141] ? fpregs_assert_state_consistent+0x7d/0x90 [ 905.874185][T17141] __x64_sys_write+0x3e/0x50 [ 905.878814][T17141] do_syscall_64+0x34/0x50 [ 905.883234][T17141] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 905.889130][T17141] RIP: 0033:0x466459 [ 905.896510][T17141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:52:40 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:40 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:40 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000010200000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:40 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000c00000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 905.916205][T17141] RSP: 002b:00007fc088938188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 905.924623][T17141] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 905.932678][T17141] RDX: 0000000000035000 RSI: 0000000020000040 RDI: 0000000000000003 [ 905.940655][T17141] RBP: 00007fc0889381d0 R08: 0000000000000000 R09: 0000000000000000 [ 905.948634][T17141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 905.956669][T17141] R13: 00007ffe1439e27f R14: 00007fc088938300 R15: 0000000000022000 05:52:40 executing program 3 (fault-call:2 fault-nth:98): r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:40 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000220000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:40 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:40 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000d00000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 906.006283][T17156] blktrace: Concurrent blktraces are not allowed on sg0 [ 906.017265][T17158] blktrace: Concurrent blktraces are not allowed on sg0 [ 906.036983][T17156] blktrace: Concurrent blktraces are not allowed on sg0 05:52:40 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) [ 906.075957][T17166] FAULT_INJECTION: forcing a failure. [ 906.075957][T17166] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 906.089095][T17166] CPU: 1 PID: 17166 Comm: syz-executor.3 Not tainted 5.12.0-rc8-syzkaller #0 [ 906.097953][T17166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 906.098945][T17172] blktrace: Concurrent blktraces are not allowed on sg0 [ 906.108004][T17166] Call Trace: [ 906.108013][T17166] dump_stack+0x137/0x19d 05:52:40 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:40 executing program 5: ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) [ 906.108036][T17166] should_fail+0x23c/0x250 [ 906.118498][T17174] blktrace: Concurrent blktraces are not allowed on sg0 [ 906.122579][T17166] should_fail_usercopy+0x16/0x20 [ 906.127751][T17174] blktrace: Concurrent blktraces are not allowed on sg0 [ 906.133891][T17166] _copy_from_user+0x1c/0xd0 [ 906.133914][T17166] input_event_from_user+0x58/0x140 [ 906.133935][T17166] evdev_write+0x1b2/0x280 [ 906.160041][T17166] ? evdev_read+0x640/0x640 [ 906.164544][T17166] vfs_write+0x1f3/0x770 [ 906.168787][T17166] ? __fget_light+0x21b/0x260 05:52:40 executing program 5: ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) [ 906.173452][T17166] ksys_write+0xce/0x180 [ 906.178126][T17166] ? fpregs_assert_state_consistent+0x7d/0x90 [ 906.184194][T17166] __x64_sys_write+0x3e/0x50 [ 906.188792][T17166] do_syscall_64+0x34/0x50 [ 906.193205][T17166] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 906.199250][T17166] RIP: 0033:0x466459 [ 906.203277][T17166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:52:40 executing program 5: ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) [ 906.223008][T17166] RSP: 002b:00007fc088938188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 906.231423][T17166] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 906.239391][T17166] RDX: 0000000000035000 RSI: 0000000020000040 RDI: 0000000000000003 [ 906.247363][T17166] RBP: 00007fc0889381d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.255343][T17166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.263313][T17166] R13: 00007ffe1439e27f R14: 00007fc088938300 R15: 0000000000022000 05:52:40 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000250000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:40 executing program 5: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:40 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) [ 906.277824][T17187] blktrace: Concurrent blktraces are not allowed on sg0 05:52:40 executing program 3 (fault-call:2 fault-nth:99): r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:40 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000e00000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:40 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000003f0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:40 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:40 executing program 5: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:40 executing program 5: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:40 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000f00000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:40 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000400000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:40 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) [ 906.428031][T17207] FAULT_INJECTION: forcing a failure. [ 906.428031][T17207] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 906.441465][T17207] CPU: 1 PID: 17207 Comm: syz-executor.3 Not tainted 5.12.0-rc8-syzkaller #0 [ 906.450226][T17207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 906.460362][T17207] Call Trace: [ 906.463701][T17207] dump_stack+0x137/0x19d [ 906.468029][T17207] should_fail+0x23c/0x250 [ 906.472562][T17207] should_fail_usercopy+0x16/0x20 05:52:40 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:40 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) [ 906.477680][T17207] _copy_from_user+0x1c/0xd0 [ 906.482266][T17207] input_event_from_user+0x58/0x140 [ 906.487503][T17207] evdev_write+0x1b2/0x280 [ 906.491919][T17207] ? evdev_read+0x640/0x640 [ 906.496418][T17207] vfs_write+0x1f3/0x770 [ 906.500673][T17207] ? __fget_light+0x21b/0x260 [ 906.505344][T17207] ksys_write+0xce/0x180 [ 906.509709][T17207] ? fpregs_assert_state_consistent+0x7d/0x90 [ 906.515827][T17207] __x64_sys_write+0x3e/0x50 [ 906.520444][T17207] do_syscall_64+0x34/0x50 05:52:40 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f001000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 906.523522][T17225] blktrace: Concurrent blktraces are not allowed on sg0 [ 906.524884][T17207] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 906.537687][T17207] RIP: 0033:0x466459 [ 906.541570][T17207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.547171][T17225] blktrace: Concurrent blktraces are not allowed on sg0 [ 906.561289][T17207] RSP: 002b:00007fc088938188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 906.561310][T17207] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 906.561321][T17207] RDX: 0000000000035000 RSI: 0000000020000040 RDI: 0000000000000003 [ 906.561332][T17207] RBP: 00007fc0889381d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.578681][T17230] blktrace: Concurrent blktraces are not allowed on sg0 [ 906.584703][T17207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 906.584718][T17207] R13: 00007ffe1439e27f R14: 00007fc088938300 R15: 0000000000022000 05:52:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:41 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000480000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f001100000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:41 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:41 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) [ 906.848791][T17244] blktrace: Concurrent blktraces are not allowed on sg0 [ 906.862500][T17246] blktrace: Concurrent blktraces are not allowed on sg0 05:52:41 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000004c0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:41 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f001200000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 906.893284][T17244] blktrace: Concurrent blktraces are not allowed on sg0 05:52:41 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000680000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x18) 05:52:41 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f001800000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 906.964397][T17262] blktrace: Concurrent blktraces are not allowed on sg0 05:52:41 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000006c0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:41 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) [ 907.032445][T17272] blktrace: Concurrent blktraces are not allowed on sg0 [ 907.053464][T17272] blktrace: Concurrent blktraces are not allowed on sg0 05:52:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f001900000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:41 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000720000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35002) 05:52:41 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) [ 907.082574][T17284] blktrace: Concurrent blktraces are not allowed on sg0 05:52:41 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:41 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000730000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f002200000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:41 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) [ 907.182453][T17299] blktrace: Concurrent blktraces are not allowed on sg0 05:52:41 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000740000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:41 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:41 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000007a0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:41 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f002500000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35003) 05:52:41 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000ffffff8c0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 907.295015][T17318] blktrace: Concurrent blktraces are not allowed on sg0 05:52:41 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:41 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f002e00000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:41 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000a9c0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:41 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f004800000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 907.404830][T17341] blktrace: Concurrent blktraces are not allowed on sg0 05:52:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35004) 05:52:41 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:41 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000edc00000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f004c00000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:41 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:41 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000fffffff00000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 907.501868][T17359] blktrace: Concurrent blktraces are not allowed on sg0 05:52:41 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f006000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35005) 05:52:41 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x0, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:41 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000fffffff60000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 907.612585][T17378] blktrace: Concurrent blktraces are not allowed on sg0 05:52:41 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:41 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x0, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:41 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000fffffdf90000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f006800000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35008) 05:52:42 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x0, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:42 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000007fc0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 907.707037][T17396] blktrace: Concurrent blktraces are not allowed on sg0 05:52:42 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f006c00000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:42 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x0, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:42 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000fffffdfd0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 907.808815][T17417] blktrace: Concurrent blktraces are not allowed on sg0 05:52:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35010) 05:52:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f007400000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:42 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:42 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x0, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:42 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000fffffffe0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:42 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x0, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35011) 05:52:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f007700000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 907.933097][T17440] blktrace: Concurrent blktraces are not allowed on sg0 05:52:42 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000fff0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:42 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:42 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x0, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f007900000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:42 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000fffff7ff0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35012) 05:52:42 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) [ 908.049472][T17464] blktrace: Concurrent blktraces are not allowed on sg0 05:52:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f007a00000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:42 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000fffffbff0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:42 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000001fffff0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 908.125584][T17477] blktrace: Concurrent blktraces are not allowed on sg0 [ 908.135954][T17479] blktrace: Concurrent blktraces are not allowed on sg0 05:52:42 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x0, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35013) 05:52:42 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f007b00000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:42 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000e0ffff0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:42 executing program 1: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) [ 908.250792][T17497] blktrace: Concurrent blktraces are not allowed on sg0 [ 908.257833][T17493] blktrace: Concurrent blktraces are not allowed on sg0 05:52:42 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x0, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f007c00000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35014) 05:52:42 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000fff7ffff0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:42 executing program 1: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f007d00000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:42 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000fffbffff0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 908.373612][T17514] blktrace: Concurrent blktraces are not allowed on sg0 05:52:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35015) 05:52:42 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:42 executing program 1: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00b800000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35016) 05:52:42 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000f9fdffff0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:42 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) [ 908.487777][T17537] blktrace: Concurrent blktraces are not allowed on sg0 05:52:42 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 05:52:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00c200000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:42 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000fdfdffff0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:42 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 05:52:42 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x3501e) 05:52:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00c300000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 908.623965][T17555] blktrace: Concurrent blktraces are not allowed on sg0 05:52:43 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000007fffffff0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:43 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 05:52:43 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00c400000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:43 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000008cffffff0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:43 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x0, 0x4, 0x5, 0x8}) [ 908.751850][T17584] blktrace: Concurrent blktraces are not allowed on sg0 05:52:43 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:43 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x20035040) 05:52:43 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00c500000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:43 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000f0ffffff0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:43 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x0, 0x4, 0x5, 0x8}) 05:52:43 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00c600000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:43 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:43 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000f6ffffff0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:43 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x0, 0x4, 0x5, 0x8}) 05:52:43 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fe00000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:43 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000feffffff0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:43 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x0, 0x5, 0x8}) 05:52:43 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x0, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) [ 909.176946][T17641] blktrace: Concurrent blktraces are not allowed on sg0 05:52:44 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x7ffff000) 05:52:44 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000c0ed000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:44 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00ba01000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:44 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x0, 0x5, 0x8}) 05:52:44 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:44 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00bb01000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:44 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000010000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:44 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x0, 0x5, 0x8}) [ 910.309718][T17655] blktrace: Concurrent blktraces are not allowed on sg0 05:52:44 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x0, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:44 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000040000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:44 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x0, 0x8}) 05:52:44 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00d001000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 910.452699][T17680] blktrace: Concurrent blktraces are not allowed on sg0 05:52:45 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0xffffffffffffffff) 05:52:45 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:45 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000ffffffffffff070000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:45 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:45 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00d101000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:46 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000080000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:46 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00f801000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:46 executing program 3: poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x2331}, {0xffffffffffffffff, 0xc5a6}], 0x2, 0x6) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000080)=0x6) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) preadv(r0, &(0x7f0000000140), 0x0, 0x3f, 0x400) [ 911.721695][T17700] blktrace: Concurrent blktraces are not allowed on sg0 [ 911.747437][T17700] blktrace: Concurrent blktraces are not allowed on sg0 05:52:46 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000000c0000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:46 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000402000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 911.794706][T17712] blktrace: Concurrent blktraces are not allowed on sg0 05:52:46 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1, r1}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:46 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000ffffe00000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:46 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$evdev(0xffffffffffffffff, &(0x7f0000000000)=[{{}, 0x0, 0x0, 0x6}, {{0x77359400}, 0x12, 0x5, 0x8}], 0x30) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) [ 911.878480][T17728] blktrace: Concurrent blktraces are not allowed on sg0 05:52:46 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000100000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f002e02000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:46 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 911.940078][T17734] blktrace: Concurrent blktraces are not allowed on sg0 05:52:46 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:46 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x8c6d4000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000140)=""/4096) r2 = socket$inet(0x2, 0x1, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) write(r2, &(0x7f0000001140)="27b98919dd3b59bf8d420b70c0f5ddffd295a0037763be294976e186213adfc8f0e9a53a48e3836d74c8c8d220723424100a1a87bd58d597db4b360317cc50972734ac2ef58fa773f61875389ab3c70b3b08e26dba93d70d15add209f5303d00b0194b0d38f38a4043cfd5aa8f281fe2febeacd6401c0250b30e4e302a35a693bdf1afb63d245dbdc925c51ffc7486ae9650b9d2b4ec3b5b58a28c88bed5767b7b5ffda772491bd32fd578da21e92c057ed376d916d47e4f9f9f0ebf7bcbc4745b64a1b8d5d266893a09f1d529527d060a2a7d3d603bbd3e903819f9f236919826c52eb18114faa231ca4b124c91", 0xee) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:46 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000200000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 911.989473][T17750] blktrace: Concurrent blktraces are not allowed on sg0 05:52:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f002f02000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:46 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000040200000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:46 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000300)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1f, "94fb285800aecd"}) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000001300)={r1, 0xadb}) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x923bc1) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f0000000140)=""/176) write$char_usb(r2, &(0x7f0000000040)="e2", 0x35000) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000000000)=0xfffeffff) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000200)=""/209) 05:52:46 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1, r1}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:46 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f004402000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:46 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000300000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 912.151336][T17778] blktrace: Concurrent blktraces are not allowed on sg0 [ 912.158921][T17774] blktrace: Concurrent blktraces are not allowed on sg0 05:52:46 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1, r1}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:46 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1, r1}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:46 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000400000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f004502000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:46 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000500000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 912.282551][T17794] blktrace: Concurrent blktraces are not allowed on sg0 [ 912.296362][T17794] blktrace: Concurrent blktraces are not allowed on sg0 [ 912.303777][T17796] blktrace: Concurrent blktraces are not allowed on sg0 05:52:46 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1, r1}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:46 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1, r1}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000003000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:46 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000600000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:46 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1, r1}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) [ 912.442790][T17810] blktrace: Concurrent blktraces are not allowed on sg0 [ 912.450168][T17812] blktrace: Concurrent blktraces are not allowed on sg0 05:52:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f004703000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:46 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1, r1}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4, 0x5, 0x8}) 05:52:46 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000040600000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:46 executing program 1 (fault-call:5 fault-nth:0): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:46 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000700000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 912.577873][T17832] blktrace: Concurrent blktraces are not allowed on sg0 [ 912.596048][T17832] blktrace: Concurrent blktraces are not allowed on sg0 05:52:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000204000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 912.644486][T17840] FAULT_INJECTION: forcing a failure. [ 912.644486][T17840] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 912.658084][T17840] CPU: 1 PID: 17840 Comm: syz-executor.1 Not tainted 5.12.0-rc8-syzkaller #0 [ 912.666844][T17840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 912.676900][T17840] Call Trace: [ 912.680175][T17840] dump_stack+0x137/0x19d [ 912.684570][T17840] should_fail+0x23c/0x250 [ 912.689461][T17840] should_fail_usercopy+0x16/0x20 05:52:47 executing program 5 (fault-call:2 fault-nth:0): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:47 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000800000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 912.694502][T17840] _copy_from_user+0x1c/0xd0 [ 912.699087][T17840] blk_trace_setup+0x51/0x110 [ 912.703772][T17840] ? get_pid_task+0x8b/0xc0 [ 912.708277][T17840] sg_ioctl_common+0xa02/0x1790 [ 912.713248][T17840] ? do_vfs_ioctl+0x4f7/0xee0 [ 912.718886][T17840] sg_ioctl+0x54/0xc0 [ 912.722866][T17840] ? sg_poll+0x240/0x240 [ 912.727179][T17840] __se_sys_ioctl+0xcb/0x140 [ 912.732073][T17840] __x64_sys_ioctl+0x3f/0x50 [ 912.736709][T17840] do_syscall_64+0x34/0x50 05:52:47 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000900000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 912.741131][T17840] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 912.747054][T17840] RIP: 0033:0x466459 [ 912.750940][T17840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 912.770601][T17840] RSP: 002b:00007f875d847188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 912.779015][T17840] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 912.787010][T17840] RDX: 0000000020000040 RSI: 00000000c0481273 RDI: 0000000000000003 [ 912.794983][T17840] RBP: 00007f875d8471d0 R08: 0000000000000000 R09: 0000000000000000 [ 912.802991][T17840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 912.811312][T17840] R13: 00007ffdb464359f R14: 00007f875d847300 R15: 0000000000022000 [ 912.829400][T17849] FAULT_INJECTION: forcing a failure. [ 912.829400][T17849] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 912.842509][T17849] CPU: 0 PID: 17849 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 912.851839][T17849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 912.861894][T17849] Call Trace: [ 912.865196][T17849] dump_stack+0x137/0x19d [ 912.869526][T17849] should_fail+0x23c/0x250 [ 912.873947][T17849] should_fail_usercopy+0x16/0x20 [ 912.878999][T17849] _copy_from_user+0x1c/0xd0 [ 912.883636][T17849] blk_trace_setup+0x51/0x110 [ 912.888323][T17849] ? get_pid_task+0x8b/0xc0 [ 912.892880][T17849] sg_ioctl_common+0xa02/0x1790 [ 912.897724][T17849] ? do_vfs_ioctl+0x4f7/0xee0 [ 912.902392][T17849] sg_ioctl+0x54/0xc0 [ 912.906364][T17849] ? sg_poll+0x240/0x240 [ 912.910603][T17849] __se_sys_ioctl+0xcb/0x140 [ 912.915206][T17849] __x64_sys_ioctl+0x3f/0x50 [ 912.919853][T17849] do_syscall_64+0x34/0x50 [ 912.924298][T17849] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 912.930256][T17849] RIP: 0033:0x466459 [ 912.934404][T17849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 912.954010][T17849] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 912.962417][T17849] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 912.970393][T17849] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 912.978394][T17849] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 05:52:47 executing program 1 (fault-call:5 fault-nth:1): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:47 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000a00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:47 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000604000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:47 