779071] __kmalloc+0x2dc/0x740 [ 1156.782615] ? __list_lru_init+0xd5/0x6e0 [ 1156.786765] __list_lru_init+0xd5/0x6e0 [ 1156.790743] sget_userns+0x84d/0xd30 [ 1156.794461] ? kill_litter_super+0x60/0x60 [ 1156.798704] ? ns_test_super+0x50/0x50 [ 1156.802591] ? ns_test_super+0x50/0x50 [ 1156.806481] ? kill_litter_super+0x60/0x60 [ 1156.810714] sget+0x10c/0x150 [ 1156.813824] mount_bdev+0xff/0x3c0 [ 1156.817366] ? finish_unfinished+0x1120/0x1120 [ 1156.821962] get_super_block+0x35/0x40 [ 1156.825851] mount_fs+0x106/0x3ff [ 1156.829303] ? emergency_thaw_all+0x1a0/0x1a0 [ 1156.833801] ? __init_waitqueue_head+0x36/0x90 [ 1156.838395] vfs_kern_mount.part.0+0x6f/0x410 [ 1156.842894] do_mount+0x581/0x2d30 [ 1156.846438] ? copy_mount_options+0x41/0x440 [ 1156.850857] ? copy_mount_string+0x40/0x40 [ 1156.855095] ? kmem_cache_alloc_trace+0x354/0x760 [ 1156.859943] ? _copy_from_user+0xdd/0x150 [ 1156.864093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1156.869632] ? copy_mount_options+0x30e/0x440 [ 1156.874132] ksys_mount+0xdb/0x150 [ 1156.878023] __x64_sys_mount+0xbe/0x150 [ 1156.882005] do_syscall_64+0x103/0x610 [ 1156.885980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1156.891161] RIP: 0033:0x45a89a [ 1156.894351] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1156.913252] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1156.920960] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1156.928228] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1156.935500] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1156.942766] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 16:59:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x2d020000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:43 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004500, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a300, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:43 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='cdev=.']) 16:59:43 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004501, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1156.950031] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a301, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1157.009606] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1157.035108] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "cdev=." 16:59:43 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004600, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1157.061728] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1157.061728] 16:59:44 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a302, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:44 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004601, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1157.178659] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:44 executing program 5 (fault-call:2 fault-nth:63): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1157.238188] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1157.238188] 16:59:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x30000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:44 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fdev=.']) 16:59:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1157.328302] FAULT_INJECTION: forcing a failure. [ 1157.328302] name failslab, interval 1, probability 0, space 0, times 0 [ 1157.360305] CPU: 0 PID: 7153 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1157.367550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1157.376928] Call Trace: [ 1157.379525] dump_stack+0x172/0x1f0 [ 1157.383161] should_fail.cold+0xa/0x1b [ 1157.387057] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1157.392163] ? lock_downgrade+0x810/0x810 [ 1157.396319] ? ___might_sleep+0x163/0x280 [ 1157.400477] __should_failslab+0x121/0x190 [ 1157.404720] should_failslab+0x9/0x14 [ 1157.408528] kmem_cache_alloc_trace+0x2d1/0x760 [ 1157.413204] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1157.418316] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1157.423258] __list_lru_init+0x3d3/0x6e0 [ 1157.427325] sget_userns+0x81e/0xd30 [ 1157.431049] ? kill_litter_super+0x60/0x60 [ 1157.435285] ? ns_test_super+0x50/0x50 [ 1157.439172] ? ns_test_super+0x50/0x50 [ 1157.443064] ? kill_litter_super+0x60/0x60 [ 1157.447296] sget+0x10c/0x150 [ 1157.450412] mount_bdev+0xff/0x3c0 [ 1157.453956] ? finish_unfinished+0x1120/0x1120 [ 1157.458547] get_super_block+0x35/0x40 [ 1157.462446] mount_fs+0x106/0x3ff [ 1157.465904] ? emergency_thaw_all+0x1a0/0x1a0 [ 1157.470405] ? __init_waitqueue_head+0x36/0x90 [ 1157.475002] vfs_kern_mount.part.0+0x6f/0x410 [ 1157.479501] do_mount+0x581/0x2d30 [ 1157.483048] ? copy_mount_options+0x41/0x440 [ 1157.487460] ? copy_mount_string+0x40/0x40 [ 1157.491700] ? kmem_cache_alloc_trace+0x354/0x760 [ 1157.496548] ? _copy_from_user+0xdd/0x150 [ 1157.500699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1157.506240] ? copy_mount_options+0x30e/0x440 [ 1157.510738] ksys_mount+0xdb/0x150 [ 1157.514285] __x64_sys_mount+0xbe/0x150 [ 1157.518264] do_syscall_64+0x103/0x610 [ 1157.522160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1157.527360] RIP: 0033:0x45a89a [ 1157.530560] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1157.549460] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1157.557166] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1157.564434] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1157.571700] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 16:59:44 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004700, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:44 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a303, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1157.578964] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1157.586664] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:44 executing program 5 (fault-call:2 fault-nth:64): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:44 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004701, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1157.687780] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1157.687780] [ 1157.698775] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "fdev=." 16:59:44 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a304, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:44 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:44 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='ldev=.']) [ 1157.872572] FAULT_INJECTION: forcing a failure. [ 1157.872572] name failslab, interval 1, probability 0, space 0, times 0 [ 1157.888684] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1157.888684] [ 1157.939434] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1157.955035] CPU: 0 PID: 7182 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1157.960858] protocol 88fb is buggy, dev hsr_slave_0 [ 1157.962257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1157.976624] Call Trace: [ 1157.979221] dump_stack+0x172/0x1f0 [ 1157.982861] should_fail.cold+0xa/0x1b [ 1157.986768] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1157.991871] ? lock_downgrade+0x810/0x810 [ 1157.996019] ? ___might_sleep+0x163/0x280 [ 1158.000174] __should_failslab+0x121/0x190 [ 1158.004411] should_failslab+0x9/0x14 [ 1158.008211] kmem_cache_alloc_trace+0x2d1/0x760 [ 1158.012882] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1158.017996] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1158.022936] __list_lru_init+0x3d3/0x6e0 [ 1158.027096] sget_userns+0x84d/0xd30 [ 1158.030813] ? kill_litter_super+0x60/0x60 [ 1158.035051] ? ns_test_super+0x50/0x50 [ 1158.038947] ? ns_test_super+0x50/0x50 [ 1158.042833] ? kill_litter_super+0x60/0x60 [ 1158.047067] sget+0x10c/0x150 [ 1158.050185] mount_bdev+0xff/0x3c0 [ 1158.053737] ? finish_unfinished+0x1120/0x1120 [ 1158.058331] get_super_block+0x35/0x40 [ 1158.062228] mount_fs+0x106/0x3ff [ 1158.065685] ? emergency_thaw_all+0x1a0/0x1a0 [ 1158.070183] ? __init_waitqueue_head+0x36/0x90 [ 1158.074773] vfs_kern_mount.part.0+0x6f/0x410 [ 1158.079282] do_mount+0x581/0x2d30 [ 1158.082831] ? copy_mount_options+0x41/0x440 [ 1158.087242] ? copy_mount_string+0x40/0x40 [ 1158.091476] ? kmem_cache_alloc_trace+0x354/0x760 [ 1158.096334] ? _copy_from_user+0xdd/0x150 [ 1158.100574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1158.106114] ? copy_mount_options+0x30e/0x440 [ 1158.110614] ksys_mount+0xdb/0x150 [ 1158.114161] __x64_sys_mount+0xbe/0x150 [ 1158.118139] do_syscall_64+0x103/0x610 [ 1158.122036] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1158.127225] RIP: 0033:0x45a89a [ 1158.130426] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1158.149325] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1158.157035] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1158.164305] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1158.171576] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1158.178842] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1158.186112] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x3e010000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:45 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004800, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a305, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:45 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:45 executing program 5 (fault-call:2 fault-nth:65): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1158.227105] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "ldev=." [ 1158.264501] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:45 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:45 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004801, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a306, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:45 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:45 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004900, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1158.391936] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1158.400018] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1158.400018] [ 1158.408233] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue [ 1158.477107] FAULT_INJECTION: forcing a failure. [ 1158.477107] name failslab, interval 1, probability 0, space 0, times 0 [ 1158.488726] CPU: 1 PID: 7219 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1158.495924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1158.505276] Call Trace: [ 1158.507869] dump_stack+0x172/0x1f0 [ 1158.511494] should_fail.cold+0xa/0x1b [ 1158.515368] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1158.520458] ? lock_downgrade+0x810/0x810 [ 1158.524690] ? ___might_sleep+0x163/0x280 [ 1158.528831] __should_failslab+0x121/0x190 [ 1158.533055] should_failslab+0x9/0x14 [ 1158.536844] __kmalloc+0x2dc/0x740 [ 1158.540386] ? __list_lru_init+0xd5/0x6e0 [ 1158.544524] __list_lru_init+0xd5/0x6e0 [ 1158.548492] sget_userns+0x84d/0xd30 [ 1158.552191] ? kill_litter_super+0x60/0x60 [ 1158.556413] ? ns_test_super+0x50/0x50 [ 1158.560298] ? ns_test_super+0x50/0x50 [ 1158.564172] ? kill_litter_super+0x60/0x60 [ 1158.568391] sget+0x10c/0x150 [ 1158.571487] mount_bdev+0xff/0x3c0 [ 1158.575014] ? finish_unfinished+0x1120/0x1120 [ 1158.579587] get_super_block+0x35/0x40 [ 1158.583945] mount_fs+0x106/0x3ff [ 1158.587390] ? emergency_thaw_all+0x1a0/0x1a0 [ 1158.591871] ? __init_waitqueue_head+0x36/0x90 [ 1158.596443] vfs_kern_mount.part.0+0x6f/0x410 [ 1158.600930] do_mount+0x581/0x2d30 [ 1158.604460] ? copy_mount_string+0x40/0x40 [ 1158.608686] ? copy_mount_options+0x1de/0x440 [ 1158.613186] ? copy_mount_options+0x214/0x440 [ 1158.617668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1158.623192] ? copy_mount_options+0x30e/0x440 [ 1158.627676] ksys_mount+0xdb/0x150 [ 1158.631209] __x64_sys_mount+0xbe/0x150 [ 1158.635174] do_syscall_64+0x103/0x610 [ 1158.639050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1158.644224] RIP: 0033:0x45a89a [ 1158.647411] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1158.666301] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1158.673996] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1158.681262] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1158.688517] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1158.695771] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1158.703026] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x3e020000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:45 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='rdev=.']) 16:59:45 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:45 executing program 5 (fault-call:2 fault-nth:66): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1158.751878] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:45 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004901, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:45 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004a00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1158.856911] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1158.856911] [ 1158.869525] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1158.893880] FAULT_INJECTION: forcing a failure. [ 1158.893880] name failslab, interval 1, probability 0, space 0, times 0 [ 1158.930941] CPU: 0 PID: 7238 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1158.938167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1158.947524] Call Trace: [ 1158.950154] dump_stack+0x172/0x1f0 [ 1158.953792] should_fail.cold+0xa/0x1b [ 1158.957689] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1158.962805] ? lock_downgrade+0x810/0x810 [ 1158.966962] ? ___might_sleep+0x163/0x280 [ 1158.971119] __should_failslab+0x121/0x190 [ 1158.975365] should_failslab+0x9/0x14 [ 1158.979168] kmem_cache_alloc_trace+0x2d1/0x760 [ 1158.983848] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1158.988959] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1158.993895] __list_lru_init+0x3d3/0x6e0 [ 1158.997969] sget_userns+0x84d/0xd30 [ 1159.001689] ? kill_litter_super+0x60/0x60 [ 1159.005933] ? ns_test_super+0x50/0x50 [ 1159.009823] ? ns_test_super+0x50/0x50 [ 1159.013715] ? kill_litter_super+0x60/0x60 [ 1159.017949] sget+0x10c/0x150 [ 1159.021064] mount_bdev+0xff/0x3c0 [ 1159.024618] ? finish_unfinished+0x1120/0x1120 [ 1159.029218] get_super_block+0x35/0x40 [ 1159.033115] mount_fs+0x106/0x3ff [ 1159.036574] ? emergency_thaw_all+0x1a0/0x1a0 [ 1159.041161] ? __init_waitqueue_head+0x36/0x90 [ 1159.043532] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "rdev=." [ 1159.045747] vfs_kern_mount.part.0+0x6f/0x410 [ 1159.045766] do_mount+0x581/0x2d30 [ 1159.045783] ? copy_mount_options+0x41/0x440 [ 1159.067724] ? copy_mount_string+0x40/0x40 [ 1159.071968] ? kmem_cache_alloc_trace+0x354/0x760 [ 1159.076819] ? _copy_from_user+0xdd/0x150 [ 1159.081010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.086554] ? copy_mount_options+0x30e/0x440 [ 1159.091058] ksys_mount+0xdb/0x150 [ 1159.094604] __x64_sys_mount+0xbe/0x150 [ 1159.098585] do_syscall_64+0x103/0x610 [ 1159.102480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1159.107664] RIP: 0033:0x45a89a [ 1159.110860] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 16:59:45 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:45 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004a01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a307, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1159.129764] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1159.137477] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1159.144746] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1159.152015] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1159.159288] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1159.166555] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:46 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) [ 1159.236446] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a308, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:46 executing program 5 (fault-call:2 fault-nth:67): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1159.309798] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue [ 1159.328874] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:46 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='wdev=.']) 