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000b00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 912.986972][T17849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 912.996948][T17849] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 [ 913.032677][T17860] blktrace: Concurrent blktraces are not allowed on sg0 [ 913.047235][T17860] FAULT_INJECTION: forcing a failure. [ 913.047235][T17860] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 913.060348][T17860] CPU: 0 PID: 17860 Comm: syz-executor.1 Not tainted 5.12.0-rc8-syzkaller #0 [ 913.069176][T17860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 913.079234][T17860] Call Trace: [ 913.082514][T17860] dump_stack+0x137/0x19d [ 913.086845][T17860] should_fail+0x23c/0x250 [ 913.091262][T17860] should_fail_usercopy+0x16/0x20 [ 913.096459][T17860] _copy_to_user+0x1c/0x90 [ 913.100916][T17860] simple_read_from_buffer+0xab/0x120 [ 913.106293][T17860] proc_fail_nth_read+0xf6/0x140 [ 913.111287][T17860] ? rw_verify_area+0x136/0x250 [ 913.116157][T17860] ? proc_fault_inject_write+0x200/0x200 [ 913.121893][T17860] vfs_read+0x154/0x5d0 [ 913.126056][T17860] ? copy_fpregs_to_fpstate+0xd8/0x110 [ 913.131528][T17860] ? __fget_light+0x21b/0x260 [ 913.136226][T17860] ? __cond_resched+0x11/0x40 [ 913.140904][T17860] ksys_read+0xce/0x180 [ 913.145104][T17860] __x64_sys_read+0x3e/0x50 [ 913.149699][T17860] do_syscall_64+0x34/0x50 [ 913.154144][T17860] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 913.160204][T17860] RIP: 0033:0x4191dc [ 913.164092][T17860] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 913.184363][T17860] RSP: 002b:00007f875d847170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 05:52:47 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000c00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:47 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f001004000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 913.192937][T17860] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00000000004191dc [ 913.201007][T17860] RDX: 000000000000000f RSI: 00007f875d8471e0 RDI: 0000000000000005 [ 913.209082][T17860] RBP: 00007f875d8471d0 R08: 0000000000000000 R09: 0000000000000000 [ 913.217075][T17860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 913.225048][T17860] R13: 00007ffdb464359f R14: 00007f875d847300 R15: 0000000000022000 05:52:47 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:47 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000d00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:47 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 913.302808][T17877] blktrace: Concurrent blktraces are not allowed on sg0 05:52:47 executing program 5 (fault-call:2 fault-nth:1): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:47 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000005000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:47 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000e00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:47 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x1267, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 913.500010][T17895] FAULT_INJECTION: forcing a failure. [ 913.500010][T17895] name failslab, interval 1, probability 0, space 0, times 0 [ 913.512644][T17895] CPU: 1 PID: 17895 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 913.522300][T17895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 913.532355][T17895] Call Trace: [ 913.536406][T17895] dump_stack+0x137/0x19d [ 913.540741][T17895] should_fail+0x23c/0x250 [ 913.545167][T17895] __should_failslab+0x81/0x90 [ 913.549934][T17895] ? do_blk_trace_setup+0xdd/0x510 [ 913.555048][T17895] should_failslab+0x5/0x20 [ 913.559553][T17895] kmem_cache_alloc_trace+0x49/0x320 [ 913.564918][T17895] ? strncpy+0x134/0x150 [ 913.569194][T17895] do_blk_trace_setup+0xdd/0x510 [ 913.574215][T17895] blk_trace_setup+0x85/0x110 [ 913.578888][T17895] sg_ioctl_common+0xa02/0x1790 [ 913.583739][T17895] ? do_vfs_ioctl+0x4f7/0xee0 [ 913.588417][T17895] sg_ioctl+0x54/0xc0 [ 913.592400][T17895] ? sg_poll+0x240/0x240 [ 913.596760][T17895] __se_sys_ioctl+0xcb/0x140 [ 913.601445][T17895] __x64_sys_ioctl+0x3f/0x50 [ 913.606032][T17895] do_syscall_64+0x34/0x50 [ 913.610487][T17895] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 913.616374][T17895] RIP: 0033:0x466459 [ 913.620261][T17895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 913.639865][T17895] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:52:47 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x1274, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:47 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000006000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:47 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000f00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 913.648329][T17895] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 913.656297][T17895] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 913.665693][T17895] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 913.673661][T17895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 913.681632][T17895] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:48 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000001000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:48 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x1275, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000406000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:48 executing program 5 (fault-call:2 fault-nth:2): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:48 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x1276, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:48 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000001100000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000007000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 913.859703][T17938] FAULT_INJECTION: forcing a failure. [ 913.859703][T17938] name failslab, interval 1, probability 0, space 0, times 0 [ 913.872443][T17938] CPU: 0 PID: 17938 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 913.881222][T17938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 913.891280][T17938] Call Trace: [ 913.894554][T17938] dump_stack+0x137/0x19d [ 913.898935][T17938] should_fail+0x23c/0x250 [ 913.903370][T17938] ? __d_alloc+0x36/0x370 [ 913.907704][T17938] __should_failslab+0x81/0x90 [ 913.912489][T17938] should_failslab+0x5/0x20 [ 913.916993][T17938] kmem_cache_alloc+0x46/0x300 [ 913.921759][T17938] __d_alloc+0x36/0x370 [ 913.925941][T17938] ? avc_has_perm_noaudit+0x19a/0x240 [ 913.931338][T17938] d_alloc+0x2a/0x130 [ 913.935317][T17938] d_alloc_parallel+0x46/0xba0 [ 913.940134][T17938] ? selinux_inode_permission+0x2ca/0x430 [ 913.945975][T17938] ? selinux_inode_permission+0x350/0x430 [ 913.951696][T17938] ? security_inode_permission+0xab/0xc0 [ 913.957330][T17938] ? __d_lookup+0x3c8/0x400 [ 913.961837][T17938] __lookup_slow+0x7f/0x280 [ 913.966350][T17938] lookup_one_len+0xd0/0x180 [ 913.970946][T17938] start_creating+0x137/0x250 [ 913.975642][T17938] debugfs_create_dir+0x21/0x2f0 [ 913.980588][T17938] do_blk_trace_setup+0x1de/0x510 [ 913.985700][T17938] blk_trace_setup+0x85/0x110 [ 913.990510][T17938] sg_ioctl_common+0xa02/0x1790 [ 913.995364][T17938] ? do_vfs_ioctl+0x4f7/0xee0 [ 914.000041][T17938] sg_ioctl+0x54/0xc0 [ 914.004023][T17938] ? sg_poll+0x240/0x240 [ 914.008268][T17938] __se_sys_ioctl+0xcb/0x140 [ 914.012859][T17938] __x64_sys_ioctl+0x3f/0x50 [ 914.017462][T17938] do_syscall_64+0x34/0x50 [ 914.021886][T17938] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 914.027789][T17938] RIP: 0033:0x466459 [ 914.031679][T17938] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 914.051287][T17938] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:52:48 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2201, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:48 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000001200000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000009000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001100110468fe070061f547769827a46f02f08ab10f0a00010000000004001a000a00030014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00', r0) sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xd0, r2, 0x904, 0x70bd2c, 0x25dfdbfb, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x1}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4000000}, 0x5) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, r2, 0xd10227d82587abfc, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x40200d1) r3 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x800002, 0xc32381) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0xea60}, 0x17, 0x7c, 0x2}], 0x18) write$char_usb(r3, &(0x7f0000000040)="e2", 0x35000) 05:52:48 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000001800000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 914.059704][T17938] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 914.067733][T17938] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 914.075760][T17938] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 914.083730][T17938] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 914.091729][T17938] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 [ 914.099777][T17938] blktrace: debugfs_dir not present for sg0 so skipping 05:52:48 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2202, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000a000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:48 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000001900000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 914.146067][T17955] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.3'. 05:52:48 executing program 5 (fault-call:2 fault-nth:3): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:48 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2203, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:48 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x11, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:48 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000002000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000b000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:48 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2205, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 914.287118][T17981] FAULT_INJECTION: forcing a failure. [ 914.287118][T17981] name failslab, interval 1, probability 0, space 0, times 0 [ 914.299762][T17981] CPU: 0 PID: 17981 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 914.308520][T17981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 914.318575][T17981] Call Trace: [ 914.321859][T17981] dump_stack+0x137/0x19d [ 914.326278][T17981] should_fail+0x23c/0x250 [ 914.330690][T17981] ? new_inode_pseudo+0x5c/0x1c0 05:52:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000c000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 914.336313][T17981] __should_failslab+0x81/0x90 [ 914.341156][T17981] should_failslab+0x5/0x20 [ 914.345725][T17981] kmem_cache_alloc+0x46/0x300 [ 914.350486][T17981] new_inode_pseudo+0x5c/0x1c0 [ 914.355351][T17981] new_inode+0x21/0x120 [ 914.359502][T17981] debugfs_create_dir+0xbd/0x2f0 [ 914.364475][T17981] do_blk_trace_setup+0x1de/0x510 [ 914.369765][T17981] blk_trace_setup+0x85/0x110 [ 914.376710][T17981] sg_ioctl_common+0xa02/0x1790 [ 914.381733][T17981] ? do_vfs_ioctl+0x4f7/0xee0 05:52:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000d000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 914.386490][T17981] sg_ioctl+0x54/0xc0 [ 914.390499][T17981] ? sg_poll+0x240/0x240 [ 914.395058][T17981] __se_sys_ioctl+0xcb/0x140 [ 914.399649][T17981] __x64_sys_ioctl+0x3f/0x50 [ 914.404414][T17981] do_syscall_64+0x34/0x50 [ 914.408840][T17981] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 914.414794][T17981] RIP: 0033:0x466459 [ 914.418685][T17981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 914.438858][T17981] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 914.447373][T17981] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 914.455345][T17981] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 914.463313][T17981] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 914.471283][T17981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 914.479334][T17981] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000e000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:48 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000102000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:48 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000000)=0x6) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1f, 0x79, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) [ 914.487351][T17981] debugfs: out of free dentries, can not create directory 'sg0' [ 914.499852][T17981] blktrace: debugfs_dir not present for sg0 so skipping 05:52:48 executing program 5 (fault-call:2 fault-nth:4): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:48 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000002200000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 914.582323][T18019] FAULT_INJECTION: forcing a failure. [ 914.582323][T18019] name failslab, interval 1, probability 0, space 0, times 0 [ 914.603065][T18019] CPU: 1 PID: 18019 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 914.611906][T18019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 914.622140][T18019] Call Trace: [ 914.625455][T18019] dump_stack+0x137/0x19d [ 914.629859][T18019] should_fail+0x23c/0x250 [ 914.634272][T18019] ? security_inode_alloc+0x30/0x180 [ 914.639635][T18019] __should_failslab+0x81/0x90 [ 914.644403][T18019] should_failslab+0x5/0x20 [ 914.648960][T18019] kmem_cache_alloc+0x46/0x300 [ 914.654002][T18019] security_inode_alloc+0x30/0x180 [ 914.659110][T18019] inode_init_always+0x20b/0x420 [ 914.664061][T18019] new_inode_pseudo+0x73/0x1c0 [ 914.668897][T18019] new_inode+0x21/0x120 [ 914.674993][T18019] debugfs_create_dir+0xbd/0x2f0 [ 914.679994][T18019] do_blk_trace_setup+0x1de/0x510 [ 914.685071][T18019] blk_trace_setup+0x85/0x110 [ 914.689751][T18019] sg_ioctl_common+0xa02/0x1790 [ 914.694607][T18019] ? do_vfs_ioctl+0x4f7/0xee0 [ 914.699283][T18019] sg_ioctl+0x54/0xc0 [ 914.703269][T18019] ? sg_poll+0x240/0x240 [ 914.707507][T18019] __se_sys_ioctl+0xcb/0x140 [ 914.712097][T18019] __x64_sys_ioctl+0x3f/0x50 [ 914.716872][T18019] do_syscall_64+0x34/0x50 [ 914.721319][T18019] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 914.727257][T18019] RIP: 0033:0x466459 [ 914.734271][T18019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 914.743516][T18033] loop3: detected capacity change from 0 to 4096 [ 914.754105][T18019] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 914.754126][T18019] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 05:52:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000f000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:48 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0xe400, 0x8, &(0x7f00000016c0)=[{&(0x7f0000000200)="824955d32880214a20f4fec3889b29a34edeb264cfda99ddf89b91fe65866a919be9598d489c09348e2ec4c4171300ceda520de874c278815ae129ec52723ab04f93f547f14567ace2518edf1c301043ec79bce05ca5b376e02ea74a9df4fe8ea539f6a7f7904b4bb052ca6d3326bed5122d09d378e673677c31770d2de2b7805917808ab989", 0x86, 0xd2b5}, {&(0x7f00000002c0)="d48816ba70fa96dfd23dabad5ca8cfd59e587b2e2f06189c722eabc80902c928a91b68dbd7d8f3400cae96e2a8f0eb798a9d436f9c3e7ce9f4b8f9d203487ac767dd3428ec0aec62cec9404fcbe22f9ea7f8fb0afa835b8fa39e3572fe23be7b7b1357e70151d1f2c34ed94dfc", 0x6d}, {&(0x7f0000000340)="b1e72de3ccd9adeda02458ee252737b384463e6bf7eb364916a2e9c2adde5bee43888aaa831fff93f2b58a2dfdf6a979e83d4d8f68e528fd93e6a341e8cd81bbb216cf89dc96d7ec3b60523afed98eec0123c2904cb28e3408", 0x59, 0x52e}, {&(0x7f00000003c0)="f145cf9e3faf86bab0d41b3725f3769a8634cd3144935810af61a517a36d77c9d0e43960a31d868d6f3486a1643551a96be245ce00482912f304278c48c47066346ffa0abe2c3ef7d9f18d46d329f94cd9596bedbe43ee5d6ed07c334ec0470533694b1b76bf8d26d0267b5953d7558739d138905dc96a83da6820be271a7c10d11eda1405766c977326219657d7e116ecd56b55b4220c539bc20c01b35993ed4729d17fd5364c09d02d30c66cd87275a2d94fafbc9bb45221af54a967b4cb200542293304ea07b1374426129d645bf893f2ad598b5f294dc2471a88b36c73", 0xdf, 0x1f}, {&(0x7f00000004c0)="8208feef96d2a24c73977d44d4d4c2e29b90d2020f0d4b43b68e103b295dac682f523f6ee1ab8a097b82443524a94121a3096163d42f2704c84bf9e54445623363bd4a1ad91cefd2abfad08cd2ddced620657c77e6cce234fbf9c262fe108b168bafe48332fb3a5094dcb997ffbcbae431d09984d61e74aa9fa4c79f147c19018b78a4f419c227c337aa7779fe2e3fe63d51b034e30f728fe2f0240f8298bdd858637fdb2f21b05be20fc98870ae464236cca150c65df07e881b81345eb6ec35fdb72ae7d88b4dd3", 0xc8, 0x101}, {&(0x7f00000005c0)="6e709f63aa555b6a5bd221b305167cb9fee47c9572a02eeecf8379fee61aa558303f300c21c0eb9b32271f58ae1da5c8d59f018a053d653c8692d3430377bf43d4a358a07eff86194c456be5f82db008c3c78586554cb73ba2c55951cc476e160ead2db26936348d9a82d727da336e1f9ab2db4b117cb76dae74f7782ae8a31c303e05ccefec78ae41d1bcc7323009d5faf469", 0x93, 0x1000000000000}, {&(0x7f0000000680)="18612af12bb6f63144db2c95647bf84785766bb94c08bf784db9fbdf6cd50b336d8dc86330904861908cf8a7710a1a9785bbaf1bc3f2146934b9de7228be2457abaab1dc7ff0c79f9f88e5cadd1a88b4afa62033c3137579bfaac9d7f4093f774d145b0679eb79a71f91803d46113673b5ecf2eb0ec7c477b8328e2da2eb30ea1e88f0e4dabd0b961182724cc9e488f06b7e8ecb7ac69708ed37adc00787dc426502b967d5d7525b1df2848f0e06680a900c48ec749a0f3013f3a25f68fc01079a4a4e605c6c2f3a517552f965d5c944597d7eb33c204b920e62ca273af40d365128f6b539236648bf8ab470f3f54cecd1f36bac1a1fd5d76f3c5f0f2c86a5918a15cc99a7fc0377c44d450091e9b1541781907d319997a2bc4e56aeda99a0a189a71a741bafdcee9f518247d9521a5195a0f085ad4b6965506337f277fdddf8655cdb14983bd9e14b69b4d8348bbd35e2c23661c00322c2daf01dc1837419446e94d7f0cd48e994ee6a496e9e931dbc904e9fd4ab6e043ccfe3c82ab4bf1064b29c2a449c43aad4e948147e51b16dc8a8f6e15463b5ec2c476d65821651553736adb45a6dca8df4f86bc0c8423be6922f9b007192bcafdea8f0ed7a4fc12e2f2c56a0b65c14feba866f5dfd3289b0071d16044c44d802a2db7f64227ddfd4b05ffed6aff36d2d6c52f9fefc4f5a4dbc54f6f1cb543bad6b8525c63a02c739506490373f4f73bf53d7f556ac54976c9dbe3a1d8f612d8259c37c89e8c5eb3b7d9b86989e2a5e4c01d9f0dbf130b1c17ad5f7c7b527f6fbed6b56bf30bcd0ca453939bc20c4b3185951c91179c434c510296f31d60801b4e370beea62602bf6d6960db46118b635669d0686823c7cbc9fbbda4d23f88cc0364dea49b643aac68b4959b2d064f3cf95c9c78a3935cf57962062b8ee36b0acdf8dc7bb3d3d7508197359d261442b548cb52c37429c9e0604dd56e1786ee3434d9ec243b5d281b333a78aa2795c0b64cf6f282e348c8535e31c1f42af7e218bb7ec149c00e96374ce8f0efbde094f6f14244dcc2d0605cf3f2eedca50768a761ba400ba05842b9db3be0d5dc6a2a796cb5e0ab4d4416bd1c95cac7cabda5fa3d3477955bfa8569e07e80c9a79fc9167d4ce1576eebe8f3094fb1a39d5bf75f15b64a31816e53ee812a3cbad00d88e3ebb771fc7b32508bd9b38a5e5d73f9a8b8796b1d83e006ac64f25f508d9d20c787931b6be7b4c12800d58278ae5fbaf59f1b4f3b5601bdd1e4646d64f69d3d57a6088d03123085efb5c2b3adf5f1bce5820f800ba023713c7bdf2fb7650291092f848429fefc8fbaaebdca9bb936566ed2e7cd2eebbb7b6e37499b447aec0577732b7e830e148ef3e4482465f4de8604833b33853e2f39deae87f4663def228f574ff0193edb2572c1cc571625f93f67bb68189d0e37f5b3c06ede348381a037f6f8765c9fc416abecc4ebf7ff08252863ebc4c8503966f9afd1ffd63d9bfd9192942a5778849585dbc1dec59de52ff3342543338f3cd923f8f93d1c92c43ede2445562a0677032fa3c089497023c86f9c4e13e5aca7a5e59212b6fe5354bffee627ced5e2dd66c07848943856a0654653cf5ba9f846688901b93f1c6b54448b132e290e4e612dd58f33e0e8c7660cfc2e6b74800edf3d2a33596e85aa3123328aaea0a7a7f37fc23f12c24d27f51ddf303b632a5001bbed241f9900bd34a9acd8a3403542a3773559e4ee7d8403a808ec51c019e748c0f7a889d3417c340b7f611fb3e7289b14b330a4a37359a8e9f08833cba3ed163bb709f7598d2a78ae88331e2b9cb6d8185601a5dcf5bb61b5d501e31ca1a9b7ef59e6557f039dbfce622f667ea801189cb53b61c61ace1fa4b90053edea560ebbd27edca19ca622dc113588f20613ef89dd26e7d5e2140b7b90886440f6824920de5b94a665a3aaad25158cf95139b354c28b5cea71ac094eed235dcd2ac06847473f09024bc82fc6d2934526ba95d14961d8b36ccc6852a35a315d5faa6ca24faeffbbfeb0f65059e8b3a057efb26f6b16ddcda7bc09a3e9ebbbe5cc2487ae9fd4b49e735fda48bca5624b975aef2129bcb2b6884760682a38b827ee963700855b99c759d50ac15b5e117954d24a6d3876ca6c27c94339299d8ee12b640a99c79082606c0885eaa219851c6dcaa07cd0ea64d49312b370d77160003d074822364fafacea57d1c0e9290070662ac638bbd3920acb63e213c441ad52fbacc74ae73b4d2fd803f9f0af0bf8f06d2cc57b717d9ec5e2d795e59a97895e16003e09a35a4c051c5963b43362890ec0d0caa8f50da3478ca56dc8d30110da45499aa0bd04a48b23180da99ad1815da535af55fe13191dce9020f822faf7d678a5e76f05326b05c00f909730d79f877766117fd1f37f78f57ee4bebff636c78604876854fd3994bc0b00b992c0037abbaf01ee6f181d58c6da004f9f1074bdf58fa147aa2b75f1c2e39ba4f34d56d1263cf754d6049f8aa0114b07bd89b9860953b187877bd028f1d1fa766ba43c2f98c3578a5c06b354ad840da3b9d244f846bdcc6c59f4fa0de540475d1db024b0358fbacf6780349e1a7e5b89d9d57ac09a5d739730545d655c37a7fd932561513a1447ebfe27efe0a321ace3f1273fc4a45a4301328b74f8431d40346ddda5b4eadcd8565fb4f018fac7cb19993555a5a06a88b9f2db63125b2a552c3af2779f7246522765e8667aa5f127b2529b357f380b445b287cffcaba74c30d096873f9ec8c95714c2c1a30e7e40b0c27c94bd08e09af425e3d9825de991991e3d5732018cfc7dc3ad05a140668045fa6c61dd0a58c174935ae112f949ef9c7222255ab688b60eab972eee2be2b464eff249ab68b92ef4703c5b09e3b9661a4f0712a1165cbb32c9e653987d50b75e4521799f8541061e76f10a526a487dcba492c2dec4325eef6191cab724545b87195d5d813567c80301b01578e73253fb6d7eb5edf92d4babc0dfac0852e9f60c18b12168cc544be0f8c80884bf9291c4f0d7643ad9f54c713eb9760080b068e27b5dddde2cc330f0e95ff51ea60dc98b44299b5bbd07693348d94d62e763d3e196dd855633c49814962a3184e7eaff1c6be5b9ba2ac0d86c5d8c732d292406a6d9492b69a0a1a8638cb8831369a5b983e7eb0c80cb158a2945ff18524cb4c61fca2f4bfb869b36074d0df6b8d3c1411af313813c30644d2056c4ecbefcfb5872cc229f8ce514ffa661d2488bee25ec277268ebc121c9d12b14a734ea60d2045219b3738b015ed240819c7f9f582e5b508a455924597660ed0ff8c697bf0b4c76bcacdda136be47d89219f0e6e65e0eaabbeeca70e505dc15634ba8bf79fbe2cfd4091615823545c4227ee13c2572905dc75c741af401cdf0a164fd535dff6ccc611426e8a6b5bb11118e5a545484253abd7ea8e136276f2769eda8d6c58cc566299cd5a4009540dc398eafa32562e3ac13edf399f8774357f714283bb701b83e2fdfe203ffcef0eb9514dbf85efe274d83b4a47a176d260e5fdcba12c0e65753173c46678674a02a57fb313d04f10689cef1a84320ecbdac66d474a018e63c6743a66a75bde5aa00a725c09766492b290854613d55ae6b1368237657092fd6afa30626f3a1bcbef60eed2a92d4f26b228f70e57518fedb96ee873ec005d97456bcec22637d1aeaf348f10bbfe0afa7bf99e2069429edccf370c0071cc99ac3fe9d059a332913f94d52bf548c79e01632d6e6aa2c713e670fab76165f8cdcd0d57f40fbfa5cfa2043e1abb6689bdacb115e23f2eb1a04a51ca3db467fa9b00c3f971b00de48fe2b70d87e659009198733e4de89cfd14c4001bce696028c1c6ffb5e3555bfed43583c200099e7ce48c5a9159319bbf84b3f2fa50b145ca8c7e0a3aa6192d03d475e106e54fb601f89719c7db298036ef0a7e803a55e18a1d7d39d675448dc07b80154d797595c8a1702a84dfc6094359551078d1b52eabb6cf0057233bd02dffe12f8ccec36dffcc3b3bd9ab086f2092ce603f6263f76469a113552da6c6c104e0629a3e43f118247f367693e2953c8ca3b40b834af07ba392174e1396feba928932ec5b94bf642b5c2356688c6bcfcfb3e0df586a9b45f7e322fe54972ac8b447fe9ac2b156e8ee82d5b1bd9655570bce82f3ba8437673e85088be3cc529aa61dd373694c22cddb75ac72d628be5e324148fbb813edf8bece85b3cfbf30c051711637f9e23bb751d793658d25049c1bb34f9a11d53f7e73b1427bd3c7bc071b35d50bdff6069e1ce029e225342c8f8ac6ec7fd172bc0ede5ef9b3852569899afcde176b348847b8483e68a5aed40544b10f969ffd3105d435532882f005f632681e71b6913b1e8e3ba73b917add46f060d71d586fef6c65316caf9e1170d66a9563dff276444684d23e026fb1d8c59cefb6cfe188557f7bfae370ed4b3e63872cbe36679cb1551e66229c84377c49a143cfc523b1054251864653b8d7c6878bbf14dfb1f197da7caa1c19fcbbf8bab67da6d70ebec1b48023fe9473e3de2705baf3020466723261ba7ea6ac5d0ee1676544ef73db18cc7a1b6f8cdc895b5f8dd71664e100db7bfa21ebf42e728644a6c27bcd995feaf9845f3f87654cdac44e1fe16a55886efd1b24d734bb02796c416d0012c047f0919ed0d9ab922318ac6231c474663a734da7518d479c22228e5dab18ac80db6d5a0ea80e11cdf1adb83ad8830f903e7a15823ec6bc5a1eaf9aba25526f230c5bc79c88764d54be7ea1ccd177bc5d0e71e8038ef937c91e486fe0d925ae25d40061b3bea8b346fd725455a23d20357740f6efa67fb346f69e97c8a7a58ffb963878241ebd55d864556c3ad0d09e8891b0c18d8d5ff16c27f85945fbfe8743a965f18b800f39c0c38cfdab1907e52affc6e623b6aa828719105adac9c6864d04e215d488f8823d9b17917aaa51a074333f34289d61d80938492b037ea67edf8c56d35f2d10409b594b3a9c955d3e7ef048c98c5a10ed2dca93e682c103abee8cefad8223b0bb010dad1f7a24e0695ef305dc174b43bfd450715afdab3d8c884423320c3d155cf6dce2740f63e3028ebc92bf31a20d9b46c29db97b7a72a4e4dfacfdd6d4baaa741625bad08f31326529aa68a7b67a9b81713e0978b951492f191d5046fd328e6d32a7e36ccef090d2be1bb8b9f2275e522af2c7155538cd2d667d252c32def2a34cfcc0ffd7196c1126a4b6a3cb5a5ed0b5bb45dd01ee28fe780e1602ea2cfe02dd0e52eea9dbe0fd97fffac3b9826eeb998919ed51d8e97d706f42d1072787ddb57ca78789002e130e69f08c07158cb9a9e4b8e54a6f8551798580ca7ee12aafcfcfd4ea284e68606766c37d6b371cfc841401a8337c5bfd30a4c8fd7afe84d0fbf1a99185d3181250cf5157f0ca6d081fff1484cf04544477bf7fe776c820392fa00f2214102e9d63c02d53f82143df7d1199467b318c6269b6171e612972d82186ebc95ce4c82d43ccc822ae1975bcfd727727e092017a55cb393981520cceaa2da04b4d2db783a256b4a1c444cea09fb1058e756b716c40082a60b813f55fffe33d9fa864d8fba78c0f53e2ff291152e7a6f642464c686cfe414f1a18af0d5f67781744be4b27705001a50c21f60c5b4cef3c1447f1c50df9a3a97c6cd95c6deddecc1a821e60be675ef950ca6e7e7c4d455f2d18fbb44b768e0f496cfde10f162f89c5d8e817124b031e2a605d52a82905c0d8af9211c668e2437ca4f7d07981bf1ab018a75bc426c", 0x1000, 0x7}, {&(0x7f0000001680)="6cc73681c202d0476a3da508307f82fb169bee66", 0x14, 0x5}], 0x8c808, &(0x7f0000001780)={[{@huge_always='huge=always'}, {@huge_always='huge=always'}, {@uid={'uid', 0x3d, 0xee01}}, {@huge_never='huge=never'}, {@mpol={'mpol', 0x3d, {'interleave', '=relative', @void}}}, {@huge_always='huge=always'}, {@nr_blocks={'nr_blocks', 0x3d, [0x6d]}}, {@huge_never='huge=never'}], [{@appraise_type='appraise_type=imasig'}, {@subj_type={'subj_type'}}, {@dont_hash='dont_hash'}, {@smackfshat={'smackfshat', 0x3d, '{{)}:-{-(.+++,'}}, {@seclabel='seclabel'}, {@obj_user={'obj_user', 0x3d, '/-\''}}, {@subj_type={'subj_type', 0x3d, '@'}}, {@fsname={'fsname', 0x3d, '.:D]$\\\xe2/-$('}}, {@dont_measure='dont_measure'}, {@audit='audit'}]}) mknodat$loop(r1, &(0x7f00000018c0)='./file0\x00', 0x4, 0x1) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000140)={0xb37, {{0x2, 0x4e21, @loopback}}}, 0x88) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r2, &(0x7f0000000040)="e2", 0x35000) 05:52:48 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000002500000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:49 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000003f00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:49 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2270, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:49 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000004000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 914.754137][T18019] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 914.754147][T18019] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 914.754159][T18019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 914.754169][T18019] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 [ 914.814523][T18019] debugfs: out of free dentries, can not create directory 'sg0' 05:52:49 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000410000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:49 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2271, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:49 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000004800000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 914.875340][T18030] loop3: detected capacity change from 0 to 4096 05:52:49 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000000)=0x1) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000140)=""/153) 05:52:49 executing program 5 (fault-call:2 fault-nth:5): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:49 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f002010000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:49 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2272, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:49 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000004c00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:49 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x5, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x11, 0x7c, 0x1}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet(0x2, 0x5, 0x8000) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000000)={0x2, 0x10, 0x8c, 0x2, "41cfc5dc8913febc42192ee25acb5cbaeb6b6d42b41e74beff534ea8a3dc05c4"}) [ 915.255602][T18019] blktrace: debugfs_dir not present for sg0 so skipping [ 915.313488][T18080] FAULT_INJECTION: forcing a failure. [ 915.313488][T18080] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 915.326744][T18080] CPU: 1 PID: 18080 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 915.335507][T18080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 915.345913][T18080] Call Trace: [ 915.349215][T18080] dump_stack+0x137/0x19d [ 915.353544][T18080] should_fail+0x23c/0x250 [ 915.357957][T18080] __alloc_pages_nodemask+0xe7/0x310 [ 915.363263][T18080] alloc_pages_current+0x21d/0x310 [ 915.368374][T18080] __get_free_pages+0x8/0x30 [ 915.373016][T18080] inode_doinit_with_dentry+0x63d/0x940 [ 915.379032][T18080] selinux_d_instantiate+0x23/0x30 [ 915.384148][T18080] security_d_instantiate+0x87/0xb0 [ 915.389341][T18080] d_instantiate+0x36/0x90 [ 915.393760][T18080] debugfs_create_dir+0x186/0x2f0 [ 915.398787][T18080] do_blk_trace_setup+0x1de/0x510 [ 915.403816][T18080] blk_trace_setup+0x85/0x110 [ 915.408569][T18080] sg_ioctl_common+0xa02/0x1790 [ 915.413426][T18080] ? do_vfs_ioctl+0x4f7/0xee0 [ 915.418099][T18080] sg_ioctl+0x54/0xc0 [ 915.422154][T18080] ? sg_poll+0x240/0x240 [ 915.426391][T18080] __se_sys_ioctl+0xcb/0x140 [ 915.430986][T18080] __x64_sys_ioctl+0x3f/0x50 [ 915.435574][T18080] do_syscall_64+0x34/0x50 [ 915.440074][T18080] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 915.445999][T18080] RIP: 0033:0x466459 05:52:49 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2275, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:49 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000006800000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 915.449884][T18080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 915.469580][T18080] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 915.478000][T18080] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 915.486756][T18080] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 915.498895][T18080] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 05:52:49 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000006c00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:49 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2276, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:49 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000011000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 915.506870][T18080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 915.514841][T18080] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10010, r0, 0x47aa8000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r2, &(0x7f0000000040)="e2", 0x35000) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r1, 0xf50f, 0x0) 05:52:49 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000007200000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:50 executing program 5 (fault-call:2 fault-nth:6): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000012000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:50 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2279, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:50 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000007300000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:50 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000080)=[{{0x0, 0xea60}, 0x0, 0x7b, 0x2}], 0x18) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/92, 0x5c}, {&(0x7f00000001c0)=""/206, 0xce}], 0x2, 0xff, 0xfffffffa) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet(0x2, 0x1, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) recvmmsg(r3, 0x0, 0x0, 0x0, 0x0) dup3(r3, r1, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @broadcast}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast1}, 'sit0\x00'}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000340)=""/151) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r4 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@nfc, &(0x7f0000000100)=0x80, 0x800) dup2(r0, r4) [ 915.743590][T18133] FAULT_INJECTION: forcing a failure. [ 915.743590][T18133] name failslab, interval 1, probability 0, space 0, times 0 [ 915.756259][T18133] CPU: 0 PID: 18133 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 915.765017][T18133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 915.765066][T18133] Call Trace: [ 915.765074][T18133] dump_stack+0x137/0x19d [ 915.765095][T18133] should_fail+0x23c/0x250 [ 915.765111][T18133] ? __d_alloc+0x36/0x370 [ 915.765130][T18133] __should_failslab+0x81/0x90 [ 915.765149][T18133] should_failslab+0x5/0x20 [ 915.800699][T18133] kmem_cache_alloc+0x46/0x300 [ 915.805469][T18133] __d_alloc+0x36/0x370 [ 915.809629][T18133] ? avc_has_perm_noaudit+0x19a/0x240 [ 915.815005][T18133] d_alloc+0x2a/0x130 [ 915.819029][T18133] d_alloc_parallel+0x46/0xba0 [ 915.823811][T18133] ? selinux_inode_permission+0x2ca/0x430 [ 915.829537][T18133] ? selinux_inode_permission+0x350/0x430 [ 915.835267][T18133] ? security_inode_permission+0xab/0xc0 [ 915.845937][T18133] ? __d_lookup+0x3c8/0x400 [ 915.850447][T18133] __lookup_slow+0x7f/0x280 [ 915.855002][T18133] lookup_one_len+0xd0/0x180 [ 915.859599][T18133] start_creating+0x137/0x250 [ 915.864319][T18133] __debugfs_create_file+0x74/0x360 [ 915.869521][T18133] ? up_write+0x25/0xc0 [ 915.873690][T18133] debugfs_create_file+0x45/0x50 [ 915.878638][T18133] do_blk_trace_setup+0x2a5/0x510 [ 915.883670][T18133] blk_trace_setup+0x85/0x110 [ 915.888405][T18133] sg_ioctl_common+0xa02/0x1790 [ 915.893271][T18133] ? do_vfs_ioctl+0x4f7/0xee0 [ 915.897949][T18133] sg_ioctl+0x54/0xc0 [ 915.901939][T18133] ? sg_poll+0x240/0x240 [ 915.906191][T18133] __se_sys_ioctl+0xcb/0x140 [ 915.910785][T18133] __x64_sys_ioctl+0x3f/0x50 [ 915.915437][T18133] do_syscall_64+0x34/0x50 [ 915.919859][T18133] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 915.925798][T18133] RIP: 0033:0x466459 [ 915.929709][T18133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 915.949323][T18133] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 915.957837][T18133] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 915.965809][T18133] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 915.973827][T18133] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 915.981820][T18133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 05:52:50 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000007400000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:50 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x3505c) 05:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000018000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 915.989787][T18133] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:50 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000007a00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:50 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x227a, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:50 executing program 5 (fault-call:2 fault-nth:7): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000019000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:50 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000ffffffffffffff7f00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:50 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000ffffff8c00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:50 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = accept(r1, &(0x7f0000000240)=@nfc_llcp, &(0x7f0000000080)=0x80) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, 0x2, 0x2, 0x3, 0x0, 0x0, {}, [@CTA_EXPECT_HELP_NAME={0xa, 0x6, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x1bc000}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x3}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x80) open_by_handle_at(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="0c00000081000000030000007f00000000f8fffff7ff9136f24d0a53c90c61ca5967037b0108b43a6a0ba1f23350561cd7bf6a5c0e2da5aea82e6f74b31dfe186efba8c8938335a3d756b83763baea9dd047f7f93f3779a24c9f8bf2a244ee52c7a992de47c82d8f6f12696bdfea6efcf3610b618340d329f4cb878d217348ff8de097cdc1480e"], 0x185880) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:50 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x227b, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 916.171159][T18166] FAULT_INJECTION: forcing a failure. [ 916.171159][T18166] name failslab, interval 1, probability 0, space 0, times 0 [ 916.183826][T18166] CPU: 1 PID: 18166 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 916.192578][T18166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 916.202630][T18166] Call Trace: [ 916.205917][T18166] dump_stack+0x137/0x19d [ 916.210251][T18166] should_fail+0x23c/0x250 [ 916.214668][T18166] ? new_inode_pseudo+0x5c/0x1c0 [ 916.219635][T18166] __should_failslab+0x81/0x90 [ 916.224398][T18166] should_failslab+0x5/0x20 [ 916.228932][T18166] kmem_cache_alloc+0x46/0x300 [ 916.233699][T18166] new_inode_pseudo+0x5c/0x1c0 [ 916.238469][T18166] new_inode+0x21/0x120 [ 916.242626][T18166] __debugfs_create_file+0x110/0x360 [ 916.247929][T18166] ? up_write+0x25/0xc0 [ 916.252131][T18166] debugfs_create_file+0x45/0x50 [ 916.257069][T18166] do_blk_trace_setup+0x2a5/0x510 [ 916.262150][T18166] blk_trace_setup+0x85/0x110 [ 916.266911][T18166] sg_ioctl_common+0xa02/0x1790 05:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000020000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 916.271809][T18166] ? do_vfs_ioctl+0x4f7/0xee0 [ 916.276545][T18166] sg_ioctl+0x54/0xc0 [ 916.280527][T18166] ? sg_poll+0x240/0x240 [ 916.284767][T18166] __se_sys_ioctl+0xcb/0x140 [ 916.289347][T18166] __x64_sys_ioctl+0x3f/0x50 [ 916.293939][T18166] do_syscall_64+0x34/0x50 [ 916.298404][T18166] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 916.304376][T18166] RIP: 0033:0x466459 [ 916.308261][T18166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 916.327870][T18166] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 916.336394][T18166] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 916.344447][T18166] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 916.352416][T18166] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 916.360384][T18166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 05:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f001020000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:50 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x227c, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 916.368350][T18166] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 [ 916.376359][T18166] debugfs: out of free dentries, can not create file 'dropped' 05:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000022000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:50 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000000a9c00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:50 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x80) write$evdev(r1, &(0x7f0000000080)=[{{0x0, 0x2710}, 0x11, 0x1, 0x8}, {{0x0, 0x2710}, 0x11, 0xd6, 0x1fe}], 0x30) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:50 executing program 5 (fault-call:2 fault-nth:8): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:50 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000fffffff000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:50 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x227d, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000025000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:50 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000011c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000001200)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000001240)={0x0, 0x0}) write$evdev(r0, &(0x7f0000001280)=[{{r1, r2/1000+60000}, 0x17, 0x81, 0x3f}, {{r3, r4/1000+60000}, 0x0, 0x6, 0x20}, {{r5, r6/1000+60000}, 0x16, 0x81, 0x3}, {{r7, r8/1000+60000}, 0x15, 0x5, 0x6}, {{}, 0x15, 0x2, 0x6}], 0x78) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x11, 0x74, &(0x7f0000000140)="576ba177301afb6b88d1e9de2007f203358e783b61b9967c754d1b1a703e5433f3eae7383e9f07947f0ec3c8565c60c7eaece3b708e1b0558cc0591f0cc576194437e2c5395cdb502751bb50cce3092e2ff221264067283c1e3f3387f17da76819cb377c3e5bf43eb6d8df9e2fe94e974232df0d"}) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f00000001c0)=""/4096) [ 916.632682][T18223] FAULT_INJECTION: forcing a failure. [ 916.632682][T18223] name failslab, interval 1, probability 0, space 0, times 0 [ 916.648150][T18223] CPU: 0 PID: 18223 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 916.656910][T18223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 916.667043][T18223] Call Trace: [ 916.670348][T18223] dump_stack+0x137/0x19d [ 916.674678][T18223] should_fail+0x23c/0x250 [ 916.679092][T18223] ? security_inode_alloc+0x30/0x180 [ 916.684377][T18223] __should_failslab+0x81/0x90 [ 916.689148][T18223] should_failslab+0x5/0x20 [ 916.693660][T18223] kmem_cache_alloc+0x46/0x300 [ 916.698862][T18223] security_inode_alloc+0x30/0x180 [ 916.703970][T18223] inode_init_always+0x20b/0x420 [ 916.708907][T18223] new_inode_pseudo+0x73/0x1c0 [ 916.713722][T18223] new_inode+0x21/0x120 [ 916.717995][T18223] __debugfs_create_file+0x110/0x360 [ 916.723282][T18223] ? up_write+0x25/0xc0 [ 916.727480][T18223] debugfs_create_file+0x45/0x50 [ 916.732508][T18223] do_blk_trace_setup+0x2a5/0x510 [ 916.737599][T18223] blk_trace_setup+0x85/0x110 [ 916.743285][T18223] sg_ioctl_common+0xa02/0x1790 [ 916.748154][T18223] ? do_vfs_ioctl+0x4f7/0xee0 [ 916.752833][T18223] sg_ioctl+0x54/0xc0 [ 916.757162][T18223] ? sg_poll+0x240/0x240 [ 916.761400][T18223] __se_sys_ioctl+0xcb/0x140 [ 916.765994][T18223] __x64_sys_ioctl+0x3f/0x50 [ 916.770864][T18223] do_syscall_64+0x34/0x50 [ 916.775283][T18223] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 916.781234][T18223] RIP: 0033:0x466459 [ 916.785119][T18223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 916.808808][T18223] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 916.818113][T18223] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 916.826088][T18223] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 916.834062][T18223] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 916.842039][T18223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 916.850011][T18223] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 [ 916.858043][T18223] debugfs: out of free dentries, can not create file 'dropped' 05:52:51 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x227e, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:51 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2, 0xb8384afab311a72c) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r1 = fsmount(0xffffffffffffffff, 0x0, 0x8) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f00000000c0)={0x9, 0x13, 0x1ff, 0x7, "6c2f36b4f7cd2188ed544c0070d3c844c34f3fb0d6737bf6fc51b687419445ac"}) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000140)=0x40) write$evdev(r2, &(0x7f0000000080)=[{{0x77359400}, 0x16, 0x5, 0x2c6}], 0x18) 05:52:51 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000fffffff600000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00002e000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:51 executing program 5 (fault-call:2 fault-nth:9): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:51 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x227f, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:51 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000fffffdf900000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00022e000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 917.011150][T18256] FAULT_INJECTION: forcing a failure. [ 917.011150][T18256] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 917.024416][T18256] CPU: 1 PID: 18256 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 917.033178][T18256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 917.044149][T18256] Call Trace: [ 917.047503][T18256] dump_stack+0x137/0x19d [ 917.051832][T18256] should_fail+0x23c/0x250 [ 917.056250][T18256] __alloc_pages_nodemask+0xe7/0x310 [ 917.061538][T18256] alloc_pages_current+0x21d/0x310 [ 917.066657][T18256] __get_free_pages+0x8/0x30 [ 917.071312][T18256] inode_doinit_with_dentry+0x63d/0x940 [ 917.076863][T18256] selinux_d_instantiate+0x23/0x30 [ 917.082043][T18256] security_d_instantiate+0x87/0xb0 [ 917.087238][T18256] d_instantiate+0x36/0x90 [ 917.091746][T18256] __debugfs_create_file+0x20b/0x360 [ 917.097043][T18256] debugfs_create_file+0x45/0x50 [ 917.102015][T18256] do_blk_trace_setup+0x2a5/0x510 [ 917.107075][T18256] blk_trace_setup+0x85/0x110 05:52:51 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000000007fc00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:51 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4000000002, 0x400100) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) read(r0, &(0x7f0000000140)=""/172, 0xac) [ 917.111761][T18256] sg_ioctl_common+0xa02/0x1790 [ 917.116612][T18256] ? do_vfs_ioctl+0x4f7/0xee0 [ 917.121285][T18256] sg_ioctl+0x54/0xc0 [ 917.125260][T18256] ? sg_poll+0x240/0x240 [ 917.129611][T18256] __se_sys_ioctl+0xcb/0x140 [ 917.134198][T18256] __x64_sys_ioctl+0x3f/0x50 [ 917.138855][T18256] do_syscall_64+0x34/0x50 [ 917.143273][T18256] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 917.149208][T18256] RIP: 0033:0x466459 05:52:51 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000fffffdfd00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 917.153093][T18256] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 917.172984][T18256] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 917.181404][T18256] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 917.189379][T18256] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 917.197703][T18256] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 05:52:51 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2282, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 917.206197][T18256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 917.214169][T18256] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:51 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000fffffffe00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00022f000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:51 executing program 5 (fault-call:2 fault-nth:10): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:51 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000fffffffffffffffe00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 917.347459][T18289] FAULT_INJECTION: forcing a failure. [ 917.347459][T18289] name failslab, interval 1, probability 0, space 0, times 0 [ 917.360232][T18289] CPU: 0 PID: 18289 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 917.368990][T18289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 917.379130][T18289] Call Trace: [ 917.382406][T18289] dump_stack+0x137/0x19d [ 917.387173][T18289] should_fail+0x23c/0x250 [ 917.391588][T18289] ? __d_alloc+0x36/0x370 [ 917.395921][T18289] __should_failslab+0x81/0x90 [ 917.400686][T18289] should_failslab+0x5/0x20 [ 917.405192][T18289] kmem_cache_alloc+0x46/0x300 [ 917.409955][T18289] ? __d_alloc+0x36/0x370 [ 917.414287][T18289] __d_alloc+0x36/0x370 [ 917.418449][T18289] ? avc_has_perm_noaudit+0x19a/0x240 [ 917.423824][T18289] d_alloc+0x2a/0x130 [ 917.427809][T18289] d_alloc_parallel+0x46/0xba0 [ 917.432575][T18289] ? selinux_inode_permission+0x2ca/0x430 [ 917.438331][T18289] ? selinux_inode_permission+0x350/0x430 [ 917.444143][T18289] ? security_inode_permission+0xab/0xc0 [ 917.449780][T18289] ? __d_lookup+0x3c8/0x400 [ 917.454284][T18289] __lookup_slow+0x7f/0x280 [ 917.458831][T18289] lookup_one_len+0xd0/0x180 [ 917.463523][T18289] start_creating+0x137/0x250 [ 917.468200][T18289] __debugfs_create_file+0x74/0x360 [ 917.473419][T18289] debugfs_create_file+0x45/0x50 [ 917.478354][T18289] do_blk_trace_setup+0x2c3/0x510 [ 917.483443][T18289] blk_trace_setup+0x85/0x110 [ 917.488167][T18289] sg_ioctl_common+0xa02/0x1790 [ 917.493019][T18289] ? do_vfs_ioctl+0x4f7/0xee0 [ 917.497695][T18289] sg_ioctl+0x54/0xc0 [ 917.501733][T18289] ? sg_poll+0x240/0x240 [ 917.506092][T18289] __se_sys_ioctl+0xcb/0x140 [ 917.510735][T18289] __x64_sys_ioctl+0x3f/0x50 [ 917.515319][T18289] do_syscall_64+0x34/0x50 [ 917.519734][T18289] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 917.525648][T18289] RIP: 0033:0x466459 05:52:51 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2283, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 917.529532][T18289] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 917.549348][T18289] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 917.557760][T18289] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 917.565732][T18289] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 917.573701][T18289] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 917.581668][T18289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 917.589636][T18289] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:51 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000000fff00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00003f000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:51 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2284, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000040000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:52 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000fffff7ff00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:52 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2285, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000244000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:52 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000fffffbff00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:52 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r4, r5, 0x0, 0x800000080004105) r6 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r7, r8, 0x0, 0x800000080004105) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r8, 0xd000943e, &(0x7f0000000980)={r10, r9, "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", "10201d73c6ee3bbfbdd046122f0016f77723a5f94b43518b312347ad7b1df96506f58398c20da81035149ddd71263768576edb7331ae7ee39f3a1e850248708703e6085ab5370faca99e394d2532ca3b0a5a12f706a1c1d11bc8d932af60f5a46bdd1c5154b5f280a5d271915df5aad17d8a72e2e8db0ed101167d4bde56e3c8d9358b108860942de90d41385fdeb56277fa08af4903e22a44a388c568d9af113ae7dee9531494db638d4b25461a03e4f53b703664e85f49da957ff853c777fda9bdedb9fb9702eb81ef7f5907fbda2f9a817a6619593dedf1b5e8eea0b76a9c26b70ffec001c78fa5f31a61f1023bb4957dbbc71d8d96050c01e4075bb5e01c55420009dbc25104b9303509ac1125bb3d0816ad1f72bbb62417ddd3d5984529397086d3024493535c85bb17ec3630ece5b9626465a0a81d7c790f8b4471a6c16ba92b90cdde47372a65adaf0f0f7da76a8506bfb9c5044d5f2b4be8bb47b4935a6c0843d21e769290a93d73c080fcef4edf3727d4af87e2b2b46ee6353f0e25302ea9141c30c3edd00162cf7f22d1e0c358b88ee93ec991b18ee09f4dbd1ff6fe1c9c320794e44afce265b8addc687e4938bcf12d6f3ce61978af7d8a23cd90de2c08341d7d6f5830825195d21379c7f04268574a30dea151f901ff2bbf662e097d5b5590e753f36c289b2553da3c2e51d3532b1738f5decdbafea1ba815fe03f0f06cde48b892a045feefe360e8e7e94e60a05527509b39f3bbef85e540c88923180667985a6eb8202a9e0e47b84949f156ff18a758aca91de6a9e5415124e0a1c5c65956d636af3d8c244720feaa39a438bb57dd3cc88afc71ea0b7d9a18ec888f8cdaef484c11da53e7be8d23f2cb6ff65538724a9a7b6d757b991bae502e4d178f9357cbfbdf75091df0d6da765930ba2dac39a136328ee876418efa9d5c6cbb36ec5f9eb7230ebdb05d217f92a511014a2d4c8650012d5151519a280d35b658911a61fefe2b88b090c7334f44b1a500ef00f2b4f716faece30ecb5db53fc7c52f1b8de5ec8af933161dee021dd28122ca55872129797f4ed03fe03ec761630bca640ab14586b19df44bbbe65551cb0456bb644d464c0845841c6ae0b373b81a0059c55618aa21f94c5f33884a7090c979ac0b67398a06af149984f17ab4cae1430f3520530bdab405ba08fcaa8ccc6e37af32c726f6bd7df1efa522c40e69a4d6678cfd786b9e5d0cab2dd95df97de35183f69aba9d9fb7913132dfb789c3cd368981a77062d72ee43efc1a6cabc4735dd9add993c3706dbd650b32f130fbf9b70b80bd23ec9d59e97749697135acd8b6d33ca464b9e7bd3974d86aa53965954e6c14b5bf6a95049d5951591cfb3928d5dc12e02a29627713f4c8159247ac3652b21d3191f73d17d4d52be969facb50a3c2f817010568f337f1efdd620f9c44533393dbd0e7afcad9ae0678135aed321ea167d912ed11b966968894e448124e463e8269c05e711192b554075fc7aa4d9ea367bf7b283a41fbf8459678d256561288213aadfc03c8f4524d47d687ea0da2b68e830d2eabc4cfadc007009b7d294c8057c5677cf59d6162c88d1c127f1a09fdb828277c177dd2e1fbf6527101845af9de6552dab82dc5d8e98c29b8e0c2d5edd23e508e498104359020fb1e619adcb4bfd478c15fa4b4ee63b57c9579a75194385938205e776557016245f9c529a3962b78b63f0dcf7bc698cb36152fcaddb0a6af311cd0109da907a1776a02b8cc2da81ebfaf228077fadf4e7ed301c9d28c53536410dfb36963dfb935d6a6023d0351af4a1fb32950596172728300d6719fb9f3dd0e48f12c63d613bdc9b38e4c809065f4ab9db270a9e5cd469949015f48e38970cb3b54206e030937278cc9591c89443a646b505fd9fa6378f9f510aba9a94ab41d4ae408d48114a94983b471ad67c409cebca0108b942568db9fd3d4a0ddae116fb289b9cc438c00c43c7f63df53d0c2497553dd167a3676f34a7b20565107ff6989dcc74aca6430f49a23c20b0e253a2b424f4b1d323aadc77ca93a0f7be6cb364f41845a0137c3e64a401ede81b0b4c67d5b2293206f5bb3ed16bdaa30e60645f6af00aea6505509d266445f581702084bc44f99b3645d4bed50926a074bd2200cdff5733dc07f7accc8c56339873ff17ab93aa2cd40fed2af6cd569a7b65931dcec9e38c416bbe8184f428645795e7202d64a7dbce30ee6f2896a5f60ca8f6712b1a738cf8814f2cf9bb36c7a7570bdd310295c477cf40288308c51339a49936793423fb76c73154e58444f758a3253e814820f4ca46f967ba255d9768aa12b7823469910886d8b29e602670aadfc9281553f0dc3a353bb11cb22cb8ecef90c8b614c22bce318cd596cf35190fef3f3227e2f1492a0fc2af23cda409e0b53e5f001fd0b1432d62ae0c93981d4e353c0d3a0b45ce72d4a32f0444dd6f6a93cdc44504d2e8982d06d3838008c1f93c0ce73bc87fa2ac00935ccb844268da8a55b894ff9dfbabe82ced6ba15423e800d31c4c1be6938aa55f9221e5d0dcc71a78e78d0104c15133ab40c530300e25df5670148b33703fa2bebb2e60fe93576963e92a07f522f345d019fbea7026e1069a1f78aac86773e5b16bca22816bfde9650714c8409157d43aa04b533de008da9fcccb7ecb3b229ef73fbcfe80e4352987b4504786822fa7e1314b822f64f7b364edde8cd2c666711b68c792ef5f08b6927e6b1b342170adae0747ae7bc0fb923645cdb3b469625ed1dddf506acac450c3ed73b52b0294bea7fef73ea4214a7ca1086008d91308d1e760ec56a072fe653165a9d7d07e8f7f176b26413a1a7c8f2a2202166b75500862ad8689e61940efd4a9b4b07425e6bb4a3698ec3425bc7d3e7aac46d2c1a68760f7800c9912909b65c83592bcf90fc90a04930fcdebe714814d99b6340ab60d717daba0d33e6f8a3ec1601f7599758f40e41f7455800477ed1f2d23a32b67c704a623218be4e40407681fd0dda56f6b927df8215519defd00109abff414a045fe316ea2edb9469bf86e96ae0a0ca7e11f7c33e562d87a1d49b519f72355b21e160ac7f0783c0cee248f085118ca47b59e1424fe5996b61494c48100e0abf1b0d531100dc1b46595c8af7af1ae2a3093b3b6622448c36de98f453694a9f5498d25622454d50dcc5c33233cca9ae19ae08385c113c64a52c78d47b899b40bb3ca30341d52f9260a0d58e037c4423aa7dcdef87dbba2f6087f22fb8ca5fa9f34a86b6e043df514dafadc3f9a7df816ee09366c8a1929e748cda99fd37a612fceb3f90e49717f387eb4d9c6526b9fcd38bce1f5feb461cd7b7c727989e0c1229a09eb0b6862dd300a5930821ecb1e4e1394b46f48774573e5b72154840564684bcefdb463c9fd1d3457e48e119e8046484c85c4619fb113989d0b0cf9ca1f4aaf659c4edc3278b941dd0673bc0e19169a833811f537175a42a60d9d39d0b98cb0f8216837a56957801b1ba88cc192377f2c5121854dedc98f0461942e452dd1c828d370b4e3087eecf59edf8dbc16d99c2bbf71e453b9ccc0304911b00f900053b5494b18b072cf00e446f963edbb25b861d278e29813f4b940532693eb2ea59978babe48e8856647cc6d95b1b8a78e5edca662aca85e40917b023d47749100e7d56923c22b8c274c7a325277a4f9f0aee61e1f50838bfcc8a8d7dbddbee1f0d59a6a677ee5cda1bc4f26262afe06a8dee43f84f89d8799ae49d4ddc8f18cc4d6738b357be189d50f4a7f57e641ff733155d291c330b4e431b5a47d4445a83754bac9316435de219ed65e6c2b6f6394d9f049bcc232b27c312efc34965f3a81de9f295b33801cfb5f4a0f2c6e177528f7427619898dbf4854802cb56781d6337c7e5dbfc3720734658773f7433952d4b2e8a5065517bb829b36aab7d6b011c8f7b33586625d8fc5bae5bf5263c9d9d7b5f1ca6d49714729e394a9c8fa4399add58d93e285a44c788a81f0cd1842165e394d2e1ce291abf350d612a42a5badf01c843fcab781b62b9cc49f3f07e1562be06a5b2b378976deefdac1ebec2bafacbbde1a3b7249a9950920890ea01ff888ccb392e82320dbd621df4bb3cb249d3a50495343c1eeb261938b886e5bc0077acd0ce0164ea4c9d1a3b9ea53d24870cd272b631b02436933990a7cf7e9e412e1f435afc8e5c502599e1050e74ced91fe9ec5fcb21e9f63bdd662b01bffb5ae4e15930e72d279f401b2819e9332d37fc0f7f5f7d9e287aaf49f380e3d54e7c71e7f0243be5f75869fd170946dc16283023a4f378238cdd0fc60a2aa67c6f0c7ac4c30c52abe79b8d26cc883f9221d5589d0d65a0113b3c9c744fe3d358a8c7b19d927ae1830726edc7deb161e134513df870cbde300eb0f97e9efb59f6140344a1cdbf5231e704e775be6d6504e97e1a9e02ab573dba95877c336d324d8a750670e8d57fdd4853e62d65c471cfacec492008671dbd0a98723a28f75fc6b73b2fc17f7acffec202e43dd95c8d0e2ecc1ee503730a242dacc154cd50b61f7cb391eb3454ab39f8e3f31dc71e55ab5cad4e87b5e9d2dadb267bea8c4367ae652956fe3de49f44fa5391106aa40780c8c7984c2a1c88a535c4f044c32d885d43146b115ca87ba0a976bdbaa44b65383fd1e1bd84933a7f33d9724762fdcbfdd25f75cf2830bfab4eb4a022b5cd640c70071a54b768bf9abdb74171c7bf5f21098454dcc46f0e48ed3fc1e4870b4a4b760bff79736e7728b37a6d363f1e35957651ac6c82c1212fabb6eabce93a68c4f72092cfd51625781ae36095c1b383a19286f979bab97ffe523d23c0c6cfece67715426f5a170dca220fdc8e4c62a5f5f102dfddf2fa3546d7c9dd8fab4339f571963cf8056c16380a34cca087dd5d0b13818a259ab62672bb8b9bcf00dc0f78da677f4fdce81bcfd48244952657f857aad52a19c0e47c14e8988899ef478019f848de5b936220be20207cc9c8f199b3913074791a2b8172f1c2ef2bd3685aacd45ff6edc79e68afe73cb05e6273b9f3896de12518811186df6963535c71729ad6e239521ee362a9a18a92065db77d6f6754e87385ae85d72a0dc2798bb0f27c58f593c43c320d36b39c79c5757ae088b7f7e3efadaf546e811d77844f75ea5bbdb685415ffae4bdfcbb8ce4d78fb6d7c161f555cc27c20d03981a2d1e0145b576fb23f6df6acaab2aeeb173a49a2885ae28b2d4ea3b9a04f10fd7bb4fae43da572efb4099c12a4407c1486c7af5494df8c6380aa767ae0d4cf1aa7b1dfcd236793e2f9cc0f1e3e10842f7cf2c432999fde0e868254cc55423babfaa599827a543f4053280eea186ad6ac2b1814f0e3745180a4dd65350e2c1045e562655ffb88fa01577ec144"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001980)={r10, r12, "becad4b53efa6b42fe7b42de07736be286cfd329b0cba554836370fa102801e53bbac1a429597140e4590c416f06ca7e2b6ad71471e00daa3105aa9b57872d82e9837f364da821b73bcbb3375ad821fa63372acde32b24b9c26dedbc6bcbe8bb28fb45519e1ec7d224f49dbd7e865dda3b7eafcd3388efed59e919da2264351644d8f5e4606c98533ca2bf39b7e01caf0c5fae28e21a6e3ca307e9b961d10dcdfc8e0ad877c2ea1ae64cd72b7da4630e0362e3c03be8f192990bf3050327f3316e7640048fc1cff8e18a813d1f82cc63579408afa6df4bb348fcd82101fb9fc9b6b278db4e6237351134a09c5a03e12870b3abb8238789c02523edfb618134e4", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b6c0)={0x400, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x6}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)={{r9, 0x1, 0x66, 0x3, 0x4, 0x7, 0xc3, 0x3, 0x0, 0x81, 0x8, 0x718997c, 0x2, 0x1, 0x8}, 0x40, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000063280)={0x2, [{r1}, {}, {r2, r3}, {r2}, {0x0, r3}, {}, {}, {}, {r2, r3}, {}, {r1}, {0x0, r3}, {r2, r3}, {0x0, r3}, {r2, r3}, {0x0, r3}, {0x0, r3}, {}, {}, {r2}, {}, {}, {r1}, {}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {r1}, {r2}, {}, {0x0, r3}, {}, {r1}, {r2}, {r2, r3}, {0x0, r3}, {}, {r2, r3}, {r2}, {0x0, r3}, {}, {r1}, {}, {r1}, {r2, r3}, {r2}, {}, {r1}, {r2}, {}, {0x0, r3}, {}, {r2, r3}, {}, {r1, r3}, {r2, r3}, {}, {r2, r3}, {r2}, {0x0, r3}, {0x0, r3}, {r2, r3}, {r2}, {}, {r1}, {r1}, {}, {0x0, r3}, {r2}, {0x0, r3}, {}, {r2}, {}, {r2, r3}, {}, {r2, r3}, {0x0, r3}, {r2}, {}, {}, {r2}, {r2, r3}, {r2}, {0x0, r3}, {r1, r3}, {0x0, r3}, {r1}, {r2}, {0x0, r3}, {}, {0x0, r3}, {}, {}, {0x0, r3}, {r2, r3}, {0x0, r3}, {r2}, {0x0, r3}, {0x0, r3}, {}, {0x0, r3}, {r1, r3}, {0x0, r3}, {r2}, {}, {}, {}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {}, {}, {}, {r1}, {0x0, r3}, {}, {}, {0x0, r3}, {r2, r3}, {}, {0x0, r3}, {0x0, r3}, {r2, r3}, {0x0, r3}, {}, {r1, r3}, {r1}, {r2, r3}, {r2}, {r2}, {0x0, r3}, {r2}, {}, {}, {}, {r1, r3}, {0x0, r3}, {r2}, {0x0, r3}, {0x0, r3}, {}, {r2, r3}, {}, {r1, r3}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {r2}, {}, {}, {r1, r3}, {r2}, {}, {}, {0x0, r3}, {r1}, {0x0, r3}, {}, {}, {r1}, {}, {r1}, {r2}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {r2, r3}, {r2, r3}, {0x0, r3}, {r2, r3}, {r1}, {}, {r1, r3}, {r2, r3}, {r1, r3}, {}, {0x0, r3}, {}, {r2, r3}, {r2}, {0x0, r3}, {r1, r3}, {}, {0x0, r3}, {0x0, r3}, {}, {}, {r1, r3}, {r1, r3}, {}, {r2, r3}, {}, {0x0, r3}, {0x0, r3}, {}, {0x0, r3}, {r1, r3}, {}, {r1}, {}, {}, {r1}, {}, {r1}, {}, {}, {r1}, {0x0, r3}, {}, {r1}, {0x0, r3}, {}, {}, {r2, r3}, {}, {}, {}, {}, {0x0, r3}, {}, {r2}, {r2}, {r2}, {}, {0x0, r3}, {}, {}, {0x0, r3}, {0x0, r3}, {r1, r3}, {r2, r3}, {r1}, {r2}, {r2, r3}, {0x0, r3}, {r1}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {r1}, {r2}, {r1}, {0x0, r3}, {r9}], 0xff, "a759770dd72105"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)={{r2, 0xab, 0x2, 0x6, 0x7, 0xe, 0x2, 0xffffff81, 0x1, 0x5, 0x1, 0x7ff0, 0x80000000, 0x0, 0x3ffc00000000}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 05:52:52 executing program 5 (fault-call:2 fault-nth:11): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:52 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2286, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:52 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000001fffff00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000245000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:52 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)=[0x0, 0x3]) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000347000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 918.096558][T18351] FAULT_INJECTION: forcing a failure. [ 918.096558][T18351] name failslab, interval 1, probability 0, space 0, times 0 [ 918.113025][T18351] CPU: 0 PID: 18351 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 918.121897][T18351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 918.132042][T18351] Call Trace: [ 918.135319][T18351] dump_stack+0x137/0x19d [ 918.139712][T18351] should_fail+0x23c/0x250 [ 