16:59:46 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004b00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:46 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1159.367115] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1159.367115] 16:59:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a400, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:46 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:46 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004b01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1159.476708] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1159.511235] FAULT_INJECTION: forcing a failure. [ 1159.511235] name failslab, interval 1, probability 0, space 0, times 0 [ 1159.540674] CPU: 0 PID: 7273 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1159.547904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1159.547909] Call Trace: [ 1159.547933] dump_stack+0x172/0x1f0 [ 1159.547954] should_fail.cold+0xa/0x1b [ 1159.567401] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1159.572519] ? lock_downgrade+0x810/0x810 [ 1159.576684] ? ___might_sleep+0x163/0x280 [ 1159.580836] __should_failslab+0x121/0x190 [ 1159.580854] should_failslab+0x9/0x14 16:59:46 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004c00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1159.580870] kmem_cache_alloc_node_trace+0x270/0x720 [ 1159.580886] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1159.580906] __kmalloc_node+0x3d/0x70 [ 1159.580922] kvmalloc_node+0x68/0x100 [ 1159.580937] __list_lru_init+0x4aa/0x6e0 [ 1159.580957] sget_userns+0x84d/0xd30 [ 1159.580971] ? kill_litter_super+0x60/0x60 [ 1159.580987] ? ns_test_super+0x50/0x50 [ 1159.599522] ? ns_test_super+0x50/0x50 [ 1159.599538] ? kill_litter_super+0x60/0x60 [ 1159.599553] sget+0x10c/0x150 [ 1159.599571] mount_bdev+0xff/0x3c0 [ 1159.599587] ? finish_unfinished+0x1120/0x1120 [ 1159.623047] get_super_block+0x35/0x40 [ 1159.623068] mount_fs+0x106/0x3ff [ 1159.623086] ? emergency_thaw_all+0x1a0/0x1a0 [ 1159.623101] ? __init_waitqueue_head+0x36/0x90 [ 1159.623122] vfs_kern_mount.part.0+0x6f/0x410 [ 1159.623140] do_mount+0x581/0x2d30 [ 1159.623169] ? copy_mount_string+0x40/0x40 [ 1159.623189] ? copy_mount_options+0x234/0x440 [ 1159.623207] ? copy_mount_options+0x23a/0x440 [ 1159.637924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.637942] ? copy_mount_options+0x30e/0x440 16:59:46 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004c01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1159.637963] ksys_mount+0xdb/0x150 [ 1159.637980] __x64_sys_mount+0xbe/0x150 [ 1159.637998] do_syscall_64+0x103/0x610 [ 1159.654362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1159.684086] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1159.684086] [ 1159.685639] RIP: 0033:0x45a89a [ 1159.720407] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1159.739597] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1159.746996] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1159.747631] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1159.747637] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1159.747642] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1159.747647] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1159.747652] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a401, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:46 executing program 5 (fault-call:2 fault-nth:68): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1159.885628] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "wdev=." [ 1159.964057] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1159.980020] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1159.980020] [ 1160.003151] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "wdev=." [ 1160.082772] FAULT_INJECTION: forcing a failure. [ 1160.082772] name failslab, interval 1, probability 0, space 0, times 0 [ 1160.113259] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1160.113259] [ 1160.114466] CPU: 0 PID: 7313 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1160.131061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1160.140410] Call Trace: [ 1160.143008] dump_stack+0x172/0x1f0 [ 1160.146650] should_fail.cold+0xa/0x1b [ 1160.150544] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1160.155660] ? lock_downgrade+0x810/0x810 [ 1160.159813] ? ___might_sleep+0x163/0x280 [ 1160.163962] __should_failslab+0x121/0x190 [ 1160.168212] should_failslab+0x9/0x14 [ 1160.172012] kmem_cache_alloc_trace+0x2d1/0x760 [ 1160.176683] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1160.181795] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1160.186730] __list_lru_init+0x3d3/0x6e0 [ 1160.190799] sget_userns+0x84d/0xd30 [ 1160.194511] ? kill_litter_super+0x60/0x60 [ 1160.198750] ? ns_test_super+0x50/0x50 [ 1160.202638] ? ns_test_super+0x50/0x50 [ 1160.206525] ? kill_litter_super+0x60/0x60 [ 1160.210757] sget+0x10c/0x150 [ 1160.213871] mount_bdev+0xff/0x3c0 [ 1160.217410] ? finish_unfinished+0x1120/0x1120 [ 1160.222000] get_super_block+0x35/0x40 [ 1160.225889] mount_fs+0x106/0x3ff [ 1160.229349] ? emergency_thaw_all+0x1a0/0x1a0 [ 1160.233843] ? __init_waitqueue_head+0x36/0x90 [ 1160.238443] vfs_kern_mount.part.0+0x6f/0x410 [ 1160.243123] do_mount+0x581/0x2d30 [ 1160.246664] ? copy_mount_options+0x41/0x440 [ 1160.251075] ? copy_mount_string+0x40/0x40 [ 1160.255311] ? kmem_cache_alloc_trace+0x354/0x760 [ 1160.260157] ? _copy_from_user+0xdd/0x150 [ 1160.264315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1160.269849] ? copy_mount_options+0x30e/0x440 [ 1160.274350] ksys_mount+0xdb/0x150 [ 1160.277897] __x64_sys_mount+0xbe/0x150 [ 1160.281874] do_syscall_64+0x103/0x610 [ 1160.285767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1160.290952] RIP: 0033:0x45a89a [ 1160.294142] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1160.313039] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1160.320743] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a 16:59:47 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='j\nev=.']) 16:59:47 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004d00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a402, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1160.328011] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1160.335280] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1160.342548] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1160.349821] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1160.394533] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:47 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004d01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a403, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:47 executing program 5 (fault-call:2 fault-nth:69): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:47 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004e00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1160.544181] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1160.604771] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "j [ 1160.604771] ev=." [ 1160.640150] FAULT_INJECTION: forcing a failure. [ 1160.640150] name failslab, interval 1, probability 0, space 0, times 0 [ 1160.666042] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1160.669809] CPU: 1 PID: 7342 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1160.680906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1160.690261] Call Trace: [ 1160.692863] dump_stack+0x172/0x1f0 [ 1160.696499] should_fail.cold+0xa/0x1b [ 1160.700392] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1160.705501] ? lock_downgrade+0x810/0x810 [ 1160.709660] ? ___might_sleep+0x163/0x280 [ 1160.713815] __should_failslab+0x121/0x190 [ 1160.718056] should_failslab+0x9/0x14 [ 1160.721862] kmem_cache_alloc_trace+0x2d1/0x760 [ 1160.726537] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1160.731646] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1160.736590] __list_lru_init+0x3d3/0x6e0 [ 1160.740662] sget_userns+0x84d/0xd30 [ 1160.744444] ? kill_litter_super+0x60/0x60 [ 1160.748689] ? ns_test_super+0x50/0x50 [ 1160.752579] ? ns_test_super+0x50/0x50 [ 1160.756465] ? kill_litter_super+0x60/0x60 [ 1160.760873] sget+0x10c/0x150 [ 1160.763983] mount_bdev+0xff/0x3c0 [ 1160.767523] ? finish_unfinished+0x1120/0x1120 [ 1160.772111] get_super_block+0x35/0x40 [ 1160.776006] mount_fs+0x106/0x3ff [ 1160.779462] ? emergency_thaw_all+0x1a0/0x1a0 [ 1160.783960] ? __init_waitqueue_head+0x36/0x90 [ 1160.788554] vfs_kern_mount.part.0+0x6f/0x410 [ 1160.793055] do_mount+0x581/0x2d30 [ 1160.796600] ? copy_mount_options+0x41/0x440 [ 1160.801120] ? copy_mount_string+0x40/0x40 [ 1160.805357] ? kmem_cache_alloc_trace+0x354/0x760 [ 1160.810203] ? _copy_from_user+0xdd/0x150 [ 1160.814358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1160.819900] ? copy_mount_options+0x30e/0x440 [ 1160.824400] ksys_mount+0xdb/0x150 [ 1160.827943] __x64_sys_mount+0xbe/0x150 [ 1160.831925] do_syscall_64+0x103/0x610 [ 1160.835817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1160.841006] RIP: 0033:0x45a89a [ 1160.844197] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1160.863095] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1160.870807] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1160.878084] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1160.885351] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1160.892706] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1160.899971] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a404, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1160.956474] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1160.956474] [ 1160.970916] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "j [ 1160.970916] ev=." 16:59:47 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='j%ev=.']) 16:59:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a405, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:47 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004e01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) [ 1161.093924] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:48 executing program 5 (fault-call:2 fault-nth:70): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1161.177447] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "j%ev=." 16:59:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:48 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004f00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a406, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1161.237696] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1161.237696] [ 1161.277868] FAULT_INJECTION: forcing a failure. [ 1161.277868] name failslab, interval 1, probability 0, space 0, times 0 [ 1161.281394] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue [ 1161.317935] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1161.326793] CPU: 1 PID: 7378 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1161.334004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1161.343366] Call Trace: [ 1161.345962] dump_stack+0x172/0x1f0 [ 1161.349607] should_fail.cold+0xa/0x1b [ 1161.353503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1161.358615] ? lock_downgrade+0x810/0x810 [ 1161.362769] ? ___might_sleep+0x163/0x280 [ 1161.366922] __should_failslab+0x121/0x190 [ 1161.371161] should_failslab+0x9/0x14 [ 1161.374960] kmem_cache_alloc_trace+0x2d1/0x760 [ 1161.379633] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1161.384747] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1161.389768] __list_lru_init+0x3d3/0x6e0 [ 1161.393836] sget_userns+0x84d/0xd30 [ 1161.397549] ? kill_litter_super+0x60/0x60 [ 1161.401788] ? ns_test_super+0x50/0x50 [ 1161.405675] ? ns_test_super+0x50/0x50 [ 1161.409566] ? kill_litter_super+0x60/0x60 [ 1161.413805] sget+0x10c/0x150 [ 1161.416915] mount_bdev+0xff/0x3c0 [ 1161.420453] ? finish_unfinished+0x1120/0x1120 [ 1161.425044] get_super_block+0x35/0x40 [ 1161.428938] mount_fs+0x106/0x3ff [ 1161.432398] ? emergency_thaw_all+0x1a0/0x1a0 [ 1161.436894] ? __init_waitqueue_head+0x36/0x90 [ 1161.441499] vfs_kern_mount.part.0+0x6f/0x410 [ 1161.445999] do_mount+0x581/0x2d30 [ 1161.449547] ? copy_mount_options+0x41/0x440 [ 1161.453963] ? copy_mount_string+0x40/0x40 [ 1161.458201] ? kmem_cache_alloc_trace+0x354/0x760 [ 1161.463057] ? _copy_from_user+0xdd/0x150 [ 1161.467211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1161.472748] ? copy_mount_options+0x30e/0x440 [ 1161.477252] ksys_mount+0xdb/0x150 [ 1161.480798] __x64_sys_mount+0xbe/0x150 [ 1161.484775] do_syscall_64+0x103/0x610 [ 1161.488670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1161.493859] RIP: 0033:0x45a89a [ 1161.497135] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1161.516036] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 16:59:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a407, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1161.523742] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1161.531017] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1161.538288] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1161.545554] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1161.552821] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:48 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='j.ev=.']) 16:59:48 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1004f01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x52000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a408, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1161.668424] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:48 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005000, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:48 executing program 5 (fault-call:2 fault-nth:71): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:48 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005001, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1161.749116] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1161.759117] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "j.ev=." [ 1161.785772] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1161.785772] 16:59:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a500, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1161.897102] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1161.906206] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue [ 1161.916342] FAULT_INJECTION: forcing a failure. [ 1161.916342] name failslab, interval 1, probability 0, space 0, times 0 [ 1161.929582] CPU: 0 PID: 7421 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1161.929715] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1161.929715] [ 1161.936881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1161.936887] Call Trace: [ 1161.936911] dump_stack+0x172/0x1f0 [ 1161.936931] should_fail.cold+0xa/0x1b [ 1161.936948] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1161.936963] ? lock_downgrade+0x810/0x810 [ 1161.936988] ? ___might_sleep+0x163/0x280 [ 1161.937006] __should_failslab+0x121/0x190 [ 1161.937023] should_failslab+0x9/0x14 [ 1161.937036] kmem_cache_alloc_trace+0x2d1/0x760 [ 1161.937058] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1161.981355] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1161.981373] __list_lru_init+0x3d3/0x6e0 [ 1161.981395] sget_userns+0x84d/0xd30 [ 1161.981409] ? kill_litter_super+0x60/0x60 [ 1161.981427] ? ns_test_super+0x50/0x50 [ 1161.981443] ? ns_test_super+0x50/0x50 [ 1161.989456] ? kill_litter_super+0x60/0x60 [ 1162.028054] sget+0x10c/0x150 [ 1162.031167] mount_bdev+0xff/0x3c0 [ 1162.034709] ? finish_unfinished+0x1120/0x1120 [ 1162.039296] get_super_block+0x35/0x40 [ 1162.043190] mount_fs+0x106/0x3ff [ 1162.046659] ? emergency_thaw_all+0x1a0/0x1a0 [ 1162.051164] ? __init_waitqueue_head+0x36/0x90 [ 1162.055758] vfs_kern_mount.part.0+0x6f/0x410 [ 1162.060261] do_mount+0x581/0x2d30 [ 1162.063806] ? copy_mount_options+0x41/0x440 [ 1162.068222] ? copy_mount_string+0x40/0x40 [ 1162.072459] ? kmem_cache_alloc_trace+0x354/0x760 [ 1162.077318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1162.082860] ? copy_mount_options+0x30e/0x440 [ 1162.087365] ksys_mount+0xdb/0x150 [ 1162.090915] __x64_sys_mount+0xbe/0x150 [ 1162.094893] do_syscall_64+0x103/0x610 [ 1162.098791] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1162.103984] RIP: 0033:0x45a89a [ 1162.107178] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1162.120863] net_ratelimit: 19 callbacks suppressed [ 1162.120870] protocol 88fb is buggy, dev hsr_slave_0 [ 1162.126078] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 16:59:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a501, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:49 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='j/ev=.']) [ 1162.131079] protocol 88fb is buggy, dev hsr_slave_1 [ 1162.135999] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1162.155974] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1162.163271] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1162.170537] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1162.177907] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x5c020000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1162.279802] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a502, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1162.360881] protocol 88fb is buggy, dev hsr_slave_0 [ 1162.366076] protocol 88fb is buggy, dev hsr_slave_1 16:59:49 executing program 5 (fault-call:2 fault-nth:72): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1162.455899] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1162.484349] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "j/ev=." 16:59:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a503, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1162.509531] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1162.509531] [ 1162.572157] FAULT_INJECTION: forcing a failure. [ 1162.572157] name failslab, interval 1, probability 0, space 0, times 0 [ 1162.586349] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1162.600868] protocol 88fb is buggy, dev hsr_slave_0 [ 1162.605969] protocol 88fb is buggy, dev hsr_slave_1 [ 1162.611126] protocol 88fb is buggy, dev hsr_slave_0 [ 1162.616185] protocol 88fb is buggy, dev hsr_slave_1 [ 1162.621343] protocol 88fb is buggy, dev hsr_slave_0 [ 1162.625665] CPU: 0 PID: 7461 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1162.626386] protocol 88fb is buggy, dev hsr_slave_1 [ 1162.633533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1162.633538] Call Trace: [ 1162.633561] dump_stack+0x172/0x1f0 [ 1162.633580] should_fail.cold+0xa/0x1b [ 1162.658013] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1162.663117] ? lock_downgrade+0x810/0x810 [ 1162.667264] ? ___might_sleep+0x163/0x280 [ 1162.671419] __should_failslab+0x121/0x190 [ 1162.675663] should_failslab+0x9/0x14 [ 1162.679466] kmem_cache_alloc_trace+0x2d1/0x760 [ 1162.684137] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1162.689253] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1162.694186] __list_lru_init+0x3d3/0x6e0 [ 1162.698258] sget_userns+0x84d/0xd30 [ 1162.701973] ? kill_litter_super+0x60/0x60 [ 1162.706220] ? ns_test_super+0x50/0x50 [ 1162.710109] ? ns_test_super+0x50/0x50 [ 1162.714005] ? kill_litter_super+0x60/0x60 [ 1162.718240] sget+0x10c/0x150 [ 1162.721354] mount_bdev+0xff/0x3c0 [ 1162.724894] ? finish_unfinished+0x1120/0x1120 [ 1162.729492] get_super_block+0x35/0x40 [ 1162.733385] mount_fs+0x106/0x3ff [ 1162.736843] ? emergency_thaw_all+0x1a0/0x1a0 [ 1162.741340] ? __init_waitqueue_head+0x36/0x90 [ 1162.745945] vfs_kern_mount.part.0+0x6f/0x410 [ 1162.750454] do_mount+0x581/0x2d30 [ 1162.754006] ? copy_mount_options+0x41/0x440 [ 1162.758428] ? copy_mount_string+0x40/0x40 [ 1162.762670] ? kmem_cache_alloc_trace+0x354/0x760 [ 1162.767516] ? _copy_from_user+0xdd/0x150 16:59:49 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005100, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:49 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jlev=.']) 16:59:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1162.771673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1162.777215] ? copy_mount_options+0x30e/0x440 [ 1162.781722] ksys_mount+0xdb/0x150 [ 1162.785273] __x64_sys_mount+0xbe/0x150 [ 1162.789250] do_syscall_64+0x103/0x610 [ 1162.793140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1162.798325] RIP: 0033:0x45a89a [ 1162.801516] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1162.820423] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1162.828135] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1162.835408] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1162.842674] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1162.849946] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1162.857221] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1162.907817] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1162.930841] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1162.930841] [ 1162.941617] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "jlev=." 16:59:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a504, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:49 executing program 5 (fault-call:2 fault-nth:73): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1163.013409] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1163.111466] FAULT_INJECTION: forcing a failure. [ 1163.111466] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.124806] CPU: 0 PID: 7488 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1163.132001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1163.132008] Call Trace: [ 1163.132032] dump_stack+0x172/0x1f0 [ 1163.132051] should_fail.cold+0xa/0x1b [ 1163.132070] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1163.132086] ? lock_downgrade+0x810/0x810 [ 1163.132104] ? ___might_sleep+0x163/0x280 [ 1163.164836] __should_failslab+0x121/0x190 [ 1163.169061] should_failslab+0x9/0x14 [ 1163.172847] kmem_cache_alloc_trace+0x2d1/0x760 [ 1163.177500] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1163.182594] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1163.187511] __list_lru_init+0x3d3/0x6e0 [ 1163.191575] sget_userns+0x84d/0xd30 [ 1163.195279] ? kill_litter_super+0x60/0x60 [ 1163.199499] ? ns_test_super+0x50/0x50 [ 1163.203372] ? ns_test_super+0x50/0x50 [ 1163.207246] ? kill_litter_super+0x60/0x60 [ 1163.211469] sget+0x10c/0x150 [ 1163.214564] mount_bdev+0xff/0x3c0 [ 1163.218092] ? finish_unfinished+0x1120/0x1120 [ 1163.222665] get_super_block+0x35/0x40 [ 1163.226538] mount_fs+0x106/0x3ff [ 1163.229978] ? emergency_thaw_all+0x1a0/0x1a0 [ 1163.234465] ? __init_waitqueue_head+0x36/0x90 [ 1163.239036] vfs_kern_mount.part.0+0x6f/0x410 [ 1163.243534] do_mount+0x581/0x2d30 [ 1163.247065] ? copy_mount_string+0x40/0x40 [ 1163.251288] ? copy_mount_options+0x255/0x440 [ 1163.255856] ? write_comp_data+0x68/0x70 [ 1163.259907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1163.265429] ? copy_mount_options+0x30e/0x440 [ 1163.269927] ksys_mount+0xdb/0x150 [ 1163.273458] __x64_sys_mount+0xbe/0x150 [ 1163.277422] do_syscall_64+0x103/0x610 [ 1163.281301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1163.286474] RIP: 0033:0x45a89a [ 1163.289652] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 16:59:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x60000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:50 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005101, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:50 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jd\nv=.']) [ 1163.308550] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1163.316244] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1163.323500] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1163.330753] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1163.338025] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1163.345366] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1163.377015] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a505, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:50 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005200, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:50 executing program 5 (fault-call:2 fault-nth:74): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1163.475834] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "jd [ 1163.475834] v=." [ 1163.493144] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1163.527091] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1163.527091] 16:59:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a506, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1163.600584] FAULT_INJECTION: forcing a failure. [ 1163.600584] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.612260] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "jd [ 1163.612260] v=." [ 1163.635575] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1163.635575] 16:59:50 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005201, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1163.643032] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1163.654705] CPU: 0 PID: 7517 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1163.661912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1163.671271] Call Trace: [ 1163.673881] dump_stack+0x172/0x1f0 [ 1163.677531] should_fail.cold+0xa/0x1b [ 1163.681430] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1163.686545] ? lock_downgrade+0x810/0x810 [ 1163.690697] ? ___might_sleep+0x163/0x280 [ 1163.694864] __should_failslab+0x121/0x190 [ 1163.699111] should_failslab+0x9/0x14 [ 1163.702925] kmem_cache_alloc_trace+0x2d1/0x760 [ 1163.707609] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1163.707629] __list_lru_init+0x3d3/0x6e0 [ 1163.707650] sget_userns+0x84d/0xd30 [ 1163.716613] ? kill_litter_super+0x60/0x60 [ 1163.716633] ? ns_test_super+0x50/0x50 [ 1163.716648] ? ns_test_super+0x50/0x50 [ 1163.716663] ? kill_litter_super+0x60/0x60 [ 1163.736551] sget+0x10c/0x150 [ 1163.739667] mount_bdev+0xff/0x3c0 [ 1163.743213] ? finish_unfinished+0x1120/0x1120 [ 1163.748109] get_super_block+0x35/0x40 [ 1163.752002] mount_fs+0x106/0x3ff [ 1163.755467] ? emergency_thaw_all+0x1a0/0x1a0 [ 1163.759967] ? __init_waitqueue_head+0x36/0x90 [ 1163.764647] vfs_kern_mount.part.0+0x6f/0x410 [ 1163.769150] do_mount+0x581/0x2d30 [ 1163.772692] ? copy_mount_options+0x41/0x440 [ 1163.777110] ? copy_mount_string+0x40/0x40 [ 1163.781347] ? kmem_cache_alloc_trace+0x354/0x760 [ 1163.786198] ? _copy_from_user+0xdd/0x150 [ 1163.790355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1163.795892] ? copy_mount_options+0x30e/0x440 [ 1163.800395] ksys_mount+0xdb/0x150 [ 1163.803931] __x64_sys_mount+0xbe/0x150 [ 1163.807898] do_syscall_64+0x103/0x610 [ 1163.811783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1163.816961] RIP: 0033:0x45a89a [ 1163.820144] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1163.839040] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1163.846748] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1163.854004] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1163.861259] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1163.868519] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1163.875784] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:50 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jd%v=.']) 