918.144119][T18351] ? new_inode_pseudo+0x5c/0x1c0 [ 918.149063][T18351] __should_failslab+0x81/0x90 [ 918.153950][T18351] should_failslab+0x5/0x20 [ 918.158487][T18351] kmem_cache_alloc+0x46/0x300 [ 918.163347][T18351] new_inode_pseudo+0x5c/0x1c0 [ 918.168112][T18351] new_inode+0x21/0x120 [ 918.172277][T18351] __debugfs_create_file+0x110/0x360 [ 918.177567][T18351] debugfs_create_file+0x45/0x50 [ 918.182595][T18351] do_blk_trace_setup+0x2c3/0x510 [ 918.187620][T18351] blk_trace_setup+0x85/0x110 [ 918.192299][T18351] sg_ioctl_common+0xa02/0x1790 05:52:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000048000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 918.197151][T18351] ? do_vfs_ioctl+0x4f7/0xee0 [ 918.201826][T18351] sg_ioctl+0x54/0xc0 [ 918.205803][T18351] ? sg_poll+0x240/0x240 [ 918.210043][T18351] __se_sys_ioctl+0xcb/0x140 [ 918.214625][T18351] __x64_sys_ioctl+0x3f/0x50 [ 918.219259][T18351] do_syscall_64+0x34/0x50 [ 918.223720][T18351] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 918.229637][T18351] RIP: 0033:0x466459 [ 918.233523][T18351] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 918.253127][T18351] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 918.261539][T18351] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 918.269638][T18351] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 918.277608][T18351] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 918.285579][T18351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 05:52:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00004c000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:52 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2287, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:52 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000007fffffff00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:52 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x923b41) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) [ 918.293547][T18351] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 [ 918.301562][T18351] debugfs: out of free dentries, can not create file 'msg' 05:52:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000060000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:52 executing program 5 (fault-call:2 fault-nth:12): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:52 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2288, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:52 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000ffffffff00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:52 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000140)=""/167) write$char_usb(r0, &(0x7f0000000000)="e2", 0x1) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x100000000, 0x7ff}) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000040)=0x4) 05:52:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000068000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 918.509476][T18408] FAULT_INJECTION: forcing a failure. [ 918.509476][T18408] name failslab, interval 1, probability 0, space 0, times 0 [ 918.522118][T18408] CPU: 1 PID: 18408 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 918.530887][T18408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 918.540941][T18408] Call Trace: [ 918.544259][T18408] dump_stack+0x137/0x19d [ 918.548627][T18408] should_fail+0x23c/0x250 [ 918.553042][T18408] ? security_inode_alloc+0x30/0x180 [ 918.558328][T18408] __should_failslab+0x81/0x90 [ 918.563099][T18408] should_failslab+0x5/0x20 [ 918.567610][T18408] kmem_cache_alloc+0x46/0x300 [ 918.572376][T18408] security_inode_alloc+0x30/0x180 [ 918.577548][T18408] inode_init_always+0x20b/0x420 [ 918.582569][T18408] new_inode_pseudo+0x73/0x1c0 [ 918.587442][T18408] new_inode+0x21/0x120 [ 918.591674][T18408] __debugfs_create_file+0x110/0x360 [ 918.596962][T18408] debugfs_create_file+0x45/0x50 [ 918.602015][T18408] do_blk_trace_setup+0x2c3/0x510 [ 918.607051][T18408] blk_trace_setup+0x85/0x110 [ 918.611791][T18408] sg_ioctl_common+0xa02/0x1790 [ 918.616691][T18408] ? do_vfs_ioctl+0x4f7/0xee0 [ 918.621465][T18408] sg_ioctl+0x54/0xc0 [ 918.625509][T18408] ? sg_poll+0x240/0x240 [ 918.629745][T18408] __se_sys_ioctl+0xcb/0x140 [ 918.634779][T18408] __x64_sys_ioctl+0x3f/0x50 [ 918.639575][T18408] do_syscall_64+0x34/0x50 [ 918.644014][T18408] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 918.649903][T18408] RIP: 0033:0x466459 [ 918.653792][T18408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 918.673414][T18408] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 918.681820][T18408] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 918.689792][T18408] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 918.697761][T18408] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 05:52:52 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x2289, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00006c000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000074000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x4b47, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 918.705737][T18408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 918.713706][T18408] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 [ 918.721705][T18408] debugfs: out of free dentries, can not create file 'msg' 05:52:53 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000007ffffffffffff00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:53 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='dns_resolver\x00', 0x0, &(0x7f00000001c0)="1000", 0x2, r0) keyctl$assume_authority(0x10, r0) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(r1, &(0x7f0000000100)=[{{}, 0x17, 0x532}, {{0x0, 0xea60}, 0x11, 0x7, 0x9}, {{0x0, 0x2710}, 0x17, 0x1000, 0x40}, {{0x77359400}, 0x0, 0x4, 0x7}], 0x60) write$char_usb(r1, &(0x7f0000000040)="e2", 0x35000) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) 05:52:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x4b49, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:53 executing program 5 (fault-call:2 fault-nth:13): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:53 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000007fffffffffffffff00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000077000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:53 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)=0x40) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000000)={0x80, 0x15, 0xfff8, 0x10000, "e6d304fafa635ab2b85e9d68b3f7dbb1b4e184ba480944d877d69104f242af5f"}) 05:52:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x5382, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 919.160904][T18462] FAULT_INJECTION: forcing a failure. [ 919.160904][T18462] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 919.174200][T18462] CPU: 1 PID: 18462 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 919.182958][T18462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.193009][T18462] Call Trace: [ 919.196279][T18462] dump_stack+0x137/0x19d [ 919.200958][T18462] should_fail+0x23c/0x250 [ 919.205460][T18462] __alloc_pages_nodemask+0xe7/0x310 [ 919.210756][T18462] alloc_pages_current+0x21d/0x310 [ 919.215873][T18462] __get_free_pages+0x8/0x30 [ 919.220467][T18462] inode_doinit_with_dentry+0x63d/0x940 [ 919.226017][T18462] selinux_d_instantiate+0x23/0x30 [ 919.231136][T18462] security_d_instantiate+0x87/0xb0 [ 919.236456][T18462] d_instantiate+0x36/0x90 [ 919.240872][T18462] __debugfs_create_file+0x20b/0x360 [ 919.246158][T18462] debugfs_create_file+0x45/0x50 [ 919.251118][T18462] do_blk_trace_setup+0x2c3/0x510 [ 919.256189][T18462] blk_trace_setup+0x85/0x110 [ 919.260870][T18462] sg_ioctl_common+0xa02/0x1790 [ 919.265720][T18462] ? do_vfs_ioctl+0x4f7/0xee0 [ 919.270449][T18462] sg_ioctl+0x54/0xc0 [ 919.274539][T18462] ? sg_poll+0x240/0x240 [ 919.278809][T18462] __se_sys_ioctl+0xcb/0x140 [ 919.283398][T18462] __x64_sys_ioctl+0x3f/0x50 [ 919.288019][T18462] do_syscall_64+0x34/0x50 [ 919.292437][T18462] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 919.298371][T18462] RIP: 0033:0x466459 [ 919.302257][T18462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.321991][T18462] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 919.330487][T18462] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 919.338452][T18462] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 919.346415][T18462] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 05:52:53 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000feffffffffffffff00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x5385, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000079000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:53 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r1 = fsmount(0xffffffffffffffff, 0x1, 0x77) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000140)=""/4096) [ 919.354384][T18462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.362430][T18462] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x5386, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:53 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000ffffffffffffffff00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00007a000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:53 executing program 5 (fault-call:2 fault-nth:14): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x541b, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:53 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000200000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:53 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)=0xe5) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) [ 919.543136][T18503] FAULT_INJECTION: forcing a failure. [ 919.543136][T18503] name failslab, interval 1, probability 0, space 0, times 0 [ 919.555775][T18503] CPU: 1 PID: 18503 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 919.564537][T18503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.574609][T18503] Call Trace: [ 919.577887][T18503] dump_stack+0x137/0x19d [ 919.582212][T18503] should_fail+0x23c/0x250 [ 919.586625][T18503] __should_failslab+0x81/0x90 05:52:53 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000300000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 919.591387][T18503] ? relay_open+0xcd/0x560 [ 919.595883][T18503] should_failslab+0x5/0x20 [ 919.600410][T18503] kmem_cache_alloc_trace+0x49/0x320 [ 919.605691][T18503] ? __debugfs_create_file+0x2c3/0x360 [ 919.611146][T18503] relay_open+0xcd/0x560 [ 919.615392][T18503] do_blk_trace_setup+0x2fa/0x510 [ 919.615419][T18503] blk_trace_setup+0x85/0x110 [ 919.615441][T18503] sg_ioctl_common+0xa02/0x1790 [ 919.615461][T18503] ? do_vfs_ioctl+0x4f7/0xee0 [ 919.615546][T18503] sg_ioctl+0x54/0xc0 [ 919.615563][T18503] ? sg_poll+0x240/0x240 05:52:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00007b000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 919.615578][T18503] __se_sys_ioctl+0xcb/0x140 [ 919.647474][T18503] __x64_sys_ioctl+0x3f/0x50 [ 919.652064][T18503] do_syscall_64+0x34/0x50 [ 919.656740][T18503] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 919.662753][T18503] RIP: 0033:0x466459 [ 919.666644][T18503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:52:54 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00007c000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:54 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x5421, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 919.688502][T18503] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 919.696907][T18503] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 919.704878][T18503] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 919.712849][T18503] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.720822][T18503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.728794][T18503] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:54 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000400000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:54 executing program 5 (fault-call:2 fault-nth:15): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:54 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x400, 0x20000) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r2 = socket$inet(0x2, 0x1, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) flock(r1, 0xb) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r3, 0x5401, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000002c0)={0x2001}) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="c1f9b93848e6223ef8873223ed08f44596c2510077cc0815fc02ec8d2b3a164eb78de4caf932d48026251fd4c0b3a43a9303a4523636fd4cf1097448f6604683ab6622ad34323a1fb47ba22fb0a0995154e54f30bb4eb7eca426760316eaa409cf14fc913e8f024c78ba8ed08101072aeae1af0e380f17441847ab21b355ff8af484b1a63d70a1d8defeb8789ec3cf3c44654ed2ff8ba0e7498a6e957af3dbe51262", 0xa2}, {&(0x7f0000000200)="e3beb34430b954b8b07ad727c0a70ad5580b7662a456378466d5ace45d907523ab0551b135eb4f40bf929c28f8d7a5eca3c40b915634a43b2f057276940e46dc8f8a4e8ed22c212b2ede8405f485402ff4e8a7d1f79d66b6b7e83b1a2891bd282e29a1bbe6de933fdf408aab06ae171cf4c29db5f76f041d741d1a309e8415d44aa2625d63842805b0a3da1d3e07a35c", 0x90}], 0x2) 05:52:54 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x5450, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:54 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00007d000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 919.842620][T18532] FAULT_INJECTION: forcing a failure. [ 919.842620][T18532] name failslab, interval 1, probability 0, space 0, times 0 [ 919.855266][T18532] CPU: 1 PID: 18532 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 919.864165][T18532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.875207][T18532] Call Trace: [ 919.878566][T18532] dump_stack+0x137/0x19d [ 919.882904][T18532] should_fail+0x23c/0x250 [ 919.882922][T18532] __should_failslab+0x81/0x90 05:52:54 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000500000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 919.892081][T18532] ? relay_open_buf+0xc1/0x810 [ 919.896840][T18532] should_failslab+0x5/0x20 [ 919.901415][T18532] kmem_cache_alloc_trace+0x49/0x320 [ 919.906701][T18532] ? pcpu_alloc+0xbe9/0x1170 [ 919.911343][T18532] relay_open_buf+0xc1/0x810 [ 919.915951][T18532] ? relay_open+0xcd/0x560 [ 919.920360][T18532] ? find_next_bit+0xc6/0xf0 [ 919.924964][T18532] relay_open+0x25b/0x560 [ 919.929307][T18532] do_blk_trace_setup+0x2fa/0x510 [ 919.934494][T18532] blk_trace_setup+0x85/0x110 [ 919.939208][T18532] sg_ioctl_common+0xa02/0x1790 [ 919.944091][T18532] ? do_vfs_ioctl+0x4f7/0xee0 [ 919.948900][T18532] sg_ioctl+0x54/0xc0 [ 919.952922][T18532] ? sg_poll+0x240/0x240 [ 919.957175][T18532] __se_sys_ioctl+0xcb/0x140 [ 919.961877][T18532] __x64_sys_ioctl+0x3f/0x50 [ 919.966473][T18532] do_syscall_64+0x34/0x50 [ 919.970893][T18532] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 919.976790][T18532] RIP: 0033:0x466459 [ 919.980678][T18532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 920.000332][T18532] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 920.008857][T18532] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 920.017293][T18532] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 920.025262][T18532] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 920.033231][T18532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 05:52:54 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="37041000", @ANYRES16=r0, @ANYBLOB="000829bd7000fcdbdf25350000000c00990002000000670000000600fd00018000001400fe0098c46d0a010e01d372515f98916a6daa08001f018500000014005500fe75da793b76b0148672682c68b75420"], 0x58}}, 0x844) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1, 0x0, 0x1}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x20040014) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000240)=0x80000001) write$char_usb(r1, &(0x7f0000000040)="e2", 0x35000) 05:52:54 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x5451, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:54 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000600000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 920.041237][T18532] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:54 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000b8000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:54 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x80840, 0x102, 0x1}, 0x18) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000140)={0x7, 0x9, 0x0, 0x4be0b587, 0x4a, 0x1}) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fsync(r2) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x17, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r3 = socket$inet(0x2, 0x1, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) recvmmsg(r3, 0x0, 0x0, 0x0, 0x0) fstat(r3, &(0x7f0000000180)) preadv(r3, &(0x7f0000002500)=[{&(0x7f0000000240)=""/208, 0xd0}, {&(0x7f0000000340)=""/167, 0xa7}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/225, 0xe1}, {&(0x7f0000001500)=""/4096, 0x1000}], 0x5, 0x7ff, 0x7c0000) 05:52:54 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000700000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:54 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x5452, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:54 executing program 5 (fault-call:2 fault-nth:16): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:54 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001440)='/proc/mdstat\x00', 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x1002, 0x822801) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)=[0x10001, 0x53]) write$char_usb(r1, &(0x7f0000000040)="e2", 0x35000) r2 = socket$inet(0x2, 0x1, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) r3 = socket$inet(0x2, 0x1, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) recvmmsg(r3, 0x0, 0x0, 0x0, 0x0) sendmsg(r3, &(0x7f0000001640)={&(0x7f0000001480)=@nfc_llcp={0x27, 0x1, 0x0, 0x7, 0x3, 0x77, "23f3e3371500b5e40a4c29581d3d24bd8f7cebd3092589e53b6278c32786a1b2275892cf36748e6ea885024f5eb3c343de2f76fe26bbed28f295432841a174", 0x27}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001500)="4616e95e63b8031053e6d29f7bb15b2d20aaaf391058baeef6609fe7ae59ab6d8dd4f1f58fe5fdc8b31fd77b4afad8eff709e12d7b2b7f00331b70a9960296e1265e7398ad4af378fbe6833a9872362e519f0a27a54af1c221503b0c0972aa988c47557fa05b80506ef6275202a1bea1ab5ec5f7b7a1b174334cb408ec3f77a8a077fec4a2f557b9b69c5661fecd709183ca9b224a0ee07fca17b784e839ee8f723493bf0c8256998dacc3d80557728e8cbf55ef91eb9f08b9fdc2b674d5a273bcb1bcca463484d029b2761622b50781a7b91811f9c4b0b1440b8708a7b3fd0798860f59eceb9c2e3ec655d7b73a607b88affc303859", 0xf6}], 0x1}, 0x8040) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) readv(r2, &(0x7f00000013c0)=[{&(0x7f0000000140)=""/244, 0xf4}, {&(0x7f00000000c0)=""/62, 0x3e}, {&(0x7f0000000240)=""/177, 0xb1}, {&(0x7f0000000380)=""/97, 0x61}, {&(0x7f0000001680)=""/4108, 0x100c}, {&(0x7f0000001380)=""/48, 0x30}], 0x6) 05:52:54 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000800000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:54 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0001ba000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:54 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x5460, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:54 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x40049409, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 920.287320][T18596] FAULT_INJECTION: forcing a failure. [ 920.287320][T18596] name failslab, interval 1, probability 0, space 0, times 0 [ 920.300080][T18596] CPU: 1 PID: 18596 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 920.310703][T18596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 920.320753][T18596] Call Trace: [ 920.324025][T18596] dump_stack+0x137/0x19d [ 920.328493][T18596] should_fail+0x23c/0x250 [ 920.332916][T18596] __should_failslab+0x81/0x90 [ 920.337732][T18596] ? relay_open_buf+0xf1/0x810 [ 920.342491][T18596] should_failslab+0x5/0x20 [ 920.347072][T18596] __kmalloc+0x66/0x360 [ 920.351222][T18596] ? relay_open_buf+0xc1/0x810 [ 920.356070][T18596] relay_open_buf+0xf1/0x810 [ 920.360674][T18596] ? relay_open+0xcd/0x560 [ 920.365090][T18596] ? find_next_bit+0xc6/0xf0 [ 920.369679][T18596] relay_open+0x25b/0x560 [ 920.374053][T18596] do_blk_trace_setup+0x2fa/0x510 [ 920.379152][T18596] blk_trace_setup+0x85/0x110 05:52:54 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x40086602, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 920.383839][T18596] sg_ioctl_common+0xa02/0x1790 [ 920.388733][T18596] ? do_vfs_ioctl+0x4f7/0xee0 [ 920.393412][T18596] sg_ioctl+0x54/0xc0 [ 920.397394][T18596] ? sg_poll+0x240/0x240 [ 920.401640][T18596] __se_sys_ioctl+0xcb/0x140 [ 920.406306][T18596] __x64_sys_ioctl+0x3f/0x50 [ 920.410921][T18596] do_syscall_64+0x34/0x50 [ 920.415347][T18596] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 920.421249][T18596] RIP: 0033:0x466459 05:52:54 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r1 = socket$inet(0x2, 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x2) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) r3 = dup2(r0, r0) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f00000001c0)=0x6d9) write$evdev(r3, &(0x7f0000000140)=[{{}, 0x5, 0x3, 0x2}, {{0x77359400}, 0x5, 0x2, 0x8}], 0x30) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2, r4, &(0x7f0000000240)="a7364c5b9945a022753eaded6294d3dac5d311864becbdcfe823f40e86457954e6db93a8d69ad635fbdf653bd6c2c1acf3250b77a4e23bc5ae4377602a41489c335657abeccafe76770e84e4879836c84d81893b8f24a94548a7255798b8c9421a5afa3e69", 0x65, 0xff}, &(0x7f0000000200)) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000000180)=0x6) [ 920.425300][T18596] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 920.444906][T18596] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 920.453522][T18596] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 920.462045][T18596] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 920.470189][T18596] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 920.478215][T18596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 05:52:54 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000900000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:54 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0001bb000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:54 executing program 5 (fault-call:2 fault-nth:17): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 920.486190][T18596] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:54 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x40087602, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 920.569223][T18625] FAULT_INJECTION: forcing a failure. [ 920.569223][T18625] name failslab, interval 1, probability 0, space 0, times 0 [ 920.581888][T18625] CPU: 1 PID: 18625 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 920.590647][T18625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 920.600760][T18625] Call Trace: [ 920.604032][T18625] dump_stack+0x137/0x19d [ 920.608366][T18625] should_fail+0x23c/0x250 [ 920.612783][T18625] __should_failslab+0x81/0x90 05:52:54 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x4020940d, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 920.617548][T18625] ? kzalloc+0x16/0x20 [ 920.621621][T18625] should_failslab+0x5/0x20 [ 920.626125][T18625] __kmalloc+0x66/0x360 [ 920.630353][T18625] ? __kmalloc+0x1e0/0x360 [ 920.634765][T18625] ? relay_open_buf+0xc1/0x810 [ 920.639611][T18625] ? relay_open_buf+0xf1/0x810 [ 920.644377][T18625] kzalloc+0x16/0x20 [ 920.648276][T18625] relay_open_buf+0x1b0/0x810 [ 920.652968][T18625] ? find_next_bit+0xc6/0xf0 [ 920.657548][T18625] relay_open+0x25b/0x560 [ 920.661877][T18625] do_blk_trace_setup+0x2fa/0x510 05:52:54 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000a00000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 920.666903][T18625] blk_trace_setup+0x85/0x110 [ 920.671745][T18625] sg_ioctl_common+0xa02/0x1790 [ 920.676640][T18625] ? do_vfs_ioctl+0x4f7/0xee0 [ 920.681315][T18625] sg_ioctl+0x54/0xc0 [ 920.685295][T18625] ? sg_poll+0x240/0x240 [ 920.689573][T18625] __se_sys_ioctl+0xcb/0x140 [ 920.694177][T18625] __x64_sys_ioctl+0x3f/0x50 [ 920.698854][T18625] do_syscall_64+0x34/0x50 [ 920.703278][T18625] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 920.709181][T18625] RIP: 0033:0x466459 05:52:55 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x80086601, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 920.713073][T18625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 920.732733][T18625] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 920.741431][T18625] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 920.749402][T18625] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 920.757373][T18625] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 920.765347][T18625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 920.773319][T18625] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000c2000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:55 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000b00000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:55 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0x80087601, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:55 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x300, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000100)=0x408001) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000000)={0x55, 0x9, 0x7f, {0x40, 0x800}, {0x1}, @ramp={0xfe9f, 0x6, {0x7, 0x1000, 0x400, 0x8a8}}}) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000001280)={0x14, 0xe3, &(0x7f0000001180)="941a9a59106cfd452d948f731d7f290a780992c8c873c8f87516ae6160aa451c7cbce899832aa0b9a16bc34f16ed78f71cd8f524def1600fcb89345ca22310d74062bfbc736bd4b7efa4bdb59c86bbabc5daffddfe2d0351c658215dc614b0a192cf06c0323cf2907765823f207191d3b42c408375f2774c22a901c54523834fddd0a1a42c6d1eb62410384428f2042b76bcdbc26c4701fedce7b2173769a0eb93ea436bc377d97b5bf736338e68096a2ceb81b4137325544e158ae81d2d989a3040df58a03d3e4e5521d7f6f0281b2ea9599cb594e7846ada5b9d5b7b545d03bcd464"}) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000002300)='freezer.state\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x100000c, 0x8010, r4, 0x5b1bb000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RXATTRWALK(r5, &(0x7f00000022c0)={0xf, 0x1f, 0x2, 0x888}, 0xf) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f00000012c0)=""/4096) socket$netlink(0x10, 0x3, 0x4) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000001140)={0x0, 0x1000, &(0x7f0000000140)="683695ef174cdb20384a15ac65319b553388d336ca93afa6d079793ee7fa4440c50d1c36011c6a9a300256eb5961ce2fc87ac7d7310010345db1a3dab5833b7ffb33e003a80e8154edb26a691bed7e0ca514c8dead764b6e766135f9f07d725484ffe7c80c1b888c7d97672ad743c522d494904633ce299e0d72deafd0ed9ada5b83d9ee6aaecbeaabe827c003e9679312a3806f6ba9930724aba3d9dfdf839d0dd3683870b555ba09e660245d0526143d2e223b4a56cddd99dc82bc7e4d7b08f31f5943dffaefb6c9b45730b6d183da5b9cdd096dc73857e9ec621a53db083970175126dc89120a526248173597cf5091efe9e070ea74bd527b0d0f5ea72c1b5fa7d42d59961fe111f799ebecbcd3167695dced8523fd709422e4c9b8c4aa3e6118c47060e7e7fc7dc9f1b22b7e72d1c92675dbd110f5cb2034f66228cdc4fdb2e6df061baad64d58409f5177a30015b19e72fc318a7bef6ecf91d4f84d0022d797bef27e2acb7bb04583f701363cd8ffeb5a804471b2142a0a86c74ac13c2eb898197a364d33072489413d70d01981e9520b120f62f1b9d8ff55510c4cadd7d7d446743347239b0c61f455c42a79afb0321d827a434d5c5431ba7bf1951e7302ae37c84a0fe0ab7c8408269d9d69b32c3f34e442e4e9d84cedb69c55b70b44dcee63959bfcd746d5f555cd2e7957bf18e226e2b67c9332829d1f5ef0f4c917b9543ad74fadbdcc3dc5ada47a531f3aa64bde02cb2cbd64a6d36ddd57775f1675908cc05c4f62d777a43b73185af8ac21fd7b8a663f2d9ddc9080d309534fd5aad01f2df28b7e1ed8c543d164ba8fc901a3fbffb11c9dfb86d268a1ee6bc7694c468d8a480dabb339837cf60694a233abaacd88852dd19cf52a836bf2467602e61c215c9dae0be31680f5e02819f105a8806f4a7a468290b9c863f7c0ac4f15b4c956b32190b7df6b4268703f8b5853ec9fb3f3eb7eb599fc425ae5d2377ffdae98fa299d02d0cbf4bc5b91bfb6b8f30892f56b9774adee1d5b33d8143878c437062d9e930dce94c174aeba85bc4b1ee75c5dcf3f2f04fcf178cf34adb2176493811b96980c369c18e2c27d6316090745db90842d1c8a56a8c0812cf2f65b1259008ebefcbbe28619fd0423afda52bab3539af98794a74cc4dabe8e4e219468c37324581379497fff24a8b66bd8a4e1c594b090176748d19ae6d5a17891d6ee71d5d05496d0feaff31fbd555ec2823dfe283313ae467d40d61e4d34bbb0d2044c701b2e6f6d294e65e6ddafea64173f295bf8f26d92792b170de21daeed16a3eb88878bf55094dad1591adb9ac1c100b327c5873e9c8025affc1761bd3fae2feaab92311eb7fa66de80395c1b0f0f7fe809193e9b5017fad57b83a653fce4708c210c2cb8ca7bd2775e99a3a92eb9611742183d0185c6a79416c6bb06339422f32dd0901662ca105de6ce935f2661c897b00395d9e6698bced35eb313828a0bb67da4da940dc707dab1e61fc95ba988518de4d1a3e6942f74cf9a59dbba1f2ea816e835f55fda7c4219a7ed08a6e0ac4be955dbd4a7abcc1c1e8398ab34f05d35006b003dd5338696488a50f498cb7c3a4fd89c815435a48260fc14ccbed9f8ce8be88f62111df4e41191658fb35cf401c8fa816d9d0a06dfe6b9e603393ac2104989ea7eecb152f15bde47d83db71846e68838a8924c1bac39fa0847622b0d4641b10d95ea50b9a92bf31ef6607359dab833175fef53ef9062eb2ba29212f59b0a65b6eda7332e7aca5bacc044018df1fb6b87723a5b359adb56594ff9436e2a6df639ceb96431eafd8705475e8780c1a621bc0eccfbc652b8cba0cade24106191daa198a9b15d4729651e6acb76929eabe83b4e41fce5630e89fa574220e18e7f2c78de727b55a4228a201626d8078a06e62864f95bccf5114d559f1f0a732d6780eee70b44c4afdf9be7afb53c3538c584981cc72bdc4617747c4650aa257dc90ed55863da4ea18784acef1e788c4b68856f24095de2cea3a0e086231c206725210efab61c0a2b879d24bfa71a0056c1d9a152c7bd4b38c7fd57d8ae2c29ee173b1f09a642403b6a8e59cbc99f29367a546054122a26d8f65faecec864c0c9f5e6a385893eb9d56e12d590b9d23c5093fdd24967d24b3b5ce8099ad7e7ed16798760d807142c8eb4b7f01b11f9f795f0f534d64ede132e025f4445f58e712b53d73f730832da468c14e7b0d95e0d197ad075f1afa486d8cad0b91a4f3c02b4abd7a006ca137344fcb1332811a33723a6bd2efea5190f6b6ade9053aa48cb355b96fd8a2e0ab8b2c3a4ad7c01e8a22430fc5ad4509712980d92ae693ac0f2b2dda018a6e4cf068d2d373ed8f0d8fcb3619ab1bbec934e1e3ce15f660f4d21a3349d7aceff859ffb7690a88667d0680abc00f6b5a6823929ae204859af045000c1c11776864d5493c318f1efa42b6779c6b3bc733f4ac5a1387e5b17a4c16eb51e09b77171070e386a5bef622bbc6588c3775340908f1ea08e54150fca7ce285d97e7bbefab9c4a71aa4c14751ef2ed39fb22ff32523c16588bdfe53461f403947fe8a1e2707873e212055a5b94e682a5f6b372fc7f7c33d31b7b679c3cff9177f31be1c25dd1e51347790fd1bdd2dfe1f334ada61ffae4e9a56012c6c80cea519e08be762d7030df26f25efda2b0a715617a4c986f45d717e646f8ba0114933fed2940485aede3cfd2cfd7ae0cd5f9e9b19ef5aa2ca321417288f80f8d1667cdfda792336413771a85cf7863f16d727895c027429cb7bb148cc30c891dbfecf8aabe801fa6a3218c595cffe95e53d15855adddfa263946c07405e429acaa830879b0c204e8dec4c25e46e7a90300dd73a8e2ec0cf54d6b2d84be2137f4b238ba9d1720a5d9abba53db314bd2acbd2a35f7ad0427c45f28ca4727c6f747bdd450fbfbcd535665e2bf4e288c8f37055ba8da7529d494ee07d9ed0ee1e0979185d1003f1c06d80cc314f0648704cff208c14527b25ef70197b3a3e1167e508f3a685800c52ee8d8d63068b7112266415bf9b4eb7d9c67605056d37b51a7d4c575e49968badfb603ae985651549eaad2bc40473c343a80c87a90db7464cb6e2810a763b1fb96e160e2ec64b51a02430f50d390dd81e3c46ada15039b0a2ce0b4c32be86e6307fe27e3e55f64831b033ff2fcce58038990d0240ab74ff09bf87981bb69d01c2aea8f0c1a345184f1a967d0acb3856f8b39cac282d854a7dc7b2d44175b55c2d466e4f4d4381d14ae4e755e08c9f87188d97c369c5860cc3c17acb946576f15690d0d9b6a49661219adbf4a3f9cb32fb20fb0796a950f92d8a612574c44518c4a557864bd98e3219da6f02dcd5644381508b205b86641613ec2f85fa0b901175dfb418331ffb85635613dc9358b5743176aff3162004deb732679d5dbe266ddee14db52725c2dd6e69e577b6ca80c552a5bf9d6ca13cdfd918e3c5abf6c390e821c75ebb209db46229e3e0a03ec11580b91c65a884c777be21f2d50feec4f53bf54053a01175288bcdd97da24a62506d25dc53fda3c481e943fa67fe0160e906e67749006ca8eedfd61e253334a5f7a38ce0bd08ea32c6112181125ce4445c8c3aeb0e5485250b8a949fda5e9e772a86f9c21f981973496325e2b7e08b74a18283bfb088ff9584a1a9ff9050ee435593ba243ce0f603d8fbeb420c7b3e05ec81890c472d7a18cb8a5e97396002f305e8187c0a5f96bca1b165fefbacae486ea11c0b315e0e9a2240debfd3e474dbd28dbbd140bca59c6afade3459ec52148baa97d4dae8f9a9ccd12888222b0410c3b62cc1cb54f714e1e6e7824388b9bc4132d272f0ec73e9ac2cd83870d9fd71e87f593a4298f931059a6b1d8a66214a13040e477f6b34f6da9d2236b2715ea59dbbb1fb45c0d8c690a5d82438c638d5104ccd60c5d863b80d6b966fbf6c71c4a491126e2057b7b3f5a4c257299c6e545f66ba9b0f83533cd3ea41168f4c6abc6399d2e78d5e8d36c7da95e0d298e585a8a9687800758e62a4fa97251183c50cad3b8f86ff5bfcfe9e4329411a46eeef05033baae6e0260f52f392684cd8b495fea01e353575b2c595933c32d9ae155f214c5668c94de068068599bbde874c3660fc38e075f7e41b5ee4baaa53385a6632635e9487e45307bd05d5d2d753b88510aba59f6b8438f2d757334dfce6701dd5690eb30da5e2292ebb56ea5e18ecfd3d91bef2cd775189fc995b5e327b690ee7c733726e62947f955cad48b0e31b967b8ab3015ea06f13ae0d04bf947097cb847f0967226b83b534fa8b4fdb0247fd27b50b6bcc67144391264f5c1ab62f02adc658702941f56c161e87a2f8675d84d418821f44944bcbfaf4dd17257e105ff859d926889ed4b6c294b412831cfb35f2cd85bb76a43a104be8f4ff2313e4ae1294b2d9866b04ebde75624f744fece69392e4f9b3d112ed207375a5c5311c1022388b2c8abb9abd4f2a32169178253fe51b0e7600e3c02acb2c68509c6afceeb8e4bbe969748c69bc07e34afb427bb0f9ec879a757ee82c03a948e24e1658a40699b8edcce69c047d35ee6cadffda7605ede51813a36284db93ba51960c605b9f5a9cf051dc1273c9db592e43a7573c9ba299742e14feff797490073503f8a640135e8ee9574a3ce5d69526eb99815b82b141d4bb197f649c1c7cced794be8930f927fc583f51c16f6a5ebf361727178207009b092373fa06823b12091ab27088e360028a788a26681c2b8f888324ae1ba9541fe76065655b9ab9ecd9bcf10b82c02d4b94d95c487ce257b46b94d889402402d3303e1ff98fa0cd8bebe3a34b4c4d2ef37c070de6d7628a05f130ee80a9f520188b17f16198e40a04ae76fdcde84e940fec8e46652463517ad46176a929476abb4566732bace649fe91e93281b335976e7b9c8d3b1f951295ba02ac574424ceed627fac3297b968c81ac35efbc25c56af66f30b690a744e98d9e242c158d73b11e735f771578385ad669e0d899ffa372059821cbc044f46685aed880851e6b3ca13224a21941824920d5bb756c490654e7a9e43ad20f206dae7c492fc1aefecf474aac94d5bcbc9903ba0260fdfb6796ffd9da30857b4caecf624b02efb3ce4bea3fa8c39336ddcbf00204fa82d2411768a6a15995fe6ea94ef21ba18c08d2bf9b2a91dee6ecb3e726a9b97854f99952b1425aa35181743c5f348677864cf6d7288c8d207dab479af830190e6d9831ba8b760cdb3f64cf78e20a9acf09b6e090ab3269f914d1962748db910883ddb21f127495152a00f35be4e7dcfc613972e4b3f8d89aeae953ad7c6d713ce8fd05158a8fd3dfb5dcad0f94140024416d1d35693271ed79573c5eb03d5d0fba613c1a486749eb4793bce80f0e14e06762794ac9f41ae1f664c31957eb3918fa20ad37fb1b026c7578285d292e8d1bd44aaa978f1dc231f41da449ce748203157b7e03dd1861d9229b4f90c3892dcc2b1782aa884fc9c1c7ce7bb00efeecaf1415acace16ed37710fc994c859817cd15a6ef9cc9009cfb1b6dbb4c129aeaaea12e88a8339036b8d58cc8b748992b3198d50349f4f8820b0b753294ce0a5b9ef5bc4d1f7eb13ee3b2405440233a7b0ab902da202081cc5294eb038d04a12b52eb0c8b99ee4106e1b73a5cdce09654351ad3faf512f4643e0f36e9b20a1f1c81b14418baa524c736110389a2b08b457bdc3b0e9dd709a5ed5e068cf7e6f3e0eeb92aae0c0e5d98c423ae6ed9a4d7a7ef94210cf060af9a04b9ac23a6069"}) 