16:59:50 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005300, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a507, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(0x0, 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1163.955318] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:50 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005301, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:50 executing program 5 (fault-call:2 fault-nth:75): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(0x0, 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:50 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005400, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a508, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1164.165442] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "jd%v=." [ 1164.175183] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1164.175183] 16:59:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(0x0, 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:51 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005401, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1164.249114] FAULT_INJECTION: forcing a failure. [ 1164.249114] name failslab, interval 1, probability 0, space 0, times 0 [ 1164.285820] CPU: 1 PID: 7582 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1164.292078] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "jd%v=." [ 1164.293047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1164.311844] Call Trace: [ 1164.311867] dump_stack+0x172/0x1f0 [ 1164.311885] should_fail.cold+0xa/0x1b [ 1164.311901] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1164.318084] ? lock_downgrade+0x810/0x810 [ 1164.331171] ? ___might_sleep+0x163/0x280 [ 1164.335324] __should_failslab+0x121/0x190 [ 1164.339569] should_failslab+0x9/0x14 [ 1164.343376] kmem_cache_alloc_trace+0x2d1/0x760 [ 1164.348045] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1164.353157] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1164.358091] __list_lru_init+0x3d3/0x6e0 [ 1164.362156] sget_userns+0x84d/0xd30 [ 1164.365870] ? kill_litter_super+0x60/0x60 [ 1164.370104] ? ns_test_super+0x50/0x50 [ 1164.373991] ? ns_test_super+0x50/0x50 [ 1164.377874] ? kill_litter_super+0x60/0x60 [ 1164.382111] sget+0x10c/0x150 [ 1164.385223] mount_bdev+0xff/0x3c0 [ 1164.388762] ? finish_unfinished+0x1120/0x1120 [ 1164.393350] get_super_block+0x35/0x40 [ 1164.397243] mount_fs+0x106/0x3ff [ 1164.400698] ? emergency_thaw_all+0x1a0/0x1a0 [ 1164.405192] ? __init_waitqueue_head+0x36/0x90 [ 1164.409786] vfs_kern_mount.part.0+0x6f/0x410 [ 1164.414290] do_mount+0x581/0x2d30 [ 1164.417836] ? copy_mount_string+0x40/0x40 [ 1164.422079] ? copy_mount_options+0x248/0x440 [ 1164.426571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1164.432129] ? copy_mount_options+0x30e/0x440 [ 1164.436630] ksys_mount+0xdb/0x150 [ 1164.440206] __x64_sys_mount+0xbe/0x150 [ 1164.444183] do_syscall_64+0x103/0x610 [ 1164.448072] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1164.453264] RIP: 0033:0x45a89a [ 1164.456455] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1164.475368] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1164.483078] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1164.490355] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1164.497620] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1164.504883] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1164.512147] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1164.582228] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 16:59:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a600, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:51 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdlv=.']) 16:59:51 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005500, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:51 executing program 5 (fault-call:2 fault-nth:76): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:51 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005501, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a601, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1164.858352] FAULT_INJECTION: forcing a failure. [ 1164.858352] name failslab, interval 1, probability 0, space 0, times 0 [ 1164.900927] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "jdlv=." [ 1164.908381] CPU: 0 PID: 7617 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1164.917606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1164.926964] Call Trace: [ 1164.929564] dump_stack+0x172/0x1f0 [ 1164.929583] should_fail.cold+0xa/0x1b [ 1164.937086] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1164.942192] ? lock_downgrade+0x810/0x810 [ 1164.942212] ? ___might_sleep+0x163/0x280 [ 1164.942230] __should_failslab+0x121/0x190 [ 1164.942245] should_failslab+0x9/0x14 [ 1164.942259] kmem_cache_alloc_trace+0x2d1/0x760 [ 1164.942275] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1164.942294] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1164.942310] __list_lru_init+0x3d3/0x6e0 [ 1164.977293] sget_userns+0x84d/0xd30 [ 1164.981019] ? kill_litter_super+0x60/0x60 [ 1164.985269] ? ns_test_super+0x50/0x50 [ 1164.989164] ? ns_test_super+0x50/0x50 16:59:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1164.990468] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1164.990468] [ 1164.993051] ? kill_litter_super+0x60/0x60 [ 1164.993066] sget+0x10c/0x150 [ 1164.993086] mount_bdev+0xff/0x3c0 [ 1164.993103] ? finish_unfinished+0x1120/0x1120 [ 1164.993123] get_super_block+0x35/0x40 [ 1164.993140] mount_fs+0x106/0x3ff [ 1164.993156] ? emergency_thaw_all+0x1a0/0x1a0 [ 1164.993172] ? __init_waitqueue_head+0x36/0x90 [ 1164.993190] vfs_kern_mount.part.0+0x6f/0x410 [ 1164.993207] do_mount+0x581/0x2d30 [ 1164.993223] ? copy_mount_options+0x41/0x440 [ 1165.047997] ? copy_mount_string+0x40/0x40 [ 1165.053290] ? kmem_cache_alloc_trace+0x354/0x760 [ 1165.058145] ? _copy_from_user+0xdd/0x150 [ 1165.062302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1165.067844] ? copy_mount_options+0x30e/0x440 [ 1165.072351] ksys_mount+0xdb/0x150 [ 1165.075896] __x64_sys_mount+0xbe/0x150 [ 1165.079889] do_syscall_64+0x103/0x610 [ 1165.083787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1165.088981] RIP: 0033:0x45a89a [ 1165.092179] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1165.111083] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1165.118880] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1165.126155] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1165.133427] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1165.140696] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 16:59:51 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005600, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1165.147971] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a602, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:52 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jde\n=.']) 16:59:52 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005601, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:52 executing program 5 (fault-call:2 fault-nth:77): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1165.426000] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "jde [ 1165.426000] =." [ 1165.448856] FAULT_INJECTION: forcing a failure. [ 1165.448856] name failslab, interval 1, probability 0, space 0, times 0 [ 1165.462380] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1165.462380] 16:59:52 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005700, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a603, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1165.478785] CPU: 0 PID: 7658 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1165.486002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1165.495345] Call Trace: [ 1165.495370] dump_stack+0x172/0x1f0 [ 1165.495389] should_fail.cold+0xa/0x1b [ 1165.495406] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1165.495422] ? lock_downgrade+0x810/0x810 [ 1165.495437] ? ___might_sleep+0x163/0x280 [ 1165.518877] __should_failslab+0x121/0x190 [ 1165.523128] should_failslab+0x9/0x14 16:59:52 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005701, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1165.526935] kmem_cache_alloc_node_trace+0x270/0x720 [ 1165.532049] ? kmem_cache_alloc_trace+0x354/0x760 [ 1165.536893] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1165.536914] __kmalloc_node+0x3d/0x70 [ 1165.536934] kvmalloc_node+0x68/0x100 [ 1165.536948] __list_lru_init+0x4aa/0x6e0 [ 1165.536967] sget_userns+0x84d/0xd30 [ 1165.557387] ? kill_litter_super+0x60/0x60 [ 1165.561644] ? ns_test_super+0x50/0x50 [ 1165.565543] ? ns_test_super+0x50/0x50 [ 1165.569431] ? kill_litter_super+0x60/0x60 [ 1165.573656] sget+0x10c/0x150 [ 1165.576767] mount_bdev+0xff/0x3c0 [ 1165.580296] ? finish_unfinished+0x1120/0x1120 [ 1165.584886] get_super_block+0x35/0x40 [ 1165.588767] mount_fs+0x106/0x3ff [ 1165.592220] ? emergency_thaw_all+0x1a0/0x1a0 [ 1165.596707] ? __init_waitqueue_head+0x36/0x90 [ 1165.601281] vfs_kern_mount.part.0+0x6f/0x410 [ 1165.605770] do_mount+0x581/0x2d30 [ 1165.609296] ? copy_mount_options+0x41/0x440 [ 1165.613700] ? copy_mount_string+0x40/0x40 [ 1165.617941] ? kmem_cache_alloc_trace+0x354/0x760 [ 1165.622791] ? _copy_from_user+0xdd/0x150 [ 1165.626928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1165.632462] ? copy_mount_options+0x30e/0x440 [ 1165.636947] ksys_mount+0xdb/0x150 [ 1165.640563] __x64_sys_mount+0xbe/0x150 [ 1165.644527] do_syscall_64+0x103/0x610 [ 1165.648404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1165.653575] RIP: 0033:0x45a89a [ 1165.656753] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 16:59:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1165.675651] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1165.683353] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1165.690616] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1165.697870] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1165.705125] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1165.713075] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:52 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005800, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a604, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1165.868979] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue [ 1165.897357] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "jde [ 1165.897357] =." 16:59:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:52 executing program 5 (fault-call:2 fault-nth:78): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:52 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jde%=.']) 16:59:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a605, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:52 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005801, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1166.128154] FAULT_INJECTION: forcing a failure. [ 1166.128154] name failslab, interval 1, probability 0, space 0, times 0 [ 1166.153969] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1166.153969] [ 1166.155059] CPU: 0 PID: 7690 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 16:59:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0x20323}) [ 1166.171878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1166.181239] Call Trace: [ 1166.183834] dump_stack+0x172/0x1f0 [ 1166.187479] should_fail.cold+0xa/0x1b [ 1166.191373] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1166.196482] ? lock_downgrade+0x810/0x810 [ 1166.200647] ? ___might_sleep+0x163/0x280 [ 1166.204806] __should_failslab+0x121/0x190 [ 1166.209051] should_failslab+0x9/0x14 [ 1166.212854] kmem_cache_alloc_node_trace+0x270/0x720 [ 1166.217969] ? kmem_cache_alloc_trace+0x354/0x760 [ 1166.222826] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1166.227932] __kmalloc_node+0x3d/0x70 [ 1166.231741] kvmalloc_node+0x68/0x100 [ 1166.235544] __list_lru_init+0x4aa/0x6e0 [ 1166.239618] sget_userns+0x84d/0xd30 [ 1166.243345] ? kill_litter_super+0x60/0x60 [ 1166.247588] ? ns_test_super+0x50/0x50 [ 1166.251479] ? ns_test_super+0x50/0x50 [ 1166.255379] ? kill_litter_super+0x60/0x60 [ 1166.259632] sget+0x10c/0x150 [ 1166.262925] mount_bdev+0xff/0x3c0 [ 1166.266469] ? finish_unfinished+0x1120/0x1120 [ 1166.271061] get_super_block+0x35/0x40 [ 1166.274953] mount_fs+0x106/0x3ff [ 1166.278410] ? emergency_thaw_all+0x1a0/0x1a0 [ 1166.282913] ? __init_waitqueue_head+0x36/0x90 [ 1166.287511] vfs_kern_mount.part.0+0x6f/0x410 [ 1166.292015] do_mount+0x581/0x2d30 [ 1166.295556] ? copy_mount_options+0x41/0x440 [ 1166.299973] ? copy_mount_string+0x40/0x40 [ 1166.304208] ? kmem_cache_alloc_trace+0x354/0x760 [ 1166.309059] ? _copy_from_user+0xdd/0x150 [ 1166.313213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1166.318754] ? copy_mount_options+0x30e/0x440 [ 1166.323265] ksys_mount+0xdb/0x150 [ 1166.326819] __x64_sys_mount+0xbe/0x150 [ 1166.330795] do_syscall_64+0x103/0x610 [ 1166.334692] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1166.339882] RIP: 0033:0x45a89a [ 1166.343074] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1166.361976] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1166.369690] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a 16:59:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a606, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:53 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005900, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1166.376965] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1166.384233] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1166.391503] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1166.398770] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:53 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005901, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x7f020000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:53 executing program 5 (fault-call:2 fault-nth:79): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a607, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1166.544095] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "jde%=." [ 1166.620870] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1166.620870] [ 1166.656196] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "jde%=." [ 1166.733833] FAULT_INJECTION: forcing a failure. [ 1166.733833] name failslab, interval 1, probability 0, space 0, times 0 [ 1166.752877] CPU: 0 PID: 7728 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1166.760105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1166.769457] Call Trace: [ 1166.769481] dump_stack+0x172/0x1f0 [ 1166.769502] should_fail.cold+0xa/0x1b [ 1166.769519] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1166.779581] ? lock_downgrade+0x810/0x810 [ 1166.788904] ? ___might_sleep+0x163/0x280 [ 1166.788923] __should_failslab+0x121/0x190 [ 1166.788939] should_failslab+0x9/0x14 [ 1166.788955] kmem_cache_alloc_trace+0x2d1/0x760 [ 1166.797329] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1166.805783] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1166.805803] __list_lru_init+0x3d3/0x6e0 [ 1166.805827] sget_userns+0x84d/0xd30 [ 1166.815836] ? kill_litter_super+0x60/0x60 [ 1166.815855] ? ns_test_super+0x50/0x50 16:59:53 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev%.']) 