05:52:55 executing program 5 (fault-call:2 fault-nth:18): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:55 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000c00000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:55 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0045878, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000c3000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 920.979248][T18671] FAULT_INJECTION: forcing a failure. [ 920.979248][T18671] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 920.992519][T18671] CPU: 1 PID: 18671 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 921.002632][T18671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 921.012695][T18671] Call Trace: [ 921.015967][T18671] dump_stack+0x137/0x19d [ 921.020305][T18671] should_fail+0x23c/0x250 05:52:55 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000d00000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000c4000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 921.024722][T18671] __alloc_pages_nodemask+0xe7/0x310 [ 921.030029][T18671] alloc_pages_current+0x21d/0x310 [ 921.035147][T18671] relay_open_buf+0x20c/0x810 [ 921.039885][T18671] relay_open+0x25b/0x560 [ 921.044220][T18671] do_blk_trace_setup+0x2fa/0x510 [ 921.049305][T18671] blk_trace_setup+0x85/0x110 [ 921.054053][T18671] sg_ioctl_common+0xa02/0x1790 [ 921.058904][T18671] ? do_vfs_ioctl+0x4f7/0xee0 [ 921.063575][T18671] sg_ioctl+0x54/0xc0 [ 921.067554][T18671] ? sg_poll+0x240/0x240 [ 921.071798][T18671] __se_sys_ioctl+0xcb/0x140 05:52:55 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0045878, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 921.076403][T18671] __x64_sys_ioctl+0x3f/0x50 [ 921.080990][T18671] do_syscall_64+0x34/0x50 [ 921.085402][T18671] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 921.091389][T18671] RIP: 0033:0x466459 [ 921.095384][T18671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 921.116122][T18671] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:52:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000c5000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:55 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0189436, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:55 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0xea60}, 0x0, 0x24cc, 0x82}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) [ 921.124534][T18671] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 921.132510][T18671] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 921.140839][T18671] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 921.148810][T18671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 921.156802][T18671] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:55 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000e00000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000c6000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:55 executing program 5 (fault-call:2 fault-nth:19): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:55 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc020660b, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:55 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000f00000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:55 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0xc0281, 0x2) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000140)=""/4096) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0001d0000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 921.432943][T18736] FAULT_INJECTION: forcing a failure. [ 921.432943][T18736] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 921.446204][T18736] CPU: 0 PID: 18736 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 921.455179][T18736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 921.465279][T18736] Call Trace: [ 921.468582][T18736] dump_stack+0x137/0x19d [ 921.472912][T18736] should_fail+0x23c/0x250 [ 921.477327][T18736] __alloc_pages_nodemask+0xe7/0x310 [ 921.482672][T18736] alloc_pages_current+0x21d/0x310 [ 921.488228][T18736] relay_open_buf+0x20c/0x810 [ 921.493037][T18736] relay_open+0x25b/0x560 [ 921.497427][T18736] do_blk_trace_setup+0x2fa/0x510 [ 921.502513][T18736] blk_trace_setup+0x85/0x110 [ 921.507779][T18736] sg_ioctl_common+0xa02/0x1790 [ 921.517498][T18736] ? do_vfs_ioctl+0x4f7/0xee0 [ 921.522183][T18736] sg_ioctl+0x54/0xc0 [ 921.526185][T18736] ? sg_poll+0x240/0x240 [ 921.530429][T18736] __se_sys_ioctl+0xcb/0x140 [ 921.535019][T18736] __x64_sys_ioctl+0x3f/0x50 [ 921.539686][T18736] do_syscall_64+0x34/0x50 [ 921.544130][T18736] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 921.550029][T18736] RIP: 0033:0x466459 [ 921.553926][T18736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 921.574416][T18736] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:52:55 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048120a, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:55 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000001000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0001d1000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 921.582834][T18736] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 921.590908][T18736] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 921.598885][T18736] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 921.606862][T18736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 921.614836][T18736] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00c0ed000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:56 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000001100000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:56 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000080)={0x54, 0x1000, 0x3, {0x9ef0, 0x3}, {0x53, 0x9}, @period={0x5b, 0x1, 0x2, 0x5, 0x1, {0x2, 0x1, 0x1}, 0x1, &(0x7f0000000000)=[0x5]}}) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000140)=0x3) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:56 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481223, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:56 executing program 5 (fault-call:2 fault-nth:20): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0001f8000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:56 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000001200000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:56 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481225, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:56 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000140)=""/186) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) [ 921.872887][T18780] FAULT_INJECTION: forcing a failure. [ 921.872887][T18780] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 921.886683][T18780] CPU: 1 PID: 18780 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 921.895505][T18780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 921.905654][T18780] Call Trace: [ 921.908936][T18780] dump_stack+0x137/0x19d [ 921.913700][T18780] should_fail+0x23c/0x250 05:52:56 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000001800000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 921.918112][T18780] __alloc_pages_nodemask+0xe7/0x310 [ 921.923525][T18780] alloc_pages_current+0x21d/0x310 [ 921.928728][T18780] relay_open_buf+0x20c/0x810 [ 921.933410][T18780] relay_open+0x25b/0x560 [ 921.937742][T18780] do_blk_trace_setup+0x2fa/0x510 [ 921.942833][T18780] blk_trace_setup+0x85/0x110 [ 921.947515][T18780] sg_ioctl_common+0xa02/0x1790 [ 921.952369][T18780] ? do_vfs_ioctl+0x4f7/0xee0 [ 921.957040][T18780] sg_ioctl+0x54/0xc0 [ 921.961063][T18780] ? sg_poll+0x240/0x240 [ 921.965305][T18780] __se_sys_ioctl+0xcb/0x140 [ 921.969962][T18780] __x64_sys_ioctl+0x3f/0x50 [ 921.974639][T18780] do_syscall_64+0x34/0x50 [ 921.979061][T18780] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 921.985001][T18780] RIP: 0033:0x466459 [ 921.988889][T18780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.008501][T18780] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:52:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffe000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:56 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122a, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 922.016914][T18780] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 922.024891][T18780] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 922.032938][T18780] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 922.040981][T18780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 922.049050][T18780] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:56 executing program 5 (fault-call:2 fault-nth:21): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:56 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:56 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000001900000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 922.137624][T18800] FAULT_INJECTION: forcing a failure. [ 922.137624][T18800] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 922.150883][T18800] CPU: 1 PID: 18800 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 922.160395][T18800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 922.170455][T18800] Call Trace: [ 922.173751][T18800] dump_stack+0x137/0x19d [ 922.178097][T18800] should_fail+0x23c/0x250 [ 922.182516][T18800] __alloc_pages_nodemask+0xe7/0x310 05:52:56 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000002200000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 922.187916][T18800] alloc_pages_current+0x21d/0x310 [ 922.193079][T18800] relay_open_buf+0x20c/0x810 [ 922.197762][T18800] relay_open+0x25b/0x560 [ 922.202165][T18800] do_blk_trace_setup+0x2fa/0x510 [ 922.207198][T18800] blk_trace_setup+0x85/0x110 [ 922.211878][T18800] sg_ioctl_common+0xa02/0x1790 [ 922.216798][T18800] ? do_vfs_ioctl+0x4f7/0xee0 [ 922.221477][T18800] sg_ioctl+0x54/0xc0 [ 922.225531][T18800] ? sg_poll+0x240/0x240 [ 922.229776][T18800] __se_sys_ioctl+0xcb/0x140 05:52:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000fff000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 922.234389][T18800] __x64_sys_ioctl+0x3f/0x50 [ 922.238977][T18800] do_syscall_64+0x34/0x50 [ 922.243427][T18800] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 922.249319][T18800] RIP: 0033:0x466459 [ 922.253204][T18800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.274356][T18800] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:52:56 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000002500000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:56 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122b, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 922.282791][T18800] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 922.290763][T18800] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 922.298735][T18800] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 922.306709][T18800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 922.314681][T18800] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:56 executing program 5 (fault-call:2 fault-nth:22): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00feff000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:56 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000004800000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000020000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:56 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122d, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 922.432070][T18829] FAULT_INJECTION: forcing a failure. [ 922.432070][T18829] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 922.445431][T18829] CPU: 1 PID: 18829 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 922.454199][T18829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 922.464257][T18829] Call Trace: [ 922.467544][T18829] dump_stack+0x137/0x19d [ 922.471931][T18829] should_fail+0x23c/0x250 [ 922.476367][T18829] __alloc_pages_nodemask+0xe7/0x310 [ 922.481658][T18829] alloc_pages_current+0x21d/0x310 [ 922.486912][T18829] relay_open_buf+0x20c/0x810 [ 922.491663][T18829] relay_open+0x25b/0x560 [ 922.496066][T18829] do_blk_trace_setup+0x2fa/0x510 [ 922.501098][T18829] blk_trace_setup+0x85/0x110 [ 922.505777][T18829] sg_ioctl_common+0xa02/0x1790 [ 922.510697][T18829] ? do_vfs_ioctl+0x4f7/0xee0 [ 922.515378][T18829] sg_ioctl+0x54/0xc0 [ 922.519385][T18829] ? sg_poll+0x240/0x240 [ 922.523674][T18829] __se_sys_ioctl+0xcb/0x140 [ 922.528268][T18829] __x64_sys_ioctl+0x3f/0x50 [ 922.532909][T18829] do_syscall_64+0x34/0x50 [ 922.537323][T18829] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 922.543215][T18829] RIP: 0033:0x466459 [ 922.547128][T18829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.566738][T18829] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:52:56 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122e, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:56 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000000)=[0x5, 0x1]) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:56 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000004c00000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00ffff030000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 922.575201][T18829] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 922.583173][T18829] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 922.591407][T18829] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 922.599372][T18829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 922.607343][T18829] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:56 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481230, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:56 executing program 5 (fault-call:2 fault-nth:23): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 922.740369][T18867] FAULT_INJECTION: forcing a failure. [ 922.740369][T18867] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 922.753639][T18867] CPU: 0 PID: 18867 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 922.762408][T18867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 922.772463][T18867] Call Trace: [ 922.775736][T18867] dump_stack+0x137/0x19d [ 922.780062][T18867] should_fail+0x23c/0x250 [ 922.784481][T18867] __alloc_pages_nodemask+0xe7/0x310 [ 922.789771][T18867] alloc_pages_current+0x21d/0x310 [ 922.795021][T18867] relay_open_buf+0x20c/0x810 [ 922.799740][T18867] relay_open+0x25b/0x560 [ 922.804095][T18867] do_blk_trace_setup+0x2fa/0x510 [ 922.809756][T18867] blk_trace_setup+0x85/0x110 [ 922.814449][T18867] sg_ioctl_common+0xa02/0x1790 [ 922.819303][T18867] ? do_vfs_ioctl+0x4f7/0xee0 [ 922.823980][T18867] sg_ioctl+0x54/0xc0 [ 922.827959][T18867] ? sg_poll+0x240/0x240 [ 922.832383][T18867] __se_sys_ioctl+0xcb/0x140 [ 922.837094][T18867] __x64_sys_ioctl+0x3f/0x50 [ 922.841770][T18867] do_syscall_64+0x34/0x50 [ 922.846200][T18867] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 922.852108][T18867] RIP: 0033:0x466459 [ 922.856082][T18867] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.876730][T18867] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:52:57 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000006800000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000040000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:57 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048124c, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:57 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x82ab01) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x4100, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000340)={0x56, 0x0, 0x1, {0xdc, 0xb0b}, {0x9, 0x5}, @ramp={0x5, 0x101, {0x8000, 0x8001, 0x3, 0x8aa}}}) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) write$evdev(r2, &(0x7f0000000140)=[{{0x0, 0x2710}, 0x17, 0x4, 0x6}, {{r5, r6/1000+60000}, 0x5, 0x7, 0xffff}, {{r3, r4/1000+60000}, 0x12, 0xfee2, 0x5bca}, {{}, 0x1, 0xffff, 0x1}, {{0x77359400}, 0x5, 0xab9, 0x100}, {{}, 0x12, 0xfff, 0x100}, {{0x0, 0xea60}, 0x5, 0x100, 0x7fff}], 0xa8) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r7 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x321480) ioctl$EVIOCGKEY(r7, 0x80404518, &(0x7f0000000200)=""/68) preadv(r1, &(0x7f0000000980)=[{&(0x7f00000003c0)=""/228, 0xe4}, {&(0x7f00000004c0)=""/153, 0x99}, {&(0x7f0000000580)=""/3, 0x3}, {&(0x7f00000005c0)=""/93, 0x5d}, {&(0x7f0000000640)=""/253, 0xfd}, {&(0x7f0000000740)=""/188, 0xbc}, {&(0x7f0000000800)=""/174, 0xae}, {&(0x7f00000008c0)=""/150, 0x96}], 0x8, 0xc962, 0x5) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) write$evdev(r7, &(0x7f00000002c0)=[{{r8, r9/1000+10000}, 0x4, 0xdfc7, 0x1f}], 0x18) 05:52:57 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000006c00000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 922.885149][T18867] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 922.893160][T18867] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 922.901133][T18867] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 922.909161][T18867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 922.917211][T18867] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:57 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x100) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000080)=""/11) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x15, 0xba, 0x6}], 0x18) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000180)={0x3, 0xd, &(0x7f00000001c0)="6d2f78035f4a5b303819a8de10"}) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:57 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000007200000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000080000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:57 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481258, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000c0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:57 executing program 5 (fault-call:2 fault-nth:24): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:57 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481263, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:57 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000007300000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:57 executing program 3: sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002d0200000000000000000000080001007063690011000200303030303a30303a31302e3000000000"], 0x30}, 0x1, 0x0, 0x0, 0x20004808}, 0x20008811) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x100, 0x9) [ 923.117817][T18909] FAULT_INJECTION: forcing a failure. [ 923.117817][T18909] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 923.131087][T18909] CPU: 0 PID: 18909 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 923.139922][T18909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 923.150023][T18909] Call Trace: [ 923.153303][T18909] dump_stack+0x137/0x19d [ 923.157633][T18909] should_fail+0x23c/0x250 [ 923.162101][T18909] __alloc_pages_nodemask+0xe7/0x310 [ 923.167456][T18909] alloc_pages_current+0x21d/0x310 [ 923.172626][T18909] relay_open_buf+0x20c/0x810 [ 923.177308][T18909] relay_open+0x25b/0x560 [ 923.181640][T18909] do_blk_trace_setup+0x2fa/0x510 [ 923.186783][T18909] blk_trace_setup+0x85/0x110 [ 923.191457][T18909] sg_ioctl_common+0xa02/0x1790 [ 923.196310][T18909] ? do_vfs_ioctl+0x4f7/0xee0 [ 923.200989][T18909] sg_ioctl+0x54/0xc0 [ 923.205042][T18909] ? sg_poll+0x240/0x240 [ 923.209282][T18909] __se_sys_ioctl+0xcb/0x140 [ 923.213865][T18909] __x64_sys_ioctl+0x3f/0x50 [ 923.218455][T18909] do_syscall_64+0x34/0x50 [ 923.222872][T18909] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 923.228771][T18909] RIP: 0033:0x466459 [ 923.232659][T18909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 923.252384][T18909] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 923.260800][T18909] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 05:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00ffff1f0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:57 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481264, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000100000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 923.268782][T18909] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 923.276814][T18909] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 923.284786][T18909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 923.292761][T18909] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:57 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000007400000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:57 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/90, 0x5a}, {&(0x7f00000001c0)=""/120, 0x78}, {&(0x7f0000000240)=""/186, 0xba}], 0x3, 0x2, 0x8001) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r1 = socket$inet(0x2, 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x2) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)={{0x107, 0xff, 0x3, 0x1d1, 0x235, 0x80, 0xb1, 0x8}, "ff5cb1e3e3107f47ceba6fa0e27c896b403a6a6de2810e39bf917800050ac3354296fd4821cd3520d3f716206b98a9a7a2f31aecf2cebea4cf0c947465cfd4d00fea414976fe3900566f855cec93eeec3db6a0bed906e64ed23f8279a7b92461e47aca6a389233ce2f9d349d89a14e1ac4", [[], [], [], [], [], [], [], []]}, 0x891) 05:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000200000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:57 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481268, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:57 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000007a00000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:57 executing program 5 (fault-call:2 fault-nth:25): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000040200000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:57 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481269, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:57 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000fe00000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:57 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x3, 0x604002) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:57 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/connector\x00') r2 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffff, 0x7, 0x1, 0x3, 0xfffb}) fcntl$setstatus(r1, 0x4, 0x400) syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00', r1) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)=""/37, 0x25}, {&(0x7f0000000140)=""/153, 0x99}, {&(0x7f0000000200)=""/76, 0x4c}], 0x3, 0x80000001, 0x7) 05:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000300000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:57 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048126c, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 923.584005][T18973] FAULT_INJECTION: forcing a failure. [ 923.584005][T18973] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 923.597254][T18973] CPU: 0 PID: 18973 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 923.606020][T18973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 923.616134][T18973] Call Trace: [ 923.619407][T18973] dump_stack+0x137/0x19d [ 923.623731][T18973] should_fail+0x23c/0x250 [ 923.628179][T18973] __alloc_pages_nodemask+0xe7/0x310 [ 923.633517][T18973] alloc_pages_current+0x21d/0x310 [ 923.638677][T18973] relay_open_buf+0x20c/0x810 [ 923.643372][T18973] relay_open+0x25b/0x560 [ 923.647693][T18973] do_blk_trace_setup+0x2fa/0x510 [ 923.652740][T18973] blk_trace_setup+0x85/0x110 [ 923.657505][T18973] sg_ioctl_common+0xa02/0x1790 [ 923.662348][T18973] ? do_vfs_ioctl+0x4f7/0xee0 [ 923.667007][T18973] sg_ioctl+0x54/0xc0 [ 923.671035][T18973] ? sg_poll+0x240/0x240 [ 923.675282][T18973] __se_sys_ioctl+0xcb/0x140 [ 923.679863][T18973] __x64_sys_ioctl+0x3f/0x50 [ 923.684448][T18973] do_syscall_64+0x34/0x50 [ 923.688888][T18973] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 923.694832][T18973] RIP: 0033:0x466459 [ 923.698706][T18973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 923.718292][T18973] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 923.726716][T18973] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 05:52:58 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000402000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 923.734666][T18973] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 923.742616][T18973] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 923.750605][T18973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 923.758563][T18973] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:58 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048126f, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:58 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r1 = fsmount(0xffffffffffffffff, 0x1, 0xa) clock_gettime(0x0, &(0x7f0000000000)) write$evdev(r1, &(0x7f0000000140)=[{{0x0, 0x2710}, 0x16, 0x2, 0xff}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000400000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:58 executing program 5 (fault-call:2 fault-nth:26): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:58 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000003000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:58 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481270, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000500000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:58 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = socket$inet(0x2, 0x1, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000000140)=""/156, 0x9c, 0x4023, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x4, 0x3, 0x4, {0xa, 0x4e23, 0x5, @remote, 0x6}}}, 0x80) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000080)={0x2, 0x3, 0xff, 0x4, 0x9, 0x100}) [ 924.127294][T19021] FAULT_INJECTION: forcing a failure. [ 924.127294][T19021] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 924.140539][T19021] CPU: 1 PID: 19021 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 924.149351][T19021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 924.159404][T19021] Call Trace: [ 924.162687][T19021] dump_stack+0x137/0x19d [ 924.167052][T19021] should_fail+0x23c/0x250 [ 924.171546][T19021] __alloc_pages_nodemask+0xe7/0x310 [ 924.176828][T19021] alloc_pages_current+0x21d/0x310 [ 924.182022][T19021] relay_open_buf+0x20c/0x810 [ 924.186698][T19021] relay_open+0x25b/0x560 [ 924.191055][T19021] do_blk_trace_setup+0x2fa/0x510 [ 924.196188][T19021] blk_trace_setup+0x85/0x110 [ 924.200913][T19021] sg_ioctl_common+0xa02/0x1790 [ 924.205767][T19021] ? do_vfs_ioctl+0x4f7/0xee0 [ 924.210441][T19021] sg_ioctl+0x54/0xc0 [ 924.214427][T19021] ? sg_poll+0x240/0x240 [ 924.218692][T19021] __se_sys_ioctl+0xcb/0x140 [ 924.223375][T19021] __x64_sys_ioctl+0x3f/0x50 [ 924.228022][T19021] do_syscall_64+0x34/0x50 [ 924.232521][T19021] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 924.238426][T19021] RIP: 0033:0x466459 [ 924.242316][T19021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 924.261922][T19021] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 924.270348][T19021] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 05:52:58 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000204000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:58 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481274, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:58 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000604000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:58 