16:59:53 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005a00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, 0x0) 16:59:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x82030000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a608, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1166.815870] ? ns_test_super+0x50/0x50 [ 1166.815885] ? kill_litter_super+0x60/0x60 [ 1166.839826] sget+0x10c/0x150 [ 1166.842948] mount_bdev+0xff/0x3c0 [ 1166.846489] ? finish_unfinished+0x1120/0x1120 [ 1166.851086] get_super_block+0x35/0x40 [ 1166.854978] mount_fs+0x106/0x3ff [ 1166.858434] ? emergency_thaw_all+0x1a0/0x1a0 [ 1166.862931] ? __init_waitqueue_head+0x36/0x90 [ 1166.867522] vfs_kern_mount.part.0+0x6f/0x410 [ 1166.872035] do_mount+0x581/0x2d30 [ 1166.875608] ? copy_mount_string+0x40/0x40 [ 1166.879853] ? copy_mount_options+0x234/0x440 16:59:53 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005a01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1166.884355] ? copy_mount_options+0x23a/0x440 [ 1166.888858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1166.894407] ? copy_mount_options+0x30e/0x440 [ 1166.898915] ksys_mount+0xdb/0x150 [ 1166.902468] __x64_sys_mount+0xbe/0x150 [ 1166.906460] do_syscall_64+0x103/0x610 [ 1166.910363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1166.915554] RIP: 0033:0x45a89a 16:59:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, 0x0) [ 1166.918754] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1166.937666] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1166.945386] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1166.952668] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1166.959943] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1166.967219] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1166.974498] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a700, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, 0x0) 16:59:54 executing program 5 (fault-call:2 fault-nth:80): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:54 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005b00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1167.111046] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1167.111046] [ 1167.121930] REISERFS warning (device loop0): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 1167.121930] 16:59:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a701, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1167.282949] FAULT_INJECTION: forcing a failure. [ 1167.282949] name failslab, interval 1, probability 0, space 0, times 0 [ 1167.294374] REISERFS warning (device loop0): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 1167.294374] [ 1167.311033] CPU: 0 PID: 7770 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1167.318273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1167.327632] Call Trace: [ 1167.327659] dump_stack+0x172/0x1f0 [ 1167.327678] should_fail.cold+0xa/0x1b [ 1167.327696] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1167.327712] ? lock_downgrade+0x810/0x810 [ 1167.327726] ? ___might_sleep+0x163/0x280 [ 1167.327742] __should_failslab+0x121/0x190 [ 1167.337810] should_failslab+0x9/0x14 [ 1167.337827] kmem_cache_alloc_node_trace+0x270/0x720 [ 1167.337842] ? kmem_cache_alloc_trace+0x354/0x760 [ 1167.347066] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1167.347086] __kmalloc_node+0x3d/0x70 [ 1167.347104] kvmalloc_node+0x68/0x100 [ 1167.359231] __list_lru_init+0x4aa/0x6e0 [ 1167.359253] sget_userns+0x84d/0xd30 [ 1167.359268] ? kill_litter_super+0x60/0x60 [ 1167.369183] ? ns_test_super+0x50/0x50 [ 1167.369200] ? ns_test_super+0x50/0x50 [ 1167.369215] ? kill_litter_super+0x60/0x60 [ 1167.381865] sget+0x10c/0x150 [ 1167.381885] mount_bdev+0xff/0x3c0 [ 1167.381900] ? finish_unfinished+0x1120/0x1120 [ 1167.381920] get_super_block+0x35/0x40 [ 1167.381939] mount_fs+0x106/0x3ff [ 1167.389689] ? emergency_thaw_all+0x1a0/0x1a0 [ 1167.389707] ? __init_waitqueue_head+0x36/0x90 [ 1167.389729] vfs_kern_mount.part.0+0x6f/0x410 [ 1167.401688] do_mount+0x581/0x2d30 [ 1167.401704] ? copy_mount_options+0x41/0x440 [ 1167.401723] ? copy_mount_string+0x40/0x40 [ 1167.401738] ? kmem_cache_alloc_trace+0x354/0x760 [ 1167.401759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1167.401773] ? copy_mount_options+0x30e/0x440 [ 1167.409088] ksys_mount+0xdb/0x150 [ 1167.409107] __x64_sys_mount+0xbe/0x150 [ 1167.409126] do_syscall_64+0x103/0x610 [ 1167.476411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1167.481603] RIP: 0033:0x45a89a [ 1167.484801] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1167.503701] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1167.511493] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1167.518768] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1167.526124] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1167.533391] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1167.540659] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:54 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdevl.']) 16:59:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)) 16:59:54 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005b01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x87000000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a702, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:54 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005c00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:54 executing program 5 (fault-call:2 fault-nth:81): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) [ 1167.674537] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1167.674537] [ 1167.688780] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 16:59:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)) 16:59:54 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005c01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a703, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1167.778014] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1167.778014] [ 1167.797021] REISERFS warning (device loop0): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 1167.797021] [ 1167.827290] FAULT_INJECTION: forcing a failure. [ 1167.827290] name failslab, interval 1, probability 0, space 0, times 0 [ 1167.836436] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 1167.855757] CPU: 0 PID: 7801 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1167.862979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1167.872334] Call Trace: [ 1167.874932] dump_stack+0x172/0x1f0 [ 1167.878565] should_fail.cold+0xa/0x1b [ 1167.882453] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1167.887554] ? lock_downgrade+0x810/0x810 [ 1167.891702] ? ___might_sleep+0x163/0x280 [ 1167.895843] __should_failslab+0x121/0x190 [ 1167.900065] should_failslab+0x9/0x14 [ 1167.903862] kmem_cache_alloc_trace+0x2d1/0x760 [ 1167.908524] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1167.913617] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1167.918534] __list_lru_init+0x3d3/0x6e0 [ 1167.922589] sget_userns+0x84d/0xd30 [ 1167.926287] ? kill_litter_super+0x60/0x60 [ 1167.930517] ? ns_test_super+0x50/0x50 [ 1167.934390] ? ns_test_super+0x50/0x50 [ 1167.938348] ? kill_litter_super+0x60/0x60 [ 1167.942568] sget+0x10c/0x150 [ 1167.945672] mount_bdev+0xff/0x3c0 [ 1167.949200] ? finish_unfinished+0x1120/0x1120 [ 1167.953774] get_super_block+0x35/0x40 [ 1167.957651] mount_fs+0x106/0x3ff [ 1167.961093] ? emergency_thaw_all+0x1a0/0x1a0 [ 1167.965577] ? __init_waitqueue_head+0x36/0x90 [ 1167.970151] vfs_kern_mount.part.0+0x6f/0x410 [ 1167.974634] do_mount+0x581/0x2d30 [ 1167.978160] ? copy_mount_options+0x41/0x440 [ 1167.982566] ? copy_mount_string+0x40/0x40 [ 1167.986789] ? kmem_cache_alloc_trace+0x354/0x760 [ 1167.991622] ? _copy_from_user+0xdd/0x150 [ 1167.995761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1168.001284] ? copy_mount_options+0x30e/0x440 [ 1168.005769] ksys_mount+0xdb/0x150 [ 1168.009296] __x64_sys_mount+0xbe/0x150 [ 1168.013269] do_syscall_64+0x103/0x610 [ 1168.017148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1168.022324] RIP: 0033:0x45a89a [ 1168.025511] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1168.044397] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1168.052088] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1168.059344] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1168.066608] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 16:59:54 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005d00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)) [ 1168.074038] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1168.081309] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:55 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=\n']) 16:59:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a704, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:55 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005d01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1168.198146] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 1168.360882] net_ratelimit: 20 callbacks suppressed [ 1168.360890] protocol 88fb is buggy, dev hsr_slave_0 [ 1168.371030] protocol 88fb is buggy, dev hsr_slave_1 16:59:55 executing program 5 (fault-call:2 fault-nth:82): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:55 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005e00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1168.435731] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1168.435731] [ 1168.450700] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:55 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005e01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a705, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:55 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000003c0)=@req={0x80}, 0x10) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x80}, 0x10) [ 1168.589299] FAULT_INJECTION: forcing a failure. [ 1168.589299] name failslab, interval 1, probability 0, space 0, times 0 [ 1168.609567] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1168.610007] CPU: 1 PID: 7842 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1168.626589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1168.635947] Call Trace: [ 1168.638548] dump_stack+0x172/0x1f0 [ 1168.642192] should_fail.cold+0xa/0x1b [ 1168.646259] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1168.651376] ? lock_downgrade+0x810/0x810 [ 1168.655550] ? ___might_sleep+0x163/0x280 [ 1168.659707] __should_failslab+0x121/0x190 [ 1168.663947] should_failslab+0x9/0x14 [ 1168.667754] kmem_cache_alloc_trace+0x2d1/0x760 [ 1168.672452] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1168.677567] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1168.682491] __list_lru_init+0x3d3/0x6e0 [ 1168.686545] sget_userns+0x84d/0xd30 [ 1168.690245] ? kill_litter_super+0x60/0x60 [ 1168.694468] ? ns_test_super+0x50/0x50 [ 1168.698342] ? ns_test_super+0x50/0x50 [ 1168.702216] ? kill_litter_super+0x60/0x60 [ 1168.707999] sget+0x10c/0x150 [ 1168.711098] mount_bdev+0xff/0x3c0 [ 1168.714625] ? finish_unfinished+0x1120/0x1120 [ 1168.719195] get_super_block+0x35/0x40 [ 1168.723072] mount_fs+0x106/0x3ff [ 1168.726516] ? emergency_thaw_all+0x1a0/0x1a0 [ 1168.730998] ? __init_waitqueue_head+0x36/0x90 [ 1168.735571] vfs_kern_mount.part.0+0x6f/0x410 [ 1168.740054] do_mount+0x581/0x2d30 [ 1168.743581] ? copy_mount_options+0x41/0x440 [ 1168.747988] ? copy_mount_string+0x40/0x40 [ 1168.752210] ? kmem_cache_alloc_trace+0x354/0x760 [ 1168.757045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1168.762566] ? copy_mount_options+0x30e/0x440 [ 1168.767051] ksys_mount+0xdb/0x150 [ 1168.770579] __x64_sys_mount+0xbe/0x150 [ 1168.774541] do_syscall_64+0x103/0x610 [ 1168.778416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1168.783683] RIP: 0033:0x45a89a [ 1168.786864] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1168.805761] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1168.813455] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1168.820711] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1168.827967] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 16:59:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x9c020000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a706, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1168.835221] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1168.842473] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1168.849912] protocol 88fb is buggy, dev hsr_slave_0 [ 1168.850941] protocol 88fb is buggy, dev hsr_slave_0 [ 1168.855007] protocol 88fb is buggy, dev hsr_slave_1 [ 1168.859962] protocol 88fb is buggy, dev hsr_slave_1 [ 1168.865048] protocol 88fb is buggy, dev hsr_slave_0 [ 1168.875058] protocol 88fb is buggy, dev hsr_slave_1 [ 1168.880188] protocol 88fb is buggy, dev hsr_slave_0 [ 1168.885276] protocol 88fb is buggy, dev hsr_slave_1 [ 1168.901294] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1168.901294] 16:59:55 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=%']) 16:59:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x0) 16:59:55 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005f00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a707, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:55 executing program 5 (fault-call:2 fault-nth:83): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:55 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1005f01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1169.118822] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1169.118822] [ 1169.140487] FAULT_INJECTION: forcing a failure. [ 1169.140487] name failslab, interval 1, probability 0, space 0, times 0 [ 1169.171258] CPU: 0 PID: 7874 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1169.178494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1169.187851] Call Trace: [ 1169.190487] dump_stack+0x172/0x1f0 [ 1169.194125] should_fail.cold+0xa/0x1b [ 1169.198024] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1169.203132] ? lock_downgrade+0x810/0x810 [ 1169.207286] ? ___might_sleep+0x163/0x280 [ 1169.211527] __should_failslab+0x121/0x190 [ 1169.215765] should_failslab+0x9/0x14 [ 1169.219567] kmem_cache_alloc_trace+0x2d1/0x760 [ 1169.224239] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1169.229354] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1169.234290] __list_lru_init+0x3d3/0x6e0 [ 1169.238358] sget_userns+0x84d/0xd30 [ 1169.242088] ? kill_litter_super+0x60/0x60 [ 1169.246325] ? ns_test_super+0x50/0x50 [ 1169.250303] ? ns_test_super+0x50/0x50 [ 1169.254189] ? kill_litter_super+0x60/0x60 [ 1169.258431] sget+0x10c/0x150 [ 1169.261547] mount_bdev+0xff/0x3c0 [ 1169.265088] ? finish_unfinished+0x1120/0x1120 [ 1169.269674] get_super_block+0x35/0x40 [ 1169.273568] mount_fs+0x106/0x3ff [ 1169.277029] ? emergency_thaw_all+0x1a0/0x1a0 [ 1169.281527] ? __init_waitqueue_head+0x36/0x90 [ 1169.286122] vfs_kern_mount.part.0+0x6f/0x410 [ 1169.290624] do_mount+0x581/0x2d30 [ 1169.294168] ? copy_mount_options+0x41/0x440 [ 1169.298584] ? copy_mount_string+0x40/0x40 [ 1169.302825] ? kmem_cache_alloc_trace+0x354/0x760 [ 1169.307676] ? _copy_from_user+0xdd/0x150 [ 1169.311835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1169.317376] ? copy_mount_options+0x30e/0x440 [ 1169.321888] ksys_mount+0xdb/0x150 [ 1169.325434] __x64_sys_mount+0xbe/0x150 [ 1169.329425] do_syscall_64+0x103/0x610 [ 1169.333321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1169.338505] RIP: 0033:0x45a89a [ 1169.341701] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1169.360608] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 16:59:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a708, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x9c030000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) [ 1169.368324] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1169.375596] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1169.382873] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1169.390140] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1169.397412] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:56 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006000, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1169.444875] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:56 executing program 5 (fault-call:2 fault-nth:84): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:56 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006001, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a800, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1169.563837] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1169.563837] [ 1169.575143] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:56 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=/']) [ 1169.719587] FAULT_INJECTION: forcing a failure. [ 1169.719587] name failslab, interval 1, probability 0, space 0, times 0 [ 1169.748632] CPU: 0 PID: 7901 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1169.755875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1169.765242] Call Trace: [ 1169.767841] dump_stack+0x172/0x1f0 [ 1169.771476] should_fail.cold+0xa/0x1b [ 1169.775375] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1169.780485] ? lock_downgrade+0x810/0x810 [ 1169.784639] ? ___might_sleep+0x163/0x280 [ 1169.788789] __should_failslab+0x121/0x190 [ 1169.793029] should_failslab+0x9/0x14 [ 1169.796828] kmem_cache_alloc_trace+0x2d1/0x760 [ 1169.801502] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1169.806608] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1169.811541] __list_lru_init+0x3d3/0x6e0 [ 1169.815609] sget_userns+0x84d/0xd30 [ 1169.819322] ? kill_litter_super+0x60/0x60 [ 1169.823563] ? ns_test_super+0x50/0x50 [ 1169.827455] ? ns_test_super+0x50/0x50 [ 1169.831351] ? kill_litter_super+0x60/0x60 [ 1169.835592] sget+0x10c/0x150 [ 1169.838705] mount_bdev+0xff/0x3c0 [ 1169.842249] ? finish_unfinished+0x1120/0x1120 [ 1169.846839] get_super_block+0x35/0x40 [ 1169.850726] mount_fs+0x106/0x3ff [ 1169.854184] ? emergency_thaw_all+0x1a0/0x1a0 [ 1169.858683] ? __init_waitqueue_head+0x36/0x90 [ 1169.863367] vfs_kern_mount.part.0+0x6f/0x410 [ 1169.867869] do_mount+0x581/0x2d30 [ 1169.871414] ? copy_mount_string+0x40/0x40 [ 1169.875659] ? __sanitizer_cov_trace_const_cmp8+0x7/0x20 [ 1169.881112] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1169.886656] ? copy_mount_options+0x30e/0x440 [ 1169.891153] ksys_mount+0xdb/0x150 [ 1169.894694] __x64_sys_mount+0xbe/0x150 [ 1169.898670] do_syscall_64+0x103/0x610 [ 1169.902563] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1169.907745] RIP: 0033:0x45a89a [ 1169.910937] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1169.929832] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1169.937537] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1169.944802] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1169.952069] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1169.959342] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1169.966608] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:56 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$pokeuser(0x6, r0, 0x18000000000004, 0x3) pipe(0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) 16:59:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a801, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xac030000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:56 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006100, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:56 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006101, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:56 executing program 5 (fault-call:2 fault-nth:85): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a802, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xa893c) syz_execute_func(&(0x7f00000000c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccc463f960ffb56f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x2}, 0x20) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2f, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x0) [ 1170.079277] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1170.099347] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1170.099347] 16:59:57 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006200, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1170.231642] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue [ 1170.251354] FAULT_INJECTION: forcing a failure. [ 1170.251354] name failslab, interval 1, probability 0, space 0, times 0 [ 1170.280924] CPU: 1 PID: 7939 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1170.288154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1170.296045] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1170.296045] [ 1170.297508] Call Trace: [ 1170.310688] dump_stack+0x172/0x1f0 [ 1170.314332] should_fail.cold+0xa/0x1b [ 1170.318223] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1170.323337] ? lock_downgrade+0x810/0x810 [ 1170.327493] ? ___might_sleep+0x163/0x280 [ 1170.331643] __should_failslab+0x121/0x190 [ 1170.335883] should_failslab+0x9/0x14 [ 1170.339699] kmem_cache_alloc_trace+0x2d1/0x760 [ 1170.344381] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1170.349504] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1170.354448] __list_lru_init+0x3d3/0x6e0 [ 1170.358516] sget_userns+0x84d/0xd30 [ 1170.362233] ? kill_litter_super+0x60/0x60 [ 1170.366732] ? ns_test_super+0x50/0x50 [ 1170.370967] ? ns_test_super+0x50/0x50 [ 1170.374855] ? kill_litter_super+0x60/0x60 [ 1170.379097] sget+0x10c/0x150 [ 1170.382207] mount_bdev+0xff/0x3c0 [ 1170.385747] ? finish_unfinished+0x1120/0x1120 [ 1170.390340] get_super_block+0x35/0x40 [ 1170.394239] mount_fs+0x106/0x3ff [ 1170.397705] ? emergency_thaw_all+0x1a0/0x1a0 [ 1170.402201] ? __init_waitqueue_head+0x36/0x90 [ 1170.406776] vfs_kern_mount.part.0+0x6f/0x410 [ 1170.411258] do_mount+0x581/0x2d30 [ 1170.414782] ? copy_mount_options+0x41/0x440 [ 1170.419187] ? copy_mount_string+0x40/0x40 [ 1170.423416] ? kmem_cache_alloc_trace+0x354/0x760 [ 1170.428254] ? _copy_from_user+0xdd/0x150 [ 1170.432393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1170.437924] ? copy_mount_options+0x30e/0x440 [ 1170.442405] ksys_mount+0xdb/0x150 [ 1170.445932] __x64_sys_mount+0xbe/0x150 [ 1170.449907] do_syscall_64+0x103/0x610 [ 1170.453786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1170.458973] RIP: 0033:0x45a89a [ 1170.462166] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 16:59:57 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x6102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGREP(r0, 0x80084503, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x4ca, 0x0) dup3(r1, r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1170.481054] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1170.488744] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1170.496101] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1170.503352] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1170.510621] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1170.518000] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:57 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=l']) 16:59:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a803, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:57 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006201, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:57 executing program 5 (fault-call:2 fault-nth:86): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:57 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006300, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1170.792454] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1170.821184] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1170.821184] 16:59:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a804, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:57 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006301, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1170.938076] FAULT_INJECTION: forcing a failure. [ 1170.938076] name failslab, interval 1, probability 0, space 0, times 0 [ 1170.974841] CPU: 0 PID: 7985 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1170.980158] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1170.980158] [ 1170.982065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1170.982072] Call Trace: [ 1170.982095] dump_stack+0x172/0x1f0 [ 1170.982116] should_fail.cold+0xa/0x1b [ 1170.982134] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1170.982151] ? lock_downgrade+0x810/0x810 [ 1170.982167] ? ___might_sleep+0x163/0x280 [ 1170.982184] __should_failslab+0x121/0x190 [ 1170.982201] should_failslab+0x9/0x14 [ 1170.982215] kmem_cache_alloc_trace+0x2d1/0x760 [ 1170.982232] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1170.982261] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1171.021501] __list_lru_init+0x3d3/0x6e0 [ 1171.021524] sget_userns+0x84d/0xd30 [ 1171.021540] ? kill_litter_super+0x60/0x60 [ 1171.021556] ? ns_test_super+0x50/0x50 [ 1171.021570] ? ns_test_super+0x50/0x50 [ 1171.021583] ? kill_litter_super+0x60/0x60 [ 1171.021596] sget+0x10c/0x150 [ 1171.021614] mount_bdev+0xff/0x3c0 [ 1171.021627] ? finish_unfinished+0x1120/0x1120 [ 1171.021644] get_super_block+0x35/0x40 [ 1171.030012] mount_fs+0x106/0x3ff [ 1171.030032] ? emergency_thaw_all+0x1a0/0x1a0 [ 1171.030049] ? __init_waitqueue_head+0x36/0x90 [ 1171.030070] vfs_kern_mount.part.0+0x6f/0x410 [ 1171.030088] do_mount+0x581/0x2d30 [ 1171.108299] ? copy_mount_options+0x41/0x440 [ 1171.112720] ? copy_mount_string+0x40/0x40 [ 1171.116954] ? kmem_cache_alloc_trace+0x354/0x760 [ 1171.121806] ? _copy_from_user+0xdd/0x150 [ 1171.125958] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1171.131499] ? copy_mount_options+0x30e/0x440 [ 1171.136002] ksys_mount+0xdb/0x150 [ 1171.139565] __x64_sys_mount+0xbe/0x150 [ 1171.143549] do_syscall_64+0x103/0x610 [ 1171.147451] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1171.152641] RIP: 0033:0x45a89a [ 1171.155838] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1171.174737] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 16:59:57 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) read(r1, &(0x7f0000000480)=""/144, 0x90) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 16:59:58 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006400, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a805, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1171.182446] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1171.189717] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1171.192037] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1171.196984] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1171.196993] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1171.197002] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xd8020000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:58 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6a6465763dff"]) 16:59:58 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006401, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a806, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:58 executing program 5 (fault-call:2 fault-nth:87): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:58 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006500, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1171.521152] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1171.521152] [ 1171.531848] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 16:59:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a807, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1171.627239] FAULT_INJECTION: forcing a failure. [ 1171.627239] name failslab, interval 1, probability 0, space 0, times 0 [ 1171.657594] CPU: 1 PID: 8023 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1171.664817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1171.674171] Call Trace: [ 1171.674205] dump_stack+0x172/0x1f0 [ 1171.674224] should_fail.cold+0xa/0x1b [ 1171.674240] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1171.674255] ? lock_downgrade+0x810/0x810 [ 1171.674273] ? ___might_sleep+0x163/0x280 [ 1171.697909] __should_failslab+0x121/0x190 [ 1171.702156] should_failslab+0x9/0x14 [ 1171.705962] kmem_cache_alloc_trace+0x2d1/0x760 [ 1171.710634] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1171.715916] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1171.720850] __list_lru_init+0x3d3/0x6e0 [ 1171.724920] sget_userns+0x84d/0xd30 [ 1171.728632] ? kill_litter_super+0x60/0x60 [ 1171.732875] ? ns_test_super+0x50/0x50 [ 1171.736761] ? ns_test_super+0x50/0x50 [ 1171.740650] ? kill_litter_super+0x60/0x60 [ 1171.744885] sget+0x10c/0x150 [ 1171.748517] mount_bdev+0xff/0x3c0 [ 1171.752062] ? finish_unfinished+0x1120/0x1120 [ 1171.756653] get_super_block+0x35/0x40 [ 1171.760540] mount_fs+0x106/0x3ff [ 1171.763996] ? emergency_thaw_all+0x1a0/0x1a0 [ 1171.768490] ? __init_waitqueue_head+0x36/0x90 [ 1171.773081] vfs_kern_mount.part.0+0x6f/0x410 [ 1171.777584] do_mount+0x581/0x2d30 [ 1171.781223] ? copy_mount_options+0x41/0x440 [ 1171.785635] ? copy_mount_string+0x40/0x40 [ 1171.789879] ? kmem_cache_alloc_trace+0x354/0x760 [ 1171.794732] ? _copy_from_user+0xdd/0x150 [ 1171.798889] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1171.804429] ? copy_mount_options+0x30e/0x440 [ 1171.808928] ksys_mount+0xdb/0x150 [ 1171.812471] __x64_sys_mount+0xbe/0x150 [ 1171.816455] do_syscall_64+0x103/0x610 [ 1171.820365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1171.825553] RIP: 0033:0x45a89a [ 1171.828749] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1171.847650] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1171.855364] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1171.862630] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1171.869897] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 