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481275, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:58 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000005000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:58 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000006000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 924.278318][T19021] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 924.286286][T19021] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 924.294273][T19021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 924.302322][T19021] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000600000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:58 executing program 5 (fault-call:2 fault-nth:27): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:58 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0xce79, 0x200c02) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r1 = socket$inet(0x2, 0x1, 0x1) r2 = socket$inet(0x2, 0x1, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x1ff, 0x5, 0x49, 0x6}) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x240400) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:58 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481278, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:58 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000406000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000040600000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 924.501140][T19067] FAULT_INJECTION: forcing a failure. [ 924.501140][T19067] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 924.514384][T19067] CPU: 1 PID: 19067 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 924.523154][T19067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 924.533212][T19067] Call Trace: [ 924.536483][T19067] dump_stack+0x137/0x19d [ 924.540816][T19067] should_fail+0x23c/0x250 [ 924.545318][T19067] __alloc_pages_nodemask+0xe7/0x310 [ 924.550655][T19067] alloc_pages_current+0x21d/0x310 [ 924.555796][T19067] relay_open_buf+0x20c/0x810 [ 924.560485][T19067] relay_open+0x25b/0x560 [ 924.564821][T19067] do_blk_trace_setup+0x2fa/0x510 [ 924.569908][T19067] blk_trace_setup+0x85/0x110 [ 924.574586][T19067] sg_ioctl_common+0xa02/0x1790 [ 924.579438][T19067] ? do_vfs_ioctl+0x4f7/0xee0 [ 924.584179][T19067] sg_ioctl+0x54/0xc0 [ 924.588156][T19067] ? sg_poll+0x240/0x240 [ 924.592404][T19067] __se_sys_ioctl+0xcb/0x140 [ 924.597007][T19067] __x64_sys_ioctl+0x3f/0x50 05:52:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000700000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:58 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000007000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:58 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048127a, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:52:58 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000001600)='/dev/input/event#\x00', 0x2, 0x801) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000001500)=""/240) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{r1, r2/1000+10000}, 0x15, 0x7c, 0x5}], 0x18) r3 = signalfd4(r0, &(0x7f0000001340)={[0x3]}, 0x8, 0xc0000) clock_gettime(0x0, &(0x7f0000001380)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000013c0)={0x0, 0x0}) write$evdev(r3, &(0x7f0000001400)=[{{0x77359400}, 0x11, 0x18a, 0x1}, {{r4, r5/1000+10000}, 0x15, 0xe2ba, 0x3ce0}, {{0x0, 0x2710}, 0x2, 0x2, 0x2000008}, {{0x77359400}, 0x14, 0x3, 0x5}, {{r6, r7/1000+60000}, 0x15, 0xc1, 0x4}, {{0x77359400}, 0x1, 0x6, 0x1}, {{}, 0x16, 0x7ff, 0xfff}], 0xa8) clock_gettime(0x1, &(0x7f00000014c0)) r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r8, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000001300)=0x9) preadv(r8, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mq_timedsend(r8, &(0x7f00000011c0)="f89015f95dcff71aa716906657472b9394cc8d0757fa188f3aeb378b45e52a5bb028037ba41be99035ba30a4b2e8849a0fc32829a5e0e2e0a9de5ef1d1c913a015e13e7dacf2470b5970cca9e954031b1e8b20954ab878a24f5467cc781c26c2a81c2eae0ae43f5970098e710b63d47d7e0d5f9bb7577018b63d96ebc3dec8febffe496604", 0x85, 0x7, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000140)=0x7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000180)=0x5) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000000)=[0x0, 0x7f]) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) ioctl$EVIOCGSND(r8, 0x8040451a, &(0x7f0000001280)=""/91) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f00000001c0)=""/4096) [ 924.601620][T19067] do_syscall_64+0x34/0x50 [ 924.606040][T19067] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 924.611938][T19067] RIP: 0033:0x466459 [ 924.615823][T19067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 924.635507][T19067] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 924.644005][T19067] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 05:52:59 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 924.651972][T19067] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 924.659946][T19067] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 924.668085][T19067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 924.676086][T19067] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000800000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:59 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0xea60}, 0x15, 0x5571, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:59 executing program 5 (fault-call:2 fault-nth:28): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:59 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000fc07000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000900000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:59 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x2], 0x0, 0x8, 0x4}) 05:52:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000a00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 924.863171][T19123] FAULT_INJECTION: forcing a failure. [ 924.863171][T19123] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 924.876520][T19123] CPU: 1 PID: 19123 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 924.885286][T19123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 924.895514][T19123] Call Trace: [ 924.898795][T19123] dump_stack+0x137/0x19d [ 924.903163][T19123] should_fail+0x23c/0x250 [ 924.907577][T19123] __alloc_pages_nodemask+0xe7/0x310 [ 924.912945][T19123] alloc_pages_current+0x21d/0x310 [ 924.918064][T19123] relay_open_buf+0x20c/0x810 [ 924.922746][T19123] relay_open+0x25b/0x560 [ 924.927119][T19123] do_blk_trace_setup+0x2fa/0x510 [ 924.932221][T19123] blk_trace_setup+0x85/0x110 [ 924.937064][T19123] sg_ioctl_common+0xa02/0x1790 [ 924.941936][T19123] ? do_vfs_ioctl+0x4f7/0xee0 [ 924.946611][T19123] sg_ioctl+0x54/0xc0 [ 924.950597][T19123] ? sg_poll+0x240/0x240 [ 924.954919][T19123] __se_sys_ioctl+0xcb/0x140 05:52:59 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000009000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 924.959510][T19123] __x64_sys_ioctl+0x3f/0x50 [ 924.964111][T19123] do_syscall_64+0x34/0x50 [ 924.968666][T19123] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 924.974566][T19123] RIP: 0033:0x466459 [ 924.978455][T19123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 924.998363][T19123] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:52:59 executing program 3: setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x71, 0x0, 0x40, "c3eab3db6014e38d5502ede845f8d948", "475d640f69b92e956677331261989221ea05d94306464bb61f9920220373ccd3c0d291754686db076496511fafd158f6ff1c68e6d180ed7674065e85505b79b49151281e959f922faebfc27f479a7f2c40e31f39d808a71a926beb1f"}, 0x71, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) futex(&(0x7f0000000240)=0x1, 0x8c, 0x0, &(0x7f00000002c0)={r3, r4+60000000}, &(0x7f0000000300), 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000200)=[{{0x77359400}, 0x1, 0x7c, 0x401}, {{r1, r2/1000+60000}, 0x15, 0x0, 0xffffff1a}], 0x30) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:52:59 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000a000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 925.006779][T19123] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 925.014750][T19123] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 925.022730][T19123] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 925.030703][T19123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 925.038674][T19123] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:59 executing program 5 (fault-call:2 fault-nth:29): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:59 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x3], 0x0, 0x8, 0x4}) 05:52:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f0000000280)={0x260, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x20, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffe00}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80}]}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x493e}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xcd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x101}]}, @TIPC_NLA_NODE={0x184, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x73400000}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "8b1e1f92b2a30d8f1f1f827268eed246fc8ba4b9"}}, @TIPC_NLA_NODE_ID={0xec, 0x3, "aaff85fdd728dd5225c0cac9b0f5c2fdca60e1f4d4e2d2c836960f1a2aa3930dbc1b7619870220338d8c4678faa1db29e2be0d09c1c5aef135357c48db90fc7bd399f4a37ee0737b50bc7488d1b9e999f1242dc4af4bd8a77257dddd8ebfd9191f9a5b8da934044c25f10a17a99abc82b7b0be3859389dbbd634a343f44a025253aeb347883c58419dd68e99ee18091c36f6bec259bacabc9b6d9fba435cf122ffc02de39689e88f38d3d377122bca52ae8be838ec35af2884e3dd2e10c00c8cc9c64a8139ed6ed90f5ef4c51591c05af761c526b49af1076a4f2a7dff988ed8b04f3757219b4a8a"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x4c, 0x3, "4f9c6b507f6e4df6585ca6202baca82c248d53283ca2f7f8c9fde6fdb935c5617e46b473a2368443f12440e98334ce59b8dc2d4ac85fb515621e26e97197a950f31c0700d511945d"}]}, @TIPC_NLA_SOCK={0x58, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6c3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xde}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7d0}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x40}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4b916ae4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}]}, 0x260}}, 0x400c0c4) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100), 0x0) write$char_usb(0xffffffffffffffff, &(0x7f0000000140)="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", 0x101) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10, 0x80000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)={0x20000010}) 05:52:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000b00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:59 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000009c0a000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 925.150406][T19150] blktrace: Concurrent blktraces are not allowed on sg0 [ 925.160910][T19153] FAULT_INJECTION: forcing a failure. [ 925.160910][T19153] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 925.174153][T19153] CPU: 0 PID: 19153 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 925.182911][T19153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 925.192958][T19153] Call Trace: [ 925.196235][T19153] dump_stack+0x137/0x19d [ 925.200572][T19153] should_fail+0x23c/0x250 [ 925.204988][T19153] __alloc_pages_nodemask+0xe7/0x310 [ 925.210280][T19153] alloc_pages_current+0x21d/0x310 [ 925.215438][T19153] relay_open_buf+0x20c/0x810 [ 925.220131][T19153] relay_open+0x25b/0x560 [ 925.224438][T19153] do_blk_trace_setup+0x2fa/0x510 [ 925.229444][T19153] blk_trace_setup+0x85/0x110 [ 925.234156][T19153] sg_ioctl_common+0xa02/0x1790 [ 925.239001][T19153] ? do_vfs_ioctl+0x4f7/0xee0 [ 925.243707][T19153] sg_ioctl+0x54/0xc0 [ 925.247688][T19153] ? sg_poll+0x240/0x240 [ 925.251931][T19153] __se_sys_ioctl+0xcb/0x140 [ 925.256521][T19153] __x64_sys_ioctl+0x3f/0x50 [ 925.261115][T19153] do_syscall_64+0x34/0x50 [ 925.265616][T19153] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 925.271589][T19153] RIP: 0033:0x466459 [ 925.275477][T19153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:52:59 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000b000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:59 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x4], 0x0, 0x8, 0x4}) 05:52:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000c00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 925.295083][T19153] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 925.303570][T19153] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 925.311540][T19153] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 925.319510][T19153] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 925.327478][T19153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 925.335485][T19153] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:52:59 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000140)=[{{0x77359400}, 0x16, 0x8, 0xcf}, {{0x0, 0xea60}, 0x0, 0x29b, 0x8}, {{0x77359400}, 0x16, 0x1, 0x7c6}, {{}, 0x1, 0x4, 0x6}, {{0x0, 0x2710}, 0x15, 0x6, 0x7}, {{r2, r3/1000+60000}, 0x15, 0x4, 0x6}, {{0x77359400}, 0x1f, 0xb85, 0x57}, {{}, 0x11, 0x4, 0x5}], 0xc0) 05:52:59 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000c000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:52:59 executing program 5 (fault-call:2 fault-nth:30): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:52:59 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x5], 0x0, 0x8, 0x4}) [ 925.467388][T19190] FAULT_INJECTION: forcing a failure. [ 925.467388][T19190] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 925.481171][T19190] CPU: 0 PID: 19190 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 925.490015][T19190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 925.500098][T19190] Call Trace: [ 925.503375][T19190] dump_stack+0x137/0x19d [ 925.507704][T19190] should_fail+0x23c/0x250 [ 925.512119][T19190] __alloc_pages_nodemask+0xe7/0x310 [ 925.517410][T19190] alloc_pages_current+0x21d/0x310 [ 925.522598][T19190] relay_open_buf+0x20c/0x810 [ 925.527289][T19190] relay_open+0x25b/0x560 [ 925.531624][T19190] do_blk_trace_setup+0x2fa/0x510 [ 925.536659][T19190] blk_trace_setup+0x85/0x110 [ 925.541342][T19190] sg_ioctl_common+0xa02/0x1790 [ 925.546200][T19190] ? do_vfs_ioctl+0x4f7/0xee0 [ 925.550919][T19190] sg_ioctl+0x54/0xc0 [ 925.554898][T19190] ? sg_poll+0x240/0x240 [ 925.559140][T19190] __se_sys_ioctl+0xcb/0x140 [ 925.563731][T19190] __x64_sys_ioctl+0x3f/0x50 [ 925.568324][T19190] do_syscall_64+0x34/0x50 [ 925.572775][T19190] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 925.578749][T19190] RIP: 0033:0x466459 [ 925.582636][T19190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 925.602249][T19190] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:52:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000d00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:52:59 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000d000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 925.610665][T19190] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 925.618635][T19190] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 925.626779][T19190] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 925.635620][T19190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 925.643590][T19190] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:00 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000e000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:00 executing program 5 (fault-call:2 fault-nth:31): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:00 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x6], 0x0, 0x8, 0x4}) 05:53:00 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000e00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:00 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000f000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 925.774712][T19208] blktrace: Concurrent blktraces are not allowed on sg0 [ 925.783360][T19207] FAULT_INJECTION: forcing a failure. [ 925.783360][T19207] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 925.796615][T19207] CPU: 1 PID: 19207 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 925.805374][T19207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 925.815476][T19207] Call Trace: [ 925.818755][T19207] dump_stack+0x137/0x19d [ 925.823202][T19207] should_fail+0x23c/0x250 [ 925.827919][T19207] __alloc_pages_nodemask+0xe7/0x310 [ 925.833247][T19207] alloc_pages_current+0x21d/0x310 [ 925.838373][T19207] relay_open_buf+0x20c/0x810 [ 925.843136][T19207] relay_open+0x25b/0x560 [ 925.847472][T19207] do_blk_trace_setup+0x2fa/0x510 [ 925.852495][T19207] blk_trace_setup+0x85/0x110 [ 925.858610][T19207] sg_ioctl_common+0xa02/0x1790 [ 925.863479][T19207] ? do_vfs_ioctl+0x4f7/0xee0 [ 925.868161][T19207] sg_ioctl+0x54/0xc0 [ 925.872175][T19207] ? sg_poll+0x240/0x240 [ 925.876417][T19207] __se_sys_ioctl+0xcb/0x140 [ 925.881004][T19207] __x64_sys_ioctl+0x3f/0x50 [ 925.885637][T19207] do_syscall_64+0x34/0x50 [ 925.890062][T19207] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 925.895962][T19207] RIP: 0033:0x466459 [ 925.899851][T19207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 925.919540][T19207] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 925.927958][T19207] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 925.935929][T19207] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 925.943906][T19207] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 925.951882][T19207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 925.959896][T19207] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:00 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000f00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:00 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000002010000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:00 executing program 5 (fault-call:2 fault-nth:32): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:00 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x7], 0x0, 0x8, 0x4}) 05:53:00 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000011000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 926.065850][T19228] FAULT_INJECTION: forcing a failure. [ 926.065850][T19228] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 926.079125][T19228] CPU: 0 PID: 19228 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 926.087945][T19228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 926.098042][T19228] Call Trace: [ 926.101323][T19228] dump_stack+0x137/0x19d [ 926.105676][T19228] should_fail+0x23c/0x250 [ 926.110149][T19228] __alloc_pages_nodemask+0xe7/0x310 [ 926.115456][T19228] alloc_pages_current+0x21d/0x310 [ 926.120578][T19228] relay_open_buf+0x20c/0x810 [ 926.125339][T19228] relay_open+0x25b/0x560 [ 926.129711][T19228] do_blk_trace_setup+0x2fa/0x510 [ 926.134745][T19228] blk_trace_setup+0x85/0x110 [ 926.139430][T19228] sg_ioctl_common+0xa02/0x1790 [ 926.144287][T19228] ? do_vfs_ioctl+0x4f7/0xee0 [ 926.148967][T19228] sg_ioctl+0x54/0xc0 [ 926.152952][T19228] ? sg_poll+0x240/0x240 [ 926.157194][T19228] __se_sys_ioctl+0xcb/0x140 [ 926.161789][T19228] __x64_sys_ioctl+0x3f/0x50 [ 926.166443][T19228] do_syscall_64+0x34/0x50 [ 926.170867][T19228] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 926.176794][T19228] RIP: 0033:0x466459 [ 926.180684][T19228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 926.200413][T19228] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:00 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000012000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:00 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0x80000000]}, 0x8, 0x80800) setsockopt$inet_tcp_int(r0, 0x6, 0x11, &(0x7f0000000080)=0x7, 0x4) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r1, &(0x7f0000000040)="e2", 0x35000) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002000)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00', 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000001e00)=ANY=[@ANYRESHEX, @ANYRES16=r5, @ANYRESDEC=r2, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000002400)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYRESDEC=r3], 0x1d4}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000a40)={{}, 0x0, 0x1a, @unused=[0x7fff, 0x7f, 0x7ff, 0x9], @devid=r3}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000440)={{}, 0x0, 0x32, @inherit={0x78, &(0x7f00000000c0)={0x1, 0x6, 0xc3, 0x8, {0x0, 0x4, 0x10000, 0xfffffffffffffff9, 0x8}, [0xffff, 0x4, 0x80000001, 0x6, 0x5d8000, 0x1ff]}}, @devid=r3}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000540)={{}, 0x0, 0x4, @inherit={0x70, &(0x7f0000000100)={0x1, 0x5, 0x9, 0x0, {0x0, 0x7, 0x3ff, 0x27, 0x7be}, [0x2, 0x1, 0x80000001, 0x53c, 0x80000000]}}, @devid=r3}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000480)={r3, "13144fac723c8b45b925ebd52917041b"}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000000140)={0x3, 0x8, @start={r3, 0x1, "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", "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"}, [0xffffffffffffffbf, 0x0, 0x8, 0x9, 0x7fff, 0x800, 0xfff, 0x4, 0x9, 0x7, 0x9, 0x2af, 0xadb, 0x1, 0x1, 0x6a, 0x7, 0x86, 0x3, 0x1, 0xe45a, 0x3, 0x9, 0x20, 0x7fd, 0x800, 0x9, 0x7, 0xb041, 0x6, 0x1, 0x2050, 0x4, 0x192, 0x81, 0x3, 0x1, 0xb0f, 0x0, 0x6, 0x6, 0xfffffffffffffffe, 0x7fffffff, 0x4, 0x0, 0x6, 0x100, 0x4, 0x40000000000000, 0x9, 0x7, 0x800, 0x0, 0x8000, 0x8, 0x5, 0x9, 0x4, 0xffffffffffffffff, 0x101, 0x401, 0x2, 0x9, 0x629]}) 05:53:00 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000001000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 926.209075][T19228] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 926.217240][T19228] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 926.225325][T19228] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 926.233474][T19228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 926.241444][T19228] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:00 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000018000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:00 executing program 5 (fault-call:2 fault-nth:33): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:00 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000019000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 926.359397][T19253] FAULT_INJECTION: forcing a failure. [ 926.359397][T19253] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 926.372801][T19253] CPU: 0 PID: 19253 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 926.381564][T19253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 926.391612][T19253] Call Trace: [ 926.394945][T19253] dump_stack+0x137/0x19d [ 926.399521][T19253] should_fail+0x23c/0x250 [ 926.403940][T19253] __alloc_pages_nodemask+0xe7/0x310 [ 926.409237][T19253] alloc_pages_current+0x21d/0x310 [ 926.414349][T19253] relay_open_buf+0x20c/0x810 [ 926.419791][T19253] relay_open+0x25b/0x560 [ 926.424130][T19253] do_blk_trace_setup+0x2fa/0x510 [ 926.429768][T19253] blk_trace_setup+0x85/0x110 [ 926.434479][T19253] sg_ioctl_common+0xa02/0x1790 [ 926.439416][T19253] ? do_vfs_ioctl+0x4f7/0xee0 [ 926.444092][T19253] sg_ioctl+0x54/0xc0 [ 926.448080][T19253] ? sg_poll+0x240/0x240 [ 926.452326][T19253] __se_sys_ioctl+0xcb/0x140 05:53:00 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000041000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 926.456918][T19253] __x64_sys_ioctl+0x3f/0x50 [ 926.461633][T19253] do_syscall_64+0x34/0x50 [ 926.466053][T19253] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 926.471952][T19253] RIP: 0033:0x466459 [ 926.475837][T19253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 926.495438][T19253] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:00 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000020000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:00 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000001100000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:00 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x8], 0x0, 0x8, 0x4}) [ 926.503912][T19253] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 926.511920][T19253] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 926.519964][T19253] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 926.527932][T19253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 926.535899][T19253] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:00 executing program 5 (fault-call:2 fault-nth:34): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:00 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x9], 0x0, 0x8, 0x4}) 05:53:00 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000001020000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 926.660660][T19281] FAULT_INJECTION: forcing a failure. [ 926.660660][T19281] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 926.673913][T19281] CPU: 1 PID: 19281 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 926.682741][T19281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 926.692797][T19281] Call Trace: [ 926.696082][T19281] dump_stack+0x137/0x19d [ 926.700414][T19281] should_fail+0x23c/0x250 [ 926.704830][T19281] __alloc_pages_nodemask+0xe7/0x310 [ 926.710118][T19281] alloc_pages_current+0x21d/0x310 [ 926.715320][T19281] relay_open_buf+0x20c/0x810 [ 926.720001][T19281] relay_open+0x25b/0x560 [ 926.724376][T19281] do_blk_trace_setup+0x2fa/0x510 [ 926.729493][T19281] blk_trace_setup+0x85/0x110 [ 926.734174][T19281] sg_ioctl_common+0xa02/0x1790 [ 926.739025][T19281] ? do_vfs_ioctl+0x4f7/0xee0 [ 926.743756][T19281] sg_ioctl+0x54/0xc0 [ 926.747782][T19281] ? sg_poll+0x240/0x240 [ 926.752021][T19281] __se_sys_ioctl+0xcb/0x140 [ 926.756620][T19281] __x64_sys_ioctl+0x3f/0x50 [ 926.761207][T19281] do_syscall_64+0x34/0x50 [ 926.765625][T19281] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 926.771581][T19281] RIP: 0033:0x466459 [ 926.775467][T19281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 926.795116][T19281] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 926.803665][T19281] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 05:53:01 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x65ee) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={0x77359400}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x2, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) r5 = open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x801) mq_timedsend(r5, &(0x7f0000000300)="e94cf623e11363a2e555a4210be626d1e83d04674fc260c543019b1e07473a93c9b8d3ceaaeab1004530cffb0c32b314c6cb16a587fa69bb69ab34d328516d5530b0d14f04e4a5fff78e9277acc123ee0598c83dead4d26c6fb9844e203e2d7aa07241fa8e6eba9a37", 0x69, 0x8001, &(0x7f0000000380)) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{r1, r2/1000+60000}, 0x2, 0x101, 0x1}, {{}, 0x0, 0x0, 0xff}, {{}, 0x4, 0x6, 0xfffff801}, {{}, 0x17, 0x7f, 0xa8e}, {{r3, r4/1000+10000}, 0x6ca83883c42a0f25, 0x2, 0x5}], 0x78) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:53:01 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000001200000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 926.811638][T19281] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 926.819607][T19281] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 926.827585][T19281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 926.835558][T19281] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:01 executing program 5 (fault-call:2 fault-nth:35): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:01 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0xa], 0x0, 0x8, 0x4}) 05:53:01 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000022000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 926.954043][T19312] FAULT_INJECTION: forcing a failure. [ 926.954043][T19312] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 926.967312][T19312] CPU: 0 PID: 19312 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 926.976187][T19312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 926.986245][T19312] Call Trace: [ 926.989524][T19312] dump_stack+0x137/0x19d [ 926.993857][T19312] should_fail+0x23c/0x250 [ 926.998265][T19312] __alloc_pages_nodemask+0xe7/0x310 [ 927.003587][T19312] alloc_pages_current+0x21d/0x310 [ 927.008720][T19312] relay_open_buf+0x20c/0x810 [ 927.013409][T19312] relay_open+0x25b/0x560 [ 927.017743][T19312] do_blk_trace_setup+0x2fa/0x510 [ 927.022773][T19312] blk_trace_setup+0x85/0x110 [ 927.027459][T19312] sg_ioctl_common+0xa02/0x1790 [ 927.032310][T19312] ? do_vfs_ioctl+0x4f7/0xee0 [ 927.037204][T19312] sg_ioctl+0x54/0xc0 [ 927.041182][T19312] ? sg_poll+0x240/0x240 [ 927.045422][T19312] __se_sys_ioctl+0xcb/0x140 [ 927.050010][T19312] __x64_sys_ioctl+0x3f/0x50 [ 927.054643][T19312] do_syscall_64+0x34/0x50 [ 927.059067][T19312] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 927.064961][T19312] RIP: 0033:0x466459 [ 927.068843][T19312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 927.088592][T19312] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 927.097003][T19312] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 05:53:01 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000001800000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:01 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000025000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:01 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000003f000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:01 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000040000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:01 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0xb], 0x0, 0x8, 0x4}) [ 927.105037][T19312] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 927.113005][T19312] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 927.120982][T19312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 927.129021][T19312] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:01 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000048000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:01 executing program 5 (fault-call:2 fault-nth:36): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 927.184348][T19332] blktrace: Concurrent blktraces are not allowed on sg0 [ 927.252013][T19339] FAULT_INJECTION: forcing a failure. [ 927.252013][T19339] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 927.265292][T19339] CPU: 0 PID: 19339 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 927.274062][T19339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 927.284175][T19339] Call Trace: [ 927.287451][T19339] dump_stack+0x137/0x19d [ 927.291820][T19339] should_fail+0x23c/0x250 [ 927.296280][T19339] __alloc_pages_nodemask+0xe7/0x310 [ 927.301651][T19339] alloc_pages_current+0x21d/0x310 [ 927.307159][T19339] relay_open_buf+0x20c/0x810 [ 927.311879][T19339] relay_open+0x25b/0x560 [ 927.316244][T19339] do_blk_trace_setup+0x2fa/0x510 [ 927.321326][T19339] blk_trace_setup+0x85/0x110 [ 927.326006][T19339] sg_ioctl_common+0xa02/0x1790 [ 927.330858][T19339] ? do_vfs_ioctl+0x4f7/0xee0 [ 927.335551][T19339] sg_ioctl+0x54/0xc0 [ 927.339536][T19339] ? sg_poll+0x240/0x240 [ 927.343847][T19339] __se_sys_ioctl+0xcb/0x140 [ 927.348516][T19339] __x64_sys_ioctl+0x3f/0x50 [ 927.353158][T19339] do_syscall_64+0x34/0x50 [ 927.357583][T19339] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 927.363474][T19339] RIP: 0033:0x466459 [ 927.367362][T19339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 927.387190][T19339] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 927.395635][T19339] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 927.403606][T19339] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 927.411668][T19339] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 927.419633][T19339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 927.427601][T19339] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:02 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x15, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x1) 05:53:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000001900000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:02 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0xc], 0x0, 0x8, 0x4}) 05:53:02 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000004c000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:02 executing program 5 (fault-call:2 fault-nth:37): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 927.839160][T19361] FAULT_INJECTION: forcing a failure. [ 927.839160][T19361] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 927.852438][T19361] CPU: 1 PID: 19361 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 927.861317][T19361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 927.871375][T19361] Call Trace: [ 927.874698][T19361] dump_stack+0x137/0x19d [ 927.879030][T19361] should_fail+0x23c/0x250 [ 927.883449][T19361] __alloc_pages_nodemask+0xe7/0x310 05:53:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000002000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:02 executing program 3: sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000000)) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) [ 927.888851][T19361] alloc_pages_current+0x21d/0x310 [ 927.893969][T19361] relay_open_buf+0x20c/0x810 [ 927.898677][T19361] relay_open+0x25b/0x560 [ 927.903011][T19361] do_blk_trace_setup+0x2fa/0x510 [ 927.908162][T19361] blk_trace_setup+0x85/0x110 [ 927.912861][T19361] sg_ioctl_common+0xa02/0x1790 [ 927.917749][T19361] ? do_vfs_ioctl+0x4f7/0xee0 [ 927.922502][T19361] sg_ioctl+0x54/0xc0 [ 927.926489][T19361] ? sg_poll+0x240/0x240 [ 927.930729][T19361] __se_sys_ioctl+0xcb/0x140 05:53:02 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000068000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000102000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 927.935318][T19361] __x64_sys_ioctl+0x3f/0x50 [ 927.939914][T19361] do_syscall_64+0x34/0x50 [ 927.944339][T19361] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 927.950235][T19361] RIP: 0033:0x466459 [ 927.954125][T19361] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 927.973734][T19361] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000002200000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 927.982151][T19361] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 927.990151][T19361] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 927.998236][T19361] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 928.006296][T19361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 928.014442][T19361] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:02 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000006c000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:02 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x1c, 0x80000) fcntl$dupfd(r1, 0x0, r0) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:53:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000002500000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:02 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000072000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:02 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0xd], 0x0, 0x8, 0x4}) 05:53:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000002e00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:02 executing program 5 (fault-call:2 fault-nth:38): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:02 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000073000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:02 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x10000, 0x4000) getdents64(r0, &(0x7f0000000140)=""/187, 0xbb) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x1, 0x82eb01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local}, &(0x7f0000000240)=0x1c, 0x80800) r2 = socket$inet(0x2, 0x1, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) r3 = fsmount(0xffffffffffffffff, 0x0, 0x83) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000000280)=""/181) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) sync_file_range(r2, 0x3f, 0x8004, 0x7) write$char_usb(r1, &(0x7f0000000040)="e2", 0x35000) socket(0x15, 0xa, 0x9) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x280000a, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open_tree(r4, &(0x7f0000000080)='./file0\x00', 0x1101) 05:53:02 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000074000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 928.277631][T19416] blktrace: Concurrent blktraces are not allowed on sg0 [ 928.292912][T19417] FAULT_INJECTION: forcing a failure. [ 928.292912][T19417] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 928.306149][T19417] CPU: 1 PID: 19417 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 928.314909][T19417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 05:53:02 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000007a000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 928.324963][T19417] Call Trace: [ 928.328244][T19417] dump_stack+0x137/0x19d [ 928.332573][T19417] should_fail+0x23c/0x250 [ 928.336992][T19417] __alloc_pages_nodemask+0xe7/0x310 [ 928.342281][T19417] alloc_pages_current+0x21d/0x310 [ 928.347399][T19417] relay_open_buf+0x20c/0x810 [ 928.352089][T19417] relay_open+0x25b/0x560 [ 928.356432][T19417] do_blk_trace_setup+0x2fa/0x510 [ 928.361463][T19417] blk_trace_setup+0x85/0x110 [ 928.366137][T19417] sg_ioctl_common+0xa02/0x1790 [ 928.371168][T19417] ? do_vfs_ioctl+0x4f7/0xee0 05:53:02 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000a9c000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 928.375839][T19417] sg_ioctl+0x54/0xc0 [ 928.379861][T19417] ? sg_poll+0x240/0x240 [ 928.384103][T19417] __se_sys_ioctl+0xcb/0x140 [ 928.388698][T19417] __x64_sys_ioctl+0x3f/0x50 [ 928.393297][T19417] do_syscall_64+0x34/0x50 [ 928.397722][T19417] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 928.403621][T19417] RIP: 0033:0x466459 [ 928.407538][T19417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:53:02 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000c0ed000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000022e00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:02 executing program 5 (fault-call:2 fault-nth:39): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 928.427155][T19417] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 928.435608][T19417] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 928.443837][T19417] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 928.452244][T19417] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 928.460211][T19417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 928.468185][T19417] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:02 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0xe], 0x0, 0x8, 0x4}) 05:53:02 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000007fc000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:02 executing program 3: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000100)=""/209) clock_gettime(0x0, &(0x7f0000000000)) write$evdev(0xffffffffffffffff, &(0x7f0000000040)=[{{}, 0x1, 0x7c, 0x2}, {{0x77359400}, 0x15, 0x9, 0x4d9}], 0x30) [ 928.529658][T19446] FAULT_INJECTION: forcing a failure. [ 928.529658][T19446] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 928.542926][T19446] CPU: 1 PID: 19446 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 928.551690][T19446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 928.561747][T19446] Call Trace: [ 928.565020][T19446] dump_stack+0x137/0x19d [ 928.569355][T19446] should_fail+0x23c/0x250 [ 928.573773][T19446] __alloc_pages_nodemask+0xe7/0x310 05:53:02 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000fffe000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 928.579062][T19446] alloc_pages_current+0x21d/0x310 [ 928.584178][T19446] relay_open_buf+0x20c/0x810 [ 928.588934][T19446] relay_open+0x25b/0x560 [ 928.593268][T19446] do_blk_trace_setup+0x2fa/0x510 [ 928.598293][T19446] blk_trace_setup+0x85/0x110 [ 928.603103][T19446] sg_ioctl_common+0xa02/0x1790 [ 928.607948][T19446] ? do_vfs_ioctl+0x4f7/0xee0 [ 928.612619][T19446] sg_ioctl+0x54/0xc0 [ 928.616605][T19446] ? sg_poll+0x240/0x240 [ 928.620881][T19446] __se_sys_ioctl+0xcb/0x140 [ 928.625536][T19446] __x64_sys_ioctl+0x3f/0x50 05:53:02 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000fff000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 928.630126][T19446] do_syscall_64+0x34/0x50 [ 928.635068][T19446] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 928.640962][T19446] RIP: 0033:0x466459 [ 928.644855][T19446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 928.664466][T19446] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000022f00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:03 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000feff000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000140)="e27b2c2dbde041c19258d71e6167ea351d0fef4e3dc8c2c71a94dcafbfc0af35f25b070011c8ce40049f316766af4fa7ccce43fa826dd38ee547c6dc121b830a89cd7ea0be8fb63ddfe10113e0cf442cdaa86c7abf89e3de530f138e600137da4e4ddf3220143791c6e4f08905f4bbf54667bc2564617f15c46c5451c477d971801565116d39b2f5bc7406b43233cc9bc7e4e672f9d18f1f901a9c68d31e000000f889fa", 0xa4) [ 928.672880][T19446] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 928.680848][T19446] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 928.688823][T19446] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 928.696800][T19446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 928.704772][T19446] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:03 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x10], 0x0, 0x8, 0x4}) 05:53:03 executing program 5 (fault-call:2 fault-nth:40): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000003f00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:03 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000040000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 928.833791][T19481] FAULT_INJECTION: forcing a failure. [ 928.833791][T19481] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 928.847095][T19481] CPU: 0 PID: 19481 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 928.855884][T19481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 928.866198][T19481] Call Trace: [ 928.869549][T19481] dump_stack+0x137/0x19d [ 928.873910][T19481] should_fail+0x23c/0x250 [ 928.878411][T19481] __alloc_pages_nodemask+0xe7/0x310 [ 928.883708][T19481] alloc_pages_current+0x21d/0x310 [ 928.889499][T19481] relay_open_buf+0x20c/0x810 [ 928.894209][T19481] relay_open+0x25b/0x560 [ 928.898554][T19481] do_blk_trace_setup+0x2fa/0x510 [ 928.903577][T19481] blk_trace_setup+0x85/0x110 [ 928.908291][T19481] sg_ioctl_common+0xa02/0x1790 [ 928.913143][T19481] ? do_vfs_ioctl+0x4f7/0xee0 [ 928.917810][T19481] sg_ioctl+0x54/0xc0 [ 928.921927][T19481] ? sg_poll+0x240/0x240 [ 928.926159][T19481] __se_sys_ioctl+0xcb/0x140 [ 928.930743][T19481] __x64_sys_ioctl+0x3f/0x50 [ 928.935324][T19481] do_syscall_64+0x34/0x50 [ 928.939743][T19481] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 928.945821][T19481] RIP: 0033:0x466459 [ 928.949703][T19481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 928.969302][T19481] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000004000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000140)=""/249) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) [ 928.977713][T19481] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 928.985696][T19481] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 928.993672][T19481] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 929.001641][T19481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 929.009618][T19481] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:03 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000080000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000024400000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:03 executing program 3: memfd_create(&(0x7f0000000140)='/dev/input/event#\x00', 0x2) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000000)="06172012e5fa1f9b0e376a642cabe20cd8002f8d4ed62857e61037de03d8b3207dd32ca6d3033ecd308f386431afef051d40b27d39b1bb5cca1c4f4b55db9519b870d49841c9f82504f0bc0bd6724e1996203f5ddcbb8004a5edb301b5d61506df13473f998bd1a9138e51d52dbdbb63ba6d2bc315781201079348997d4d7eaaa5f0388e95bab750ea8ed826922ef8add20000000008000000fdf6", 0x9b) 05:53:03 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000c0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000024500000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001240)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000000080)=""/10, 0xa}, {&(0x7f0000001140)=""/209, 0xd1}], 0x3, 0x0, 0x3d6e) 05:53:03 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x11], 0x0, 0x8, 0x4}) 05:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000034700000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:03 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000ffff1f0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x9}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:53:03 executing program 5 (fault-call:2 fault-nth:41): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 929.309857][T19540] FAULT_INJECTION: forcing a failure. [ 929.309857][T19540] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 929.323151][T19540] CPU: 0 PID: 19540 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 929.331914][T19540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 929.341977][T19540] Call Trace: [ 929.345264][T19540] dump_stack+0x137/0x19d [ 929.349596][T19540] should_fail+0x23c/0x250 [ 929.354006][T19540] __alloc_pages_nodemask+0xe7/0x310 [ 929.359299][T19540] alloc_pages_current+0x21d/0x310 [ 929.364417][T19540] relay_open_buf+0x20c/0x810 [ 929.369106][T19540] relay_open+0x25b/0x560 [ 929.373471][T19540] do_blk_trace_setup+0x2fa/0x510 [ 929.378629][T19540] blk_trace_setup+0x85/0x110 [ 929.383310][T19540] sg_ioctl_common+0xa02/0x1790 [ 929.388176][T19540] ? do_vfs_ioctl+0x4f7/0xee0 [ 929.392866][T19540] sg_ioctl+0x54/0xc0 [ 929.396848][T19540] ? sg_poll+0x240/0x240 [ 929.401142][T19540] __se_sys_ioctl+0xcb/0x140 [ 929.405820][T19540] __x64_sys_ioctl+0x3f/0x50 [ 929.410415][T19540] do_syscall_64+0x34/0x50 [ 929.414836][T19540] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 929.420732][T19540] RIP: 0033:0x466459 [ 929.424674][T19540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 929.444456][T19540] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:03 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000ffffe00000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000004800000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 929.452877][T19540] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 929.460856][T19540] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 929.469266][T19540] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 929.477498][T19540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 929.485471][T19540] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000000)=0x4) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000080)=0xd0f) r1 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x10842, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000180)=0x3) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:53:03 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000100000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000004c00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:03 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000200000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/39) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:53:04 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x12], 0x0, 0x8, 0x4}) 05:53:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000006000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:04 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000040200000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:04 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup3(r1, r1, 0x0) write$evdev(r2, &(0x7f0000000100), 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000080)=0x2) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:53:04 executing program 5 (fault-call:2 fault-nth:42): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 929.851303][T19590] blktrace: Concurrent blktraces are not allowed on sg0 [ 929.861088][T19592] FAULT_INJECTION: forcing a failure. [ 929.861088][T19592] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 929.878142][T19592] CPU: 0 PID: 19592 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 929.886942][T19592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 929.897024][T19592] Call Trace: [ 929.900358][T19592] dump_stack+0x137/0x19d [ 929.904686][T19592] should_fail+0x23c/0x250 [ 929.909190][T19592] __alloc_pages_nodemask+0xe7/0x310 [ 929.914524][T19592] alloc_pages_current+0x21d/0x310 [ 929.920509][T19592] relay_open_buf+0x20c/0x810 [ 929.925228][T19592] relay_open+0x25b/0x560 [ 929.929553][T19592] do_blk_trace_setup+0x2fa/0x510 [ 929.934675][T19592] blk_trace_setup+0x85/0x110 [ 929.939401][T19592] sg_ioctl_common+0xa02/0x1790 [ 929.944783][T19592] ? do_vfs_ioctl+0x4f7/0xee0 [ 929.950429][T19592] sg_ioctl+0x54/0xc0 [ 929.954416][T19592] ? sg_poll+0x240/0x240 [ 929.958659][T19592] __se_sys_ioctl+0xcb/0x140 [ 929.963291][T19592] __x64_sys_ioctl+0x3f/0x50 [ 929.967880][T19592] do_syscall_64+0x34/0x50 [ 929.972303][T19592] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 929.978323][T19592] RIP: 0033:0x466459 [ 929.982213][T19592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:53:04 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000300000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000006800000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 930.001865][T19592] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 930.010284][T19592] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 930.018333][T19592] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 930.026310][T19592] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 930.034284][T19592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 930.042361][T19592] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:04 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000140)=""/136) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:53:04 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000400000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:04 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x25], 0x0, 0x8, 0x4}) 05:53:04 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000500000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:04 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x48], 0x0, 0x8, 0x4}) 05:53:04 executing program 5 (fault-call:2 fault-nth:43): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000006c00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:04 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x9, 0x2400) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) [ 930.209615][T19625] FAULT_INJECTION: forcing a failure. [ 930.209615][T19625] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 930.222936][T19625] CPU: 0 PID: 19625 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 930.231769][T19625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.241924][T19625] Call Trace: [ 930.245200][T19625] dump_stack+0x137/0x19d [ 930.249535][T19625] should_fail+0x23c/0x250 [ 930.253948][T19625] __alloc_pages_nodemask+0xe7/0x310 [ 930.259238][T19625] alloc_pages_current+0x21d/0x310 [ 930.264408][T19625] relay_open_buf+0x20c/0x810 [ 930.269139][T19625] relay_open+0x25b/0x560 [ 930.273477][T19625] do_blk_trace_setup+0x2fa/0x510 [ 930.278507][T19625] blk_trace_setup+0x85/0x110 [ 930.283188][T19625] sg_ioctl_common+0xa02/0x1790 [ 930.288042][T19625] ? do_vfs_ioctl+0x4f7/0xee0 [ 930.292768][T19625] sg_ioctl+0x54/0xc0 [ 930.296749][T19625] ? sg_poll+0x240/0x240 [ 930.300995][T19625] __se_sys_ioctl+0xcb/0x140 [ 930.305736][T19625] __x64_sys_ioctl+0x3f/0x50 [ 930.310333][T19625] do_syscall_64+0x34/0x50 [ 930.314751][T19625] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 930.320695][T19625] RIP: 0033:0x466459 [ 930.324583][T19625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 930.344189][T19625] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:04 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000600000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000007400000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 930.352690][T19625] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 930.361238][T19625] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 930.369207][T19625] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 930.377197][T19625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 930.385169][T19625] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:04 executing program 5 (fault-call:2 fault-nth:44): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:04 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x4c], 0x0, 0x8, 0x4}) 05:53:04 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) [ 930.472231][T19650] FAULT_INJECTION: forcing a failure. [ 930.472231][T19650] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 930.485526][T19650] CPU: 0 PID: 19650 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 930.494343][T19650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.504429][T19650] Call Trace: [ 930.507707][T19650] dump_stack+0x137/0x19d [ 930.512028][T19650] should_fail+0x23c/0x250 [ 930.516440][T19650] __alloc_pages_nodemask+0xe7/0x310 [ 930.521732][T19650] alloc_pages_current+0x21d/0x310 [ 930.526858][T19650] relay_open_buf+0x20c/0x810 [ 930.531716][T19650] relay_open+0x25b/0x560 [ 930.536085][T19650] do_blk_trace_setup+0x2fa/0x510 [ 930.541711][T19650] blk_trace_setup+0x85/0x110 [ 930.546401][T19650] sg_ioctl_common+0xa02/0x1790 [ 930.551256][T19650] ? do_vfs_ioctl+0x4f7/0xee0 [ 930.555963][T19650] sg_ioctl+0x54/0xc0 [ 930.559945][T19650] ? sg_poll+0x240/0x240 [ 930.564183][T19650] __se_sys_ioctl+0xcb/0x140 [ 930.568783][T19650] __x64_sys_ioctl+0x3f/0x50 [ 930.573407][T19650] do_syscall_64+0x34/0x50 [ 930.577823][T19650] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 930.583718][T19650] RIP: 0033:0x466459 [ 930.587682][T19650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 930.607355][T19650] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:04 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000040600000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 930.615776][T19650] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 930.623842][T19650] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 930.631810][T19650] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 930.640565][T19650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 930.648536][T19650] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:05 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x200, 0x22, 0x10}, 0x18) write$evdev(r1, &(0x7f0000000140)=[{{0x77359400}, 0x1, 0x7c, 0x2}, {{0x0, 0xea60}, 0x14, 0x1}, {{0x0, 0xea60}, 0x14, 0x0, 0x1}], 0x48) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:53:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000007700000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:05 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000700000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:05 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000800000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000007900000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:05 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f00000002c0)={{[], 0x1}, {}, 0x10, 0x0, 0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)="e3afdaa655c767e1250eb6763ffee71fd6d63a1310", 0x15, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/422], 0x108}) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r1 = socket$inet(0x2, 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x2) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f0000000340)={0x8, 0x28, [], 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0]}) 05:53:05 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000900000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000007a00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:05 executing program 5 (fault-call:2 fault-nth:45): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 931.075707][T19704] FAULT_INJECTION: forcing a failure. [ 931.075707][T19704] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 931.089052][T19704] CPU: 0 PID: 19704 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 931.097822][T19704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 931.107875][T19704] Call Trace: [ 931.111158][T19704] dump_stack+0x137/0x19d [ 931.115550][T19704] should_fail+0x23c/0x250 [ 931.119960][T19704] __alloc_pages_nodemask+0xe7/0x310 [ 931.125350][T19704] alloc_pages_current+0x21d/0x310 [ 931.130500][T19704] relay_open_buf+0x20c/0x810 [ 931.135184][T19704] relay_open+0x25b/0x560 [ 931.139579][T19704] do_blk_trace_setup+0x2fa/0x510 [ 931.144608][T19704] blk_trace_setup+0x85/0x110 [ 931.149364][T19704] sg_ioctl_common+0xa02/0x1790 [ 931.154242][T19704] ? do_vfs_ioctl+0x4f7/0xee0 [ 931.158954][T19704] sg_ioctl+0x54/0xc0 [ 931.162942][T19704] ? sg_poll+0x240/0x240 [ 931.167238][T19704] __se_sys_ioctl+0xcb/0x140 [ 931.171829][T19704] __x64_sys_ioctl+0x3f/0x50 [ 931.176423][T19704] do_syscall_64+0x34/0x50 [ 931.180900][T19704] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 931.186869][T19704] RIP: 0033:0x466459 [ 931.190781][T19704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 931.210387][T19704] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:05 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x60], 0x0, 0x8, 0x4}) 05:53:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000007b00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:05 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000a00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:05 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{}, 0x11, 0x7c, 0x200002}], 0xfffffffffffffc18) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000002b00)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000002b40)=0x100) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000140)=""/201) r3 = accept$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) clock_gettime(0x0, &(0x7f0000002a00)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000002940)=[{{&(0x7f0000000240)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000500)=[{&(0x7f00000002c0)=""/249, 0xf9}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/193, 0xc1}], 0x3, &(0x7f0000000540)=""/180, 0xb4}, 0x80000001}, {{&(0x7f0000000600)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000680)=""/220, 0xdc}], 0x1, &(0x7f00000007c0)=""/15, 0xf}, 0x200}, {{&(0x7f0000000800)=@alg, 0x80, &(0x7f0000001900)=[{&(0x7f0000000880)=""/38, 0x26}, {&(0x7f00000008c0)=""/31, 0x1f}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x3, &(0x7f0000001940)=""/4096, 0x1000}, 0x1}], 0x3, 0x40, &(0x7f0000002a40)={r4, r5+10000000}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$char_usb(r1, &(0x7f0000000000)="cb", 0x1) r6 = openat$cgroup_type(r1, &(0x7f0000002a80)='cgroup.type\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r6, &(0x7f0000002ac0)={0x40000000}) 05:53:05 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000b00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 931.218800][T19704] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 931.226843][T19704] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 931.234817][T19704] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 931.242789][T19704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 931.250798][T19704] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:05 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:53:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000007c00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:05 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000c00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:05 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000000)) 05:53:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000007d00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:05 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000d00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:05 executing program 5 (fault-call:2 fault-nth:46): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:05 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x68], 0x0, 0x8, 0x4}) [ 931.588516][T19753] FAULT_INJECTION: forcing a failure. [ 931.588516][T19753] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 931.601813][T19753] CPU: 0 PID: 19753 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 931.610582][T19753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 931.620639][T19753] Call Trace: [ 931.623917][T19753] dump_stack+0x137/0x19d [ 931.628249][T19753] should_fail+0x23c/0x250 [ 931.632660][T19753] __alloc_pages_nodemask+0xe7/0x310 [ 931.637990][T19753] alloc_pages_current+0x21d/0x310 [ 931.643177][T19753] relay_open_buf+0x20c/0x810 [ 931.647864][T19753] relay_open+0x25b/0x560 [ 931.652278][T19753] do_blk_trace_setup+0x2fa/0x510 [ 931.657309][T19753] blk_trace_setup+0x85/0x110 [ 931.661990][T19753] sg_ioctl_common+0xa02/0x1790 [ 931.666847][T19753] ? do_vfs_ioctl+0x4f7/0xee0 [ 931.671594][T19753] sg_ioctl+0x54/0xc0 [ 931.675577][T19753] ? sg_poll+0x240/0x240 [ 931.679848][T19753] __se_sys_ioctl+0xcb/0x140 [ 931.684441][T19753] __x64_sys_ioctl+0x3f/0x50 [ 931.689126][T19753] do_syscall_64+0x34/0x50 [ 931.693609][T19753] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 931.699507][T19753] RIP: 0033:0x466459 [ 931.703475][T19753] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 