16:59:58 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006501, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1171.877168] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1171.884443] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1171.893640] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue [ 1171.912575] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1171.912575] 16:59:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20323}) 16:59:58 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="8dc38c86d7d216ecd89f02000074a9cb7100dc000000000000e9ff000000000000000000000000"]) 16:59:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x0, 0x401}) 16:59:58 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006600, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1171.998229] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xe8030000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a808, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:58 executing program 5 (fault-call:2 fault-nth:88): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:58 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006601, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:59 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1172.149074] vhci_hcd: default hub control req: 0000 v0000 i0001 l0 16:59:59 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006700, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a900, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1172.214967] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "Ì؟" [ 1172.231239] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1172.231239] [ 1172.249471] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:59 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a901, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1172.361969] FAULT_INJECTION: forcing a failure. [ 1172.361969] name failslab, interval 1, probability 0, space 0, times 0 [ 1172.390895] CPU: 0 PID: 8060 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1172.390919] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "Ì؟" [ 1172.398156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1172.398163] Call Trace: [ 1172.398187] dump_stack+0x172/0x1f0 [ 1172.398206] should_fail.cold+0xa/0x1b [ 1172.398229] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1172.424785] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 1172.427550] ? lock_downgrade+0x810/0x810 [ 1172.446039] ? ___might_sleep+0x163/0x280 [ 1172.450195] __should_failslab+0x121/0x190 [ 1172.454519] should_failslab+0x9/0x14 [ 1172.458338] kmem_cache_alloc_trace+0x2d1/0x760 [ 1172.463023] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1172.467958] __list_lru_init+0x3d3/0x6e0 [ 1172.472032] sget_userns+0x84d/0xd30 [ 1172.475749] ? kill_litter_super+0x60/0x60 [ 1172.479989] ? ns_test_super+0x50/0x50 [ 1172.483882] ? ns_test_super+0x50/0x50 [ 1172.487769] ? kill_litter_super+0x60/0x60 [ 1172.492009] sget+0x10c/0x150 [ 1172.495137] mount_bdev+0xff/0x3c0 [ 1172.498689] ? finish_unfinished+0x1120/0x1120 [ 1172.503283] get_super_block+0x35/0x40 [ 1172.507177] mount_fs+0x106/0x3ff [ 1172.510641] ? emergency_thaw_all+0x1a0/0x1a0 [ 1172.515150] ? __init_waitqueue_head+0x36/0x90 [ 1172.519742] vfs_kern_mount.part.0+0x6f/0x410 [ 1172.524247] do_mount+0x581/0x2d30 [ 1172.527793] ? copy_mount_options+0x41/0x440 [ 1172.532217] ? copy_mount_string+0x40/0x40 [ 1172.536458] ? kmem_cache_alloc_trace+0x354/0x760 [ 1172.541315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1172.546857] ? copy_mount_options+0x30e/0x440 [ 1172.551364] ksys_mount+0xdb/0x150 [ 1172.554910] __x64_sys_mount+0xbe/0x150 [ 1172.558894] do_syscall_64+0x103/0x610 [ 1172.562791] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1172.567972] RIP: 0033:0x45a89a [ 1172.567987] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1172.567995] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1172.568009] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1172.568021] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1172.590475] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1172.590484] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1172.590491] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 16:59:59 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6a646576ef0f"]) 16:59:59 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:59 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006701, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1172.724049] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 16:59:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xeb030000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 16:59:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a902, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:59 executing program 5 (fault-call:2 fault-nth:89): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 16:59:59 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:59 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006800, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 16:59:59 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 16:59:59 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006801, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1172.907868] REISERFS warning (device loop0): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 1172.907868] 16:59:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a903, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:59:59 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1172.951068] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1172.951068] [ 1172.972693] FAULT_INJECTION: forcing a failure. [ 1172.972693] name failslab, interval 1, probability 0, space 0, times 0 [ 1173.013813] CPU: 1 PID: 8096 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1173.021035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1173.021041] Call Trace: [ 1173.021063] dump_stack+0x172/0x1f0 [ 1173.021092] should_fail.cold+0xa/0x1b [ 1173.021109] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1173.021124] ? lock_downgrade+0x810/0x810 [ 1173.021140] ? ___might_sleep+0x163/0x280 [ 1173.021157] __should_failslab+0x121/0x190 [ 1173.033117] should_failslab+0x9/0x14 [ 1173.033134] kmem_cache_alloc_trace+0x2d1/0x760 [ 1173.033149] ? trace_hardirqs_on+0x67/0x230 [ 1173.033163] ? kasan_check_read+0x11/0x20 [ 1173.075134] __alloc_workqueue_key+0x79c/0xe00 [ 1173.079721] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1173.084839] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1173.089865] ? lockdep_init_map+0x10c/0x5b0 [ 1173.094196] ? debug_mutex_init+0x2d/0x60 [ 1173.098353] reiserfs_fill_super+0x377/0x2eb0 [ 1173.102862] ? finish_unfinished+0x1120/0x1120 [ 1173.107446] ? up_write+0x1c/0x150 [ 1173.110998] ? snprintf+0xbb/0xf0 [ 1173.114457] ? vsprintf+0x40/0x40 [ 1173.117919] ? wait_for_completion+0x440/0x440 [ 1173.122500] ? ns_test_super+0x50/0x50 [ 1173.126386] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1173.131406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1173.136951] mount_bdev+0x307/0x3c0 [ 1173.140577] ? finish_unfinished+0x1120/0x1120 [ 1173.145163] get_super_block+0x35/0x40 [ 1173.149056] mount_fs+0x106/0x3ff [ 1173.152521] ? emergency_thaw_all+0x1a0/0x1a0 [ 1173.157019] ? __init_waitqueue_head+0x36/0x90 [ 1173.161867] vfs_kern_mount.part.0+0x6f/0x410 [ 1173.166373] do_mount+0x581/0x2d30 [ 1173.169913] ? copy_mount_options+0x41/0x440 [ 1173.174331] ? copy_mount_string+0x40/0x40 [ 1173.178571] ? kmem_cache_alloc_trace+0x354/0x760 [ 1173.183417] ? _copy_from_user+0xdd/0x150 [ 1173.187569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1173.193114] ? copy_mount_options+0x30e/0x440 [ 1173.197616] ksys_mount+0xdb/0x150 [ 1173.201162] __x64_sys_mount+0xbe/0x150 [ 1173.205142] do_syscall_64+0x103/0x610 [ 1173.209034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1173.214225] RIP: 0033:0x45a89a [ 1173.217423] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1173.236325] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1173.244036] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1173.251311] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1173.258576] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1173.265841] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1173.273109] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1173.283708] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 17:00:00 executing program 0: r0 = socket(0x6, 0x5, 0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000d00)={0x12, "ba271f6e119fbea0adfdd4f04ffc6ce952a308c6ef4fe06ed2188a101d815df360855ce11226cbc1861734c79725ade0e8d644d6a2c3383a9c0e12d07a181ac3a02fd3592fd6030e6476e35bf5a0e2654f5783ff6949e29a33709bbab854c2a4507e9ba11ae06f40ee63d5768336896cd8cabaa2367bf0c8950e550978bcd350"}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x410800, 0x0) bind$llc(r1, &(0x7f00000001c0)={0x1a, 0x325, 0x5, 0x8, 0x9, 0x3, @local}, 0x10) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYRES32=r1]) r2 = syz_open_dev$radio(&(0x7f0000000e80)='/dev/radio#\x00', 0x2, 0x2) io_setup(0x400, &(0x7f0000000580)=0x0) io_submit(r3, 0x9, &(0x7f0000000c80)=[&(0x7f0000000640)={0x0, 0x0, 0x0, 0x7, 0xfffffffffffffffa, r1, &(0x7f00000005c0)="2af9b11ffc7fac09c8074e972064d4077a8ae6d8bc0637e704b99964b5e40c4976f066f1bd71606b70b935b2f5d124ad3a3c53f8a20fd7c128c2993342f6f0649c8b73d91cf98f1ca8acfa8224149e26ec2041140d854837e5238fe9de84cf9247fe8cf841", 0x65, 0x100000001, 0x0, 0x1, r2}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x3, 0x2c8, r2, &(0x7f0000000680)="acb6ea3ab0697574ff17d58c49bd0c4e68fe355b878c4f758f7be76c1449f122d8958b73f95af653326c57573aa53ce96ba9fd9d885135398d50eef635921fb5922a3e87ee33861d0754864100b29ad1d437b1da4c82edc573e1f798d1b52082e5", 0x61, 0xffff, 0x0, 0x2, r2}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x2, 0x9, r2, &(0x7f0000000740)="714590e58f1a1e83ee04334244ab9c21f46ae3ff1be406d05e938d84b97b1a555034315b18fb1fe8756f4225b1623e355e887ee95264e1c14bc22d", 0x3b, 0x2, 0x0, 0x3, 0xffffffffffffff9c}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x2, 0x0, r2, &(0x7f00000007c0)="aac30960210d557a8e6b575f75b04545f66fd453226fe0e5aa0a9ac381f4cf0f922460b4c7908e0b853ea5bf380310fbde0ef9c0b21e36a50e8428e8a71f08f9e9a53f7fcf72b9cf062fd3201c02417087cad900d040ab7cf877b82288c932bc7c7f6aa956eda458faadb99673063e24230ca19f9535b0ab0a567e39d02fd7578288e66594a73f699100104b356e575c0f552c5312fac91656b79614eee0a725cf71ce0f34804b1aa425593238d14c8282f157bb5b3f6cbe96bcf61b7cb9f1c15cbe36a6", 0xc4, 0x8000, 0x0, 0x3, r2}, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x1, 0x3da7, r2, &(0x7f0000000900)="f38b1ce9e5e3", 0x6, 0x2, 0x0, 0x2, r1}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x164, r2, &(0x7f0000000980)="f535155bca27de679b973b534b718f467969dea9ac54e09c985f47d6677bfa2ef2ae04c288f5856202cce203274e7d8061c5aa2f2105ea254faaa97e2b", 0x3d, 0x3, 0x0, 0x3, r2}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x6, 0x2, r2, &(0x7f0000000a00)="183e37753aecc0be63ed5109c5b249fa1bde2957dc758ee99b63cc56c4c6633c356d3ed06c0235230be041ccf688fd3a21f1fc75e0690f8091f5e3ac85e4a73b7e0e120778902b9f61da021b22a43b668bbbf1578e90022fd55a9db7bb7ea7a95174ffde4b4e205a04a7254879c68a2c389fbac0dce40c09b4495f430d7b9937e81b1daa63d2faf88902997eb8d396380e12c5", 0x93, 0x8, 0x0, 0x1, r1}, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0xf, 0x40, r2, &(0x7f0000000b00)="e435d083b9ced7e47d2e9bccf3544e6b5a04b5bb8f900cea893f241749993b483d46f120f2ee05eb16add375f7c648faaefbf11ba5e34fac4ad4e479293da75eabe5cb1475c6856edaebfb3621673b7329cc9d461c402db8701874fde84210fd6eb48d7380766a797ad989266367fc9bad91fa9742db4f84798172da7cc2f954a954", 0x82, 0x3, 0x0, 0x1, r1}, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0xf, 0xfffffffffffff800, r2, &(0x7f0000000c00)="578186cbfa280be3b59e102404086ef97ea9595a14dd5afd7f555d841f", 0x1d, 0x80000000, 0x0, 0x1, r1}]) fsetxattr$security_smack_entry(r2, &(0x7f0000000080)='security.SMACK64EXEC\x00', &(0x7f0000000140)='}GPL#wlan0,loselinuxkeyring%\x00', 0x1d, 0x2) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000180)={0x0, 0x3}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000003c0)={r4, 0x1, 0xce, "fa76739dd61ff96a7e24810aba0e824c44900810cfbdbcd34dd644d7626892f73198a6afbcc33d29b930caf48b628be682a0deaac37e3d0720042a0bf0e33264dc9dcbd253e9e5f7f2d0d201a53196fbb9ae016edee242e7c6284ca983ae43b06bc53320dbde254e43535d9f860af405b9066ac40a51b289c57c6ae4faf17c2db7d1312363e23d883e6c18fd8850523e07f9eb732450ea57bd89b4906d4f03c338ef914d3050a6b0921d9fec474efa5a8cf2205016349eaa1bfdc8873b0c6e2e8d6e294351ef680e5fd3dfeb749d"}, 0xd6) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000dc0)=0x5, 0x4) connect$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x1, {0x100000001, 0x7, 0x8, 0x1, 0xffffffff80000001, 0xfff}, 0x10001, 0x9}, 0xe) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f00000004c0)={0x0, 0x0, [], @raw_data=[0x9, 0x2, 0x6, 0xfffffffffffffff9, 0x5, 0xffffffff, 0x6, 0x998, 0x800, 0xff, 0x4, 0x2, 0xa298, 0x5, 0x1, 0x7, 0xfffffffffffffffa, 0x0, 0x45, 0x3, 0x5aef, 0x5, 0x5, 0x46c, 0x2, 0x100000001, 0x4, 0x9, 0xf1cf, 0x3, 0x5, 0x7457]}) prctl$PR_SET_KEEPCAPS(0x8, 0x1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f0000000240)={{0x20, 0x81}, 'port1\x00', 0x58, 0x800, 0xffffffffffff0000, 0x3ff, 0x9, 0x9, 0x9, 0x0, 0x4, 0x9}) 17:00:00 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 17:00:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a904, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1173.308793] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1173.308793] [ 1173.325489] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue 17:00:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xf4010000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 17:00:00 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006900, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1173.381244] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 17:00:00 executing program 5 (fault-call:2 fault-nth:90): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 17:00:00 executing program 1: r0 = syz_open_dev$usb(0x0, 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 17:00:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a905, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:00:00 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006901, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1173.568452] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "" 17:00:00 executing program 1: r0 = syz_open_dev$usb(0x0, 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1173.626442] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1173.626442] [ 1173.669247] FAULT_INJECTION: forcing a failure. [ 1173.669247] name failslab, interval 1, probability 0, space 0, times 0 [ 1173.690470] CPU: 1 PID: 8144 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1173.697700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1173.707066] Call Trace: [ 1173.709666] dump_stack+0x172/0x1f0 [ 1173.713302] should_fail.cold+0xa/0x1b [ 1173.717206] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1173.722310] ? lock_downgrade+0x810/0x810 [ 1173.726462] ? ___might_sleep+0x163/0x280 [ 1173.730622] __should_failslab+0x121/0x190 [ 1173.734871] ? cancel_delayed_work+0x2d0/0x2d0 [ 1173.739455] should_failslab+0x9/0x14 [ 1173.743261] kmem_cache_alloc_trace+0x2d1/0x760 [ 1173.748438] ? lockdep_init_map+0x10c/0x5b0 [ 1173.752768] ? cancel_delayed_work+0x2d0/0x2d0 [ 1173.757351] __kthread_create_on_node+0xf2/0x460 [ 1173.762108] ? kthread_parkme+0xb0/0xb0 [ 1173.766096] ? __lock_is_held+0xb6/0x140 [ 1173.770159] ? check_preemption_disabled+0x48/0x290 [ 1173.775182] ? cancel_delayed_work+0x2d0/0x2d0 [ 1173.779767] kthread_create_on_node+0xbb/0xf0 [ 1173.784267] ? __kthread_create_on_node+0x460/0x460 [ 1173.789294] ? kmem_cache_alloc_node_trace+0x352/0x720 [ 1173.794570] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1173.799413] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1173.804530] init_rescuer.part.0+0x7d/0x190 [ 1173.808857] __alloc_workqueue_key+0xb0e/0xe00 [ 1173.813436] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1173.818550] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1173.823568] ? lockdep_init_map+0x10c/0x5b0 [ 1173.827892] ? debug_mutex_init+0x2d/0x60 [ 1173.832053] reiserfs_fill_super+0x377/0x2eb0 [ 1173.836590] ? finish_unfinished+0x1120/0x1120 [ 1173.841177] ? up_write+0x1c/0x150 [ 1173.844725] ? snprintf+0xbb/0xf0 [ 1173.848181] ? vsprintf+0x40/0x40 [ 1173.851642] ? wait_for_completion+0x440/0x440 [ 1173.856225] ? ns_test_super+0x50/0x50 [ 1173.860120] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1173.865143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1173.870683] mount_bdev+0x307/0x3c0 [ 1173.874311] ? finish_unfinished+0x1120/0x1120 [ 1173.880357] get_super_block+0x35/0x40 [ 1173.884248] mount_fs+0x106/0x3ff [ 1173.887707] ? emergency_thaw_all+0x1a0/0x1a0 [ 1173.892207] ? __init_waitqueue_head+0x36/0x90 [ 1173.896915] vfs_kern_mount.part.0+0x6f/0x410 [ 1173.901415] do_mount+0x581/0x2d30 [ 1173.904955] ? copy_mount_options+0x41/0x440 [ 1173.909367] ? copy_mount_string+0x40/0x40 [ 1173.913608] ? kmem_cache_alloc_trace+0x354/0x760 [ 1173.918453] ? _copy_from_user+0xdd/0x150 [ 1173.922612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1173.928152] ? copy_mount_options+0x30e/0x440 [ 1173.932654] ksys_mount+0xdb/0x150 [ 1173.936203] __x64_sys_mount+0xbe/0x150 [ 1173.940179] do_syscall_64+0x103/0x610 [ 1173.944072] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1173.949262] RIP: 0033:0x45a89a 17:00:00 executing program 1: r0 = syz_open_dev$usb(0x0, 0x204, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 17:00:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a906, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1173.952453] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1173.971348] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1173.979057] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1173.986323] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1173.993595] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1174.000865] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1174.008133] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1174.027131] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue [ 1174.108232] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue [ 1174.109164] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 17:00:01 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x100000000, 0x20101) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x22, "b5a2cbf4ae882e93d27580457bbc57f5c9ae577a1f55a726644edbb73873fd0d6d14"}, &(0x7f0000000080)=0x2a) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r1, 0x4c99, 0x3, [0xffffffffffff071e, 0x3, 0x800]}, 0xe) 17:00:01 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006a00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:00:01 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) 17:00:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a907, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:00:01 executing program 5 (fault-call:2 fault-nth:91): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=.']) 17:00:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xf4030000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) 17:00:01 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006a01, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:00:01 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1174.341260] FAULT_INJECTION: forcing a failure. [ 1174.341260] name failslab, interval 1, probability 0, space 0, times 0 [ 1174.375119] REISERFS warning (device loop3): super-6506 reiserfs_getopt: empty argument for "jdev" [ 1174.375119] [ 1174.386666] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1174.401215] CPU: 0 PID: 8174 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1174.408518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1174.417880] Call Trace: [ 1174.420483] dump_stack+0x172/0x1f0 [ 1174.424126] should_fail.cold+0xa/0x1b [ 1174.428028] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1174.433145] ? lock_downgrade+0x810/0x810 [ 1174.437302] ? ___might_sleep+0x163/0x280 [ 1174.441458] __should_failslab+0x121/0x190 [ 1174.445697] should_failslab+0x9/0x14 [ 1174.449502] __kmalloc_track_caller+0x2d8/0x740 [ 1174.454178] ? lockdep_init_map+0x10c/0x5b0 [ 1174.458511] ? reiserfs_fill_super+0xb2b/0x2eb0 [ 1174.463187] kstrdup+0x3a/0x70 [ 1174.466392] reiserfs_fill_super+0xb2b/0x2eb0 [ 1174.470905] ? finish_unfinished+0x1120/0x1120 [ 1174.475491] ? up_write+0x1c/0x150 [ 1174.479050] ? snprintf+0xbb/0xf0 [ 1174.482509] ? vsprintf+0x40/0x40 [ 1174.485976] ? wait_for_completion+0x440/0x440 [ 1174.490558] ? ns_test_super+0x50/0x50 [ 1174.494450] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1174.499475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1174.505032] mount_bdev+0x307/0x3c0 [ 1174.508663] ? finish_unfinished+0x1120/0x1120 [ 1174.513254] get_super_block+0x35/0x40 [ 1174.517147] mount_fs+0x106/0x3ff [ 1174.520605] ? emergency_thaw_all+0x1a0/0x1a0 [ 1174.525109] ? __init_waitqueue_head+0x36/0x90 [ 1174.529703] vfs_kern_mount.part.0+0x6f/0x410 [ 1174.534206] do_mount+0x581/0x2d30 [ 1174.537753] ? copy_mount_options+0x41/0x440 17:00:01 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x1, r0, &(0x7f0000000080), 0x1006b00, &(0x7f0000000300)) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d790f0000000000000758551543f883b2bb4a9710edd5cf4a54f0d26297e0002bef09610105dddcb0942003229946bee342"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x8, 0x30}, &(0x7f0000000780)=0xc) r2 = getuid() setresuid(0x0, r2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000005c0)={0x6, 0x80000001}) setxattr$security_smack_transmute(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000940)='TRUE', 0x4, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x6685) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x3}}}, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1174.542167] ? copy_mount_string+0x40/0x40 [ 1174.546404] ? kmem_cache_alloc_trace+0x354/0x760 [ 1174.551270] ? _copy_from_user+0xdd/0x150 [ 1174.555444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1174.560996] ? copy_mount_options+0x30e/0x440 [ 1174.565507] ksys_mount+0xdb/0x150 [ 1174.569062] __x64_sys_mount+0xbe/0x150 [ 1174.573050] do_syscall_64+0x103/0x610 [ 1174.576944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1174.582593] RIP: 0033:0x45a89a 17:00:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2000000000002, 0x70, 0x0, 0x800000000a908, 0x0, 0x0, 0x0, 0x0, 0x4418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1174.585790] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1174.604698] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1174.612408] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1174.619676] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1174.626945] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 [ 1174.634222] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 17:00:01 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x20123, 0x401}) [ 1174.641498] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1174.652823] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate memory for journal device name [ 1174.664461] ------------[ cut here ]------------ [ 1174.669217] kernel BUG at fs/reiserfs/lock.c:44! [ 1174.669556] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1174.675818] kobject: 'loop3' (0000000062a2e20d): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1174.679371] CPU: 0 PID: 8174 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #82 [ 1174.679379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1174.679401] RIP: 0010:reiserfs_write_unlock+0xeb/0x110 [ 1174.688941] net_ratelimit: 19 callbacks suppressed [ 1174.688956] protocol 88fb is buggy, dev hsr_slave_0 [ 1174.695987] Code: 5d c3 e8 b8 1c 89 ff 48 8d 7b 28 48 c7 83 a8 00 00 00 00 00 00 00 e8 a4 9f 1b 05 e8 9f 1c 89 ff 5b 41 5c 5d c3 e8 95 1c 89 ff <0f> 0b e8 3e 1d c0 ff eb a1 e8 57 1d c0 ff e9 33 ff ff ff e8 4d 1d [ 1174.695994] RSP: 0018:ffff88805bb7fa10 EFLAGS: 00010246 [ 1174.705387] protocol 88fb is buggy, dev hsr_slave_1 [ 1174.710596] RAX: 0000000000040000 RBX: ffff888087ef5240 RCX: ffffc9001087c000 [ 1174.757009] RDX: 0000000000040000 RSI: ffffffff81e6c4eb RDI: ffff888087ef52e8 [ 1174.764280] RBP: ffff88805bb7fa20 R08: 0000000000000065 R09: ffffed1015d05021 [ 1174.771547] R10: ffffed1015d05020 R11: ffff8880ae828107 R12: 00000000ffffffea [ 1174.778815] R13: ffff88808625c2c0 R14: ffff88805bb7fbc0 R15: ffff888087ef5240 [ 1174.786097] FS: 00007f619bb68700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1174.794315] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1174.800193] CR2: 00007ffe84d70bac CR3: 000000009236a000 CR4: 00000000001406f0 [ 1174.807469] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1174.814738] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1174.821999] Call Trace: [ 1174.824595] reiserfs_fill_super+0x2b51/0x2eb0 [ 1174.829186] ? finish_unfinished+0x1120/0x1120 [ 1174.833770] ? up_write+0x1c/0x150 [ 1174.837310] ? snprintf+0xbb/0xf0 [ 1174.840761] ? vsprintf+0x40/0x40 [ 1174.844217] ? wait_for_completion+0x440/0x440 [ 1174.848799] ? ns_test_super+0x50/0x50 [ 1174.852686] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1174.857700] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1174.863239] mount_bdev+0x307/0x3c0 [ 1174.866867] ? finish_unfinished+0x1120/0x1120 [ 1174.871448] get_super_block+0x35/0x40 [ 1174.875337] mount_fs+0x106/0x3ff [ 1174.878790] ? emergency_thaw_all+0x1a0/0x1a0 [ 1174.883286] ? __init_waitqueue_head+0x36/0x90 [ 1174.887868] vfs_kern_mount.part.0+0x6f/0x410 [ 1174.892363] do_mount+0x581/0x2d30 [ 1174.895899] ? copy_mount_options+0x41/0x440 [ 1174.900309] ? copy_mount_string+0x40/0x40 [ 1174.904541] ? kmem_cache_alloc_trace+0x354/0x760 [ 1174.909385] ? _copy_from_user+0xdd/0x150 [ 1174.913536] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1174.919078] ? copy_mount_options+0x30e/0x440 [ 1174.923575] ksys_mount+0xdb/0x150 [ 1174.927116] __x64_sys_mount+0xbe/0x150 [ 1174.931093] do_syscall_64+0x103/0x610 [ 1174.934981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1174.940171] RIP: 0033:0x45a89a [ 1174.943362] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1174.962262] RSP: 002b:00007f619bb67a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1174.969967] RAX: ffffffffffffffda RBX: 00007f619bb67b30 RCX: 000000000045a89a [ 1174.977233] RDX: 00007f619bb67ad0 RSI: 0000000020000100 RDI: 00007f619bb67af0 [ 1174.984502] RBP: 0000000020000100 R08: 00007f619bb67b30 R09: 00007f619bb67ad0 17:00:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='jdev=']) [ 1174.991765] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1174.999036] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000005 [ 1175.006307] Modules linked in: [ 1175.019693] ---[ end trace 7ce5da3514a14b9c ]--- [ 1175.025409] RIP: 0010:reiserfs_write_unlock+0xeb/0x110 [ 1175.030821] Code: 5d c3 e8 b8 1c 89 ff 48 8d 7b 28 48 c7 83 a8 00 00 00 00 00 00 00 e8 a4 9f 1b 05 e8 9f 1c 89 ff 5b 41 5c 5d c3 e8 95 1c 89 ff <0f> 0b e8 3e 1d c0 ff eb a1 e8 57 1d c0 ff e9 33 ff ff ff e8 4d 1d [ 1175.049843] RSP: 0018:ffff88805bb7fa10 EFLAGS: 00010246 [ 1175.055378] RAX: 0000000000040000 RBX: ffff888087ef5240 RCX: ffffc9001087c000 [ 1175.055450] kobject: 'loop0' (00000000162e1aa1): kobject_uevent_env [ 1175.062731] RDX: 0000000000040000 RSI: ffffffff81e6c4eb RDI: ffff888087ef52e8 [ 1175.076459] RBP: ffff88805bb7fa20 R08: 0000000000000065 R09: ffffed1015d05021 [ 1175.080823] protocol 88fb is buggy, dev hsr_slave_0 [ 1175.083818] protocol 88fb is buggy, dev hsr_slave_0 [ 1175.088763] protocol 88fb is buggy, dev hsr_slave_1 [ 1175.093776] protocol 88fb is buggy, dev hsr_slave_1 [ 1175.098785] protocol 88fb is buggy, dev hsr_slave_0 [ 1175.105546] R10: ffffed1015d05020 R11: ffff8880ae828107 R12: 00000000ffffffea [ 1175.108805] protocol 88fb is buggy, dev hsr_slave_1 [ 1175.116146] R13: ffff88808625c2c0 R14: ffff88805bb7fbc0 R15: ffff888087ef5240 [ 1175.121171] protocol 88fb is buggy, dev hsr_slave_0 [ 1175.128414] FS: 00007f619bb68700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1175.133408] protocol 88fb is buggy, dev hsr_slave_1 [ 1175.138629] kobject: 'loop5' (000000008b61045f): kobject_uevent_env [ 1175.142180] kobject: 'loop0' (00000000162e1aa1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1175.146992] kobject: 'loop5' (000000008b61045f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1175.153244] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1175.178578] kobject: 'loop0' (00000000162e1aa1): kobject_uevent_env [ 1175.187768] kobject: 'loop0' (00000000162e1aa1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1175.200206] kobject: 'loop4' (00000000e9fdc760): kobject_uevent_env [ 1175.210993] CR2: 0000001b2de24000 CR3: 000000009236a000 CR4: 00000000001406f0 [ 1175.221101] kobject: 'loop3' (0000000062a2e20d): kobject_uevent_env [ 1175.227847] kobject: 'loop4' (00000000e9fdc760): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1175.233037] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1175.244925] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1175.247808] kobject: 'loop3' (0000000062a2e20d): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1175.254545] Kernel panic - not syncing: Fatal exception [ 1175.263575] kobject: 'loop2' (0000000006455dc2): kobject_uevent_env [ 1175.268277] Kernel Offset: disabled [ 1175.278276] Rebooting in 86400 seconds..