931.723076][T19753] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r2, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000002140)='TIPC\x00', r1) sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000021c0)={&(0x7f0000002180)={0x1c, r3, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40801}, 0x400c0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r3, 0x400, 0x70bd25, 0x25dfdbfe, {{}, {}, {0x18, 0x17, {0xd, 0x80, @udp='udp:syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20001}, 0x804) r4 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000200)=[0x3, 0xffffff00]) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r4, &(0x7f0000000040)="e2", 0x35000) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0x9}) 05:53:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00ffffff8c00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 931.731662][T19753] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 931.739641][T19753] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 931.747611][T19753] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 931.755677][T19753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 931.763660][T19753] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:06 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000e00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:06 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) clock_gettime(0x5, &(0x7f0000000000)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000080)=[{{r1, r2/1000+60000}, 0x1f, 0x8201, 0x80000000}, {{}, 0xe, 0x0, 0x28}], 0x30) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:53:06 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000f00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000b800000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:06 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000001000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000001ba00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:06 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(r0, &(0x7f0000000480)=[{{0x0, 0xea60}, 0x4, 0x30ff, 0x7}], 0x18) r1 = dup3(r0, r0, 0x0) write$evdev(r1, 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0xea60}, 0x16, 0x7c, 0x2}], 0x18) r2 = socket$inet(0x2, 0x1, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000000)=""/2) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) write$evdev(r3, &(0x7f0000000400)=[{{r4, r5/1000+60000}, 0x4, 0xfff, 0x1}, {{r6, r7/1000+10000}, 0x14, 0x2, 0x7}, {{}, 0x0, 0x1714}, {{0x77359400}, 0x3, 0x1, 0x80}], 0x60) preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000140)=""/234, 0xea}, {&(0x7f0000000080)=""/43, 0x2b}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000280)=""/136, 0x88}], 0x4, 0xb3f, 0x2) write$char_usb(r0, &(0x7f0000000040)="e6", 0x1) 05:53:06 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000001100000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:06 executing program 5 (fault-call:2 fault-nth:47): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000001bb00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:06 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000001200000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:06 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0xea60}, 0x1, 0x0, 0x21a}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:53:06 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x6c], 0x0, 0x8, 0x4}) [ 932.169356][T19809] FAULT_INJECTION: forcing a failure. [ 932.169356][T19809] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 932.182617][T19809] CPU: 0 PID: 19809 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 932.191379][T19809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 932.201545][T19809] Call Trace: [ 932.204825][T19809] dump_stack+0x137/0x19d [ 932.209206][T19809] should_fail+0x23c/0x250 [ 932.213618][T19809] __alloc_pages_nodemask+0xe7/0x310 [ 932.218921][T19809] alloc_pages_current+0x21d/0x310 [ 932.224104][T19809] relay_open_buf+0x20c/0x810 [ 932.229113][T19809] relay_open+0x25b/0x560 [ 932.233446][T19809] do_blk_trace_setup+0x2fa/0x510 [ 932.238537][T19809] blk_trace_setup+0x85/0x110 [ 932.243219][T19809] sg_ioctl_common+0xa02/0x1790 [ 932.248075][T19809] ? do_vfs_ioctl+0x4f7/0xee0 [ 932.252747][T19809] sg_ioctl+0x54/0xc0 [ 932.256744][T19809] ? sg_poll+0x240/0x240 [ 932.260985][T19809] __se_sys_ioctl+0xcb/0x140 [ 932.265578][T19809] __x64_sys_ioctl+0x3f/0x50 [ 932.270218][T19809] do_syscall_64+0x34/0x50 [ 932.274715][T19809] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 932.280675][T19809] RIP: 0033:0x466459 [ 932.284568][T19809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 932.304726][T19809] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000edc000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:06 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000001800000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:06 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000001900000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 932.313139][T19809] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 932.321169][T19809] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 932.329229][T19809] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 932.337422][T19809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 932.345463][T19809] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:06 executing program 5 (fault-call:2 fault-nth:48): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:06 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x74], 0x0, 0x8, 0x4}) 05:53:06 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000002000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fstat(r0, &(0x7f00000001c0)) ioctl$KDSKBMODE(r0, 0x5603, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000080)) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r1, &(0x7f0000000040)="e2", 0x35000) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000000)={0x0, 0x9e, &(0x7f0000000140)="8c7aa601918e09ea0844c8a1810b7e231570794ea5503da04fa12515e2efdfc68a9318ef409df0866ef6c4baa658e50db0814dd2698e259389ba6725c019e8060b744eef7c9387ca89278e999ed1b3526f814ca413149fb7aaabddbbc112eae22c3621b9075f4900a36003bd23f9bf0f129a4bf3f1d759d8f5ecd63d0b5a90bf0c912f1c6c69c445cdb74cff1a7b5370e4a423078080c97de39179cb4f26"}) 05:53:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000c200000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 932.453956][T19832] FAULT_INJECTION: forcing a failure. [ 932.453956][T19832] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 932.467433][T19832] CPU: 0 PID: 19832 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 05:53:06 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000102000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:06 executing program 5 (fault-call:2 fault-nth:49): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:06 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x7a], 0x0, 0x8, 0x4}) [ 932.467455][T19832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 932.467466][T19832] Call Trace: [ 932.467473][T19832] dump_stack+0x137/0x19d [ 932.467494][T19832] should_fail+0x23c/0x250 [ 932.467510][T19832] __alloc_pages_nodemask+0xe7/0x310 [ 932.467535][T19832] alloc_pages_current+0x21d/0x310 [ 932.467588][T19832] relay_open_buf+0x20c/0x810 [ 932.467612][T19832] relay_open+0x25b/0x560 [ 932.467635][T19832] do_blk_trace_setup+0x2fa/0x510 05:53:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000c300000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 932.467749][T19832] blk_trace_setup+0x85/0x110 [ 932.467771][T19832] sg_ioctl_common+0xa02/0x1790 [ 932.467792][T19832] ? do_vfs_ioctl+0x4f7/0xee0 [ 932.467810][T19832] sg_ioctl+0x54/0xc0 [ 932.467828][T19832] ? sg_poll+0x240/0x240 [ 932.467885][T19832] __se_sys_ioctl+0xcb/0x140 [ 932.467903][T19832] __x64_sys_ioctl+0x3f/0x50 [ 932.467949][T19832] do_syscall_64+0x34/0x50 [ 932.467969][T19832] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 932.467988][T19832] RIP: 0033:0x466459 05:53:06 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000002200000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 932.467998][T19832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 932.468032][T19832] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 932.468051][T19832] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 932.468064][T19832] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 932.468076][T19832] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 05:53:07 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000002500000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 932.468089][T19832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 932.468101][T19832] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 [ 932.569238][T19850] FAULT_INJECTION: forcing a failure. [ 932.569238][T19850] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 932.724750][T19850] CPU: 0 PID: 19850 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 932.724776][T19850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 932.724786][T19850] Call Trace: [ 932.724792][T19850] dump_stack+0x137/0x19d 05:53:07 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000003f00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 932.724810][T19850] should_fail+0x23c/0x250 [ 932.724823][T19850] __alloc_pages_nodemask+0xe7/0x310 [ 932.724874][T19850] alloc_pages_current+0x21d/0x310 [ 932.724901][T19850] relay_open_buf+0x20c/0x810 [ 932.724928][T19850] relay_open+0x25b/0x560 [ 932.724951][T19850] do_blk_trace_setup+0x2fa/0x510 [ 932.725026][T19850] blk_trace_setup+0x85/0x110 [ 932.784742][T19850] sg_ioctl_common+0xa02/0x1790 [ 932.789686][T19850] ? do_vfs_ioctl+0x4f7/0xee0 [ 932.794389][T19850] sg_ioctl+0x54/0xc0 05:53:07 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000004000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 932.798367][T19850] ? sg_poll+0x240/0x240 [ 932.802635][T19850] __se_sys_ioctl+0xcb/0x140 [ 932.807251][T19850] __x64_sys_ioctl+0x3f/0x50 [ 932.812034][T19850] do_syscall_64+0x34/0x50 [ 932.816519][T19850] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 932.822479][T19850] RIP: 0033:0x466459 [ 932.826365][T19850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:53:07 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000004800000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 932.846026][T19850] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 932.854444][T19850] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 932.862416][T19850] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 932.870384][T19850] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 932.878348][T19850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 932.886309][T19850] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:07 executing program 5 (fault-call:2 fault-nth:50): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:07 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000000)={0x20, 0x5, 0x1ff, 0x2, 0xffff7fff, 0x11cf}) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) preadv(r1, &(0x7f0000001580)=[{&(0x7f0000000140)=""/171, 0xab}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000080)=""/25, 0x19}, {&(0x7f0000001200)=""/193, 0xc1}, {&(0x7f0000001300)=""/13, 0xd}, {&(0x7f0000001340)=""/253, 0xfd}, {&(0x7f0000001440)=""/73, 0x49}, {&(0x7f00000014c0)=""/62, 0x3e}, {&(0x7f0000001500)=""/70, 0x46}], 0x9, 0x101, 0x0) 05:53:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000c400000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:07 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) [ 932.973750][T19875] FAULT_INJECTION: forcing a failure. [ 932.973750][T19875] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 932.987057][T19875] CPU: 0 PID: 19875 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 932.995831][T19875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 933.005908][T19875] Call Trace: [ 933.005918][T19875] dump_stack+0x137/0x19d [ 933.005940][T19875] should_fail+0x23c/0x250 05:53:07 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000004c00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 933.005957][T19875] __alloc_pages_nodemask+0xe7/0x310 05:53:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000c500000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 933.005982][T19875] alloc_pages_current+0x21d/0x310 05:53:07 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000006800000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 933.006035][T19875] relay_open_buf+0x20c/0x810 05:53:07 executing program 5 (fault-call:2 fault-nth:51): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:07 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x2], 0x0, 0x8, 0x4}) [ 933.006055][T19875] relay_open+0x25b/0x560 [ 933.006072][T19875] do_blk_trace_setup+0x2fa/0x510 05:53:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000c600000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:07 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x3], 0x0, 0x8, 0x4}) [ 933.006090][T19875] blk_trace_setup+0x85/0x110 05:53:07 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000006c00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 933.006113][T19875] sg_ioctl_common+0xa02/0x1790 [ 933.006132][T19875] ? do_vfs_ioctl+0x4f7/0xee0 [ 933.006146][T19875] sg_ioctl+0x54/0xc0 [ 933.006201][T19875] ? sg_poll+0x240/0x240 05:53:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000001d000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 933.006215][T19875] __se_sys_ioctl+0xcb/0x140 [ 933.006228][T19875] __x64_sys_ioctl+0x3f/0x50 [ 933.006329][T19875] do_syscall_64+0x34/0x50 [ 933.006352][T19875] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 933.006375][T19875] RIP: 0033:0x466459 [ 933.006388][T19875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 933.006405][T19875] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 933.006423][T19875] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 933.006495][T19875] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 933.006504][T19875] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 933.006513][T19875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 933.006555][T19875] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 [ 933.180702][T19903] blktrace: Concurrent blktraces are not allowed on sg0 [ 933.428835][T19913] FAULT_INJECTION: forcing a failure. [ 933.428835][T19913] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 933.442067][T19913] CPU: 1 PID: 19913 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 933.450861][T19913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 933.460947][T19913] Call Trace: [ 933.464228][T19913] dump_stack+0x137/0x19d [ 933.468627][T19913] should_fail+0x23c/0x250 [ 933.473053][T19913] __alloc_pages_nodemask+0xe7/0x310 [ 933.478343][T19913] alloc_pages_current+0x21d/0x310 [ 933.483502][T19913] relay_open_buf+0x20c/0x810 [ 933.488190][T19913] relay_open+0x25b/0x560 [ 933.492592][T19913] do_blk_trace_setup+0x2fa/0x510 [ 933.497665][T19913] blk_trace_setup+0x85/0x110 [ 933.502406][T19913] sg_ioctl_common+0xa02/0x1790 [ 933.507261][T19913] ? do_vfs_ioctl+0x4f7/0xee0 [ 933.511944][T19913] sg_ioctl+0x54/0xc0 [ 933.515925][T19913] ? sg_poll+0x240/0x240 [ 933.520243][T19913] __se_sys_ioctl+0xcb/0x140 [ 933.524937][T19913] __x64_sys_ioctl+0x3f/0x50 [ 933.529621][T19913] do_syscall_64+0x34/0x50 [ 933.534043][T19913] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 933.539949][T19913] RIP: 0033:0x466459 [ 933.543827][T19913] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 933.563611][T19913] RSP: 002b:00007f34509df188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 933.572084][T19913] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000466459 [ 933.580033][T19913] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 933.588039][T19913] RBP: 00007f34509df1d0 R08: 0000000000000000 R09: 0000000000000000 [ 933.596078][T19913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 933.604025][T19913] R13: 00007fff7524d55f R14: 00007f34509df300 R15: 0000000000022000 05:53:07 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) write$evdev(r1, &(0x7f0000000140)=[{{0x77359400}, 0x0, 0x9}, {{0x77359400}, 0x2, 0x1f6, 0x3}, {{0x77359400}, 0x1, 0x7, 0x5}], 0x48) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:53:07 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000007200000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000001d100000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:07 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x4], 0x0, 0x8, 0x4}) 05:53:08 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000007300000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:08 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x5], 0x0, 0x8, 0x4}) [ 933.694232][T19942] blktrace: Concurrent blktraces are not allowed on sg0 05:53:08 executing program 5 (fault-call:2 fault-nth:52): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xa, 0xb1f281) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(r1, &(0x7f00000001c0)=[{{0x77359400}, 0x2, 0x800, 0x10000}, {{0x0, 0xea60}, 0x2, 0x8, 0x5}, {{0x0, 0x2710}, 0x14, 0x3, 0x10001}, {{r2, r3/1000+10000}, 0x0, 0x81, 0x5}, {{0x0, 0x2710}, 0x16, 0xffff, 0xfffffffd}], 0x78) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00005fe000/0x3000)=nil, 0x3000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$evdev(r4, &(0x7f0000000140)=[{{}, 0x16, 0x8001, 0xe6}, {{}, 0x2a, 0x8001, 0x6}, {{0x77359400}, 0x15, 0x8000, 0x7}], 0x48) 05:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00ffffffe200000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:08 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000007400000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 933.772960][T19955] blktrace: Concurrent blktraces are not allowed on sg0 05:53:08 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000007a00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffffff000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 933.833708][T19967] FAULT_INJECTION: forcing a failure. [ 933.833708][T19967] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 933.846995][T19967] CPU: 0 PID: 19967 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 933.855849][T19967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 933.865973][T19967] Call Trace: [ 933.869276][T19967] dump_stack+0x137/0x19d [ 933.873682][T19967] should_fail+0x23c/0x250 [ 933.878128][T19967] __alloc_pages_nodemask+0xe7/0x310 05:53:08 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000ffffff8c00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffffff500000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 933.883515][T19967] alloc_pages_current+0x21d/0x310 [ 933.888628][T19967] relay_open_buf+0x20c/0x810 [ 933.893409][T19967] relay_open+0x25b/0x560 [ 933.897810][T19967] do_blk_trace_setup+0x2fa/0x510 [ 933.902877][T19967] blk_trace_setup+0x85/0x110 [ 933.907558][T19967] sg_ioctl_common+0xa02/0x1790 [ 933.912554][T19967] ? do_vfs_ioctl+0x4f7/0xee0 [ 933.917261][T19967] sg_ioctl+0x54/0xc0 [ 933.921510][T19967] ? sg_poll+0x240/0x240 [ 933.925749][T19967] __se_sys_ioctl+0xcb/0x140 05:53:08 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000a9c00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffffff600000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:08 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000edc000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 933.930330][T19967] __x64_sys_ioctl+0x3f/0x50 [ 933.934979][T19967] do_syscall_64+0x34/0x50 [ 933.939420][T19967] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 933.945334][T19967] RIP: 0033:0x466459 [ 933.949221][T19967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 933.968823][T19967] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:08 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x6], 0x0, 0x8, 0x4}) [ 933.977237][T19967] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 933.985206][T19967] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 933.993263][T19967] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 934.001331][T19967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 934.009352][T19967] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:08 executing program 5 (fault-call:2 fault-nth:53): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20000000002, 0x822b81) write$evdev(r0, &(0x7f0000000100), 0x0) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{}, 0x15, 0xf001, 0x8001}, {{r1, r2/1000+10000}, 0x17, 0x7c, 0xea}, {{r5, r6/1000+60000}, 0x3, 0x0, 0x5}, {{0x77359400}, 0x14, 0x0, 0xfffffffb}, {{0x77359400}, 0x3, 0x0, 0x9}, {{r3, r4/1000+60000}, 0x12, 0x1, 0x4}], 0x90) 05:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000001f800000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:08 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000fffffff000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 934.101191][T20010] FAULT_INJECTION: forcing a failure. [ 934.101191][T20010] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 934.114465][T20010] CPU: 1 PID: 20010 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 934.123320][T20010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 934.133376][T20010] Call Trace: [ 934.136654][T20010] dump_stack+0x137/0x19d [ 934.141085][T20010] should_fail+0x23c/0x250 [ 934.145510][T20010] __alloc_pages_nodemask+0xe7/0x310 05:53:08 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x7], 0x0, 0x8, 0x4}) [ 934.150803][T20010] alloc_pages_current+0x21d/0x310 [ 934.155931][T20010] relay_open_buf+0x20c/0x810 [ 934.160812][T20010] relay_open+0x25b/0x560 [ 934.165167][T20010] do_blk_trace_setup+0x2fa/0x510 [ 934.170193][T20010] blk_trace_setup+0x85/0x110 [ 934.174922][T20010] sg_ioctl_common+0xa02/0x1790 [ 934.180190][T20010] ? do_vfs_ioctl+0x4f7/0xee0 [ 934.184946][T20010] sg_ioctl+0x54/0xc0 [ 934.188929][T20010] ? sg_poll+0x240/0x240 [ 934.193164][T20010] __se_sys_ioctl+0xcb/0x140 05:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffffdf900000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 934.197756][T20010] __x64_sys_ioctl+0x3f/0x50 [ 934.202344][T20010] do_syscall_64+0x34/0x50 [ 934.206760][T20010] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 934.212652][T20010] RIP: 0033:0x466459 [ 934.216545][T20010] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 934.236248][T20010] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:08 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000fffffff600000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffffffb00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 934.244947][T20010] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 934.252925][T20010] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 934.260899][T20010] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 934.268879][T20010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 934.276861][T20010] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:08 executing program 3: write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)=0x101f) write$char_usb(0xffffffffffffffff, &(0x7f0000000040)="e2", 0x35000) 05:53:08 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x8], 0x0, 0x8, 0x4}) 05:53:08 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000fffffdf900000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffffdfd00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:08 executing program 5 (fault-call:2 fault-nth:54): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 934.390531][T20043] blktrace: Concurrent blktraces are not allowed on sg0 [ 934.405918][T20051] FAULT_INJECTION: forcing a failure. [ 934.405918][T20051] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 934.419180][T20051] CPU: 1 PID: 20051 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 934.428542][T20051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 05:53:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000000)={0xffffffc1, 0x0, 0x2, 0x1, 0x64}) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xa680, 0x1b) write$char_usb(r1, &(0x7f0000000080)="d8d85ed902b9e74bafea", 0xa) 05:53:08 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000007fc00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffffffe00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 934.438618][T20051] Call Trace: [ 934.441947][T20051] dump_stack+0x137/0x19d [ 934.446289][T20051] should_fail+0x23c/0x250 [ 934.451478][T20051] __alloc_pages_nodemask+0xe7/0x310 [ 934.456783][T20051] alloc_pages_current+0x21d/0x310 [ 934.461935][T20051] relay_open_buf+0x20c/0x810 [ 934.466631][T20051] relay_open+0x25b/0x560 [ 934.470975][T20051] do_blk_trace_setup+0x2fa/0x510 [ 934.476624][T20051] blk_trace_setup+0x85/0x110 [ 934.481325][T20051] sg_ioctl_common+0xa02/0x1790 [ 934.486173][T20051] ? do_vfs_ioctl+0x4f7/0xee0 [ 934.490938][T20051] sg_ioctl+0x54/0xc0 [ 934.494937][T20051] ? sg_poll+0x240/0x240 [ 934.499171][T20051] __se_sys_ioctl+0xcb/0x140 [ 934.503754][T20051] __x64_sys_ioctl+0x3f/0x50 [ 934.508336][T20051] do_syscall_64+0x34/0x50 [ 934.512815][T20051] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 934.518707][T20051] RIP: 0033:0x466459 05:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000fff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 934.522597][T20051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 934.542297][T20051] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 934.550713][T20051] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 934.558680][T20051] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 934.566651][T20051] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 934.574655][T20051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 934.583680][T20051] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:08 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x9], 0x0, 0x8, 0x4}) 05:53:08 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000fffffdfd00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:08 executing program 3: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r2) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$char_usb(r0, &(0x7f0000000080)='\x00\x00', 0x2) 05:53:08 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0xa], 0x0, 0x8, 0x4}) 05:53:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000080)={0x0, 0x1a, 0x1b, 0x5, "bce5143718545347c539bd6a8cecdec611a9e2324a6674313d1d49f289afcd88"}) dup(0xffffffffffffffff) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) 05:53:08 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000fffffffe00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:08 executing program 5 (fault-call:2 fault-nth:55): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00ffffefff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 934.681210][T20085] blktrace: Concurrent blktraces are not allowed on sg0 [ 934.708627][T20095] FAULT_INJECTION: forcing a failure. [ 934.708627][T20095] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 934.721880][T20095] CPU: 0 PID: 20095 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 934.730640][T20095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 934.740687][T20095] Call Trace: [ 934.744002][T20095] dump_stack+0x137/0x19d [ 934.748336][T20095] should_fail+0x23c/0x250 [ 934.752754][T20095] __alloc_pages_nodemask+0xe7/0x310 [ 934.758045][T20095] alloc_pages_current+0x21d/0x310 [ 934.763240][T20095] relay_open_buf+0x20c/0x810 [ 934.767922][T20095] relay_open+0x25b/0x560 [ 934.772266][T20095] do_blk_trace_setup+0x2fa/0x510 [ 934.777327][T20095] blk_trace_setup+0x85/0x110 [ 934.782013][T20095] sg_ioctl_common+0xa02/0x1790 [ 934.786867][T20095] ? do_vfs_ioctl+0x4f7/0xee0 [ 934.791602][T20095] sg_ioctl+0x54/0xc0 [ 934.795586][T20095] ? sg_poll+0x240/0x240 [ 934.799830][T20095] __se_sys_ioctl+0xcb/0x140 [ 934.804418][T20095] __x64_sys_ioctl+0x3f/0x50 [ 934.809005][T20095] do_syscall_64+0x34/0x50 [ 934.813421][T20095] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 934.819317][T20095] RIP: 0033:0x466459 [ 934.823229][T20095] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 934.842841][T20095] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 934.851257][T20095] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 934.859264][T20095] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 934.867236][T20095] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 05:53:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffffbff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:09 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0xb], 0x0, 0x8, 0x4}) [ 934.875207][T20095] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 934.883177][T20095] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:09 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) r1 = dup(r0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000080)={0x7, 0x0, &(0x7f0000000000)=[r0, r0, r1]}, 0x3) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:53:09 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000fff00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000003ffff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:09 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000fffff7ff00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00001fffff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:09 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000fffffbff00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:09 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) clock_gettime(0x0, &(0x7f0000000000)) write$evdev(0xffffffffffffffff, &(0x7f0000000140)=[{{0x77359400}, 0x1f, 0x7c, 0x2}, {{0x77359400}, 0x3, 0x8, 0x76}, {{0x0, 0xea60}, 0x2, 0x2}, {{0x0, 0x2710}, 0x12, 0xfff7, 0x6}, {{0x0, 0xea60}, 0x1f, 0x5, 0x1}, {{0x0, 0x2710}, 0x4, 0x8, 0x7fffffff}, {{0x77359400}, 0x5, 0x7, 0x4}, {{}, 0x11, 0x6, 0x7}], 0xc0) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) 05:53:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00ffefffff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:09 executing program 5 (fault-call:2 fault-nth:56): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:09 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0xc], 0x0, 0x8, 0x4}) 05:53:09 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000001fffff00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffbffff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:09 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000000)="00b7ca1fa33ea5ff72848fdc3e9c3ac1238fca20b93055a96c675cb2cc00"/44, 0x2c) [ 935.313991][T20156] FAULT_INJECTION: forcing a failure. [ 935.313991][T20156] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 935.327255][T20156] CPU: 0 PID: 20156 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 935.336020][T20156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.346074][T20156] Call Trace: [ 935.349440][T20156] dump_stack+0x137/0x19d [ 935.353830][T20156] should_fail+0x23c/0x250 [ 935.358245][T20156] __alloc_pages_nodemask+0xe7/0x310 [ 935.363536][T20156] alloc_pages_current+0x21d/0x310 [ 935.368725][T20156] relay_open_buf+0x20c/0x810 [ 935.373478][T20156] relay_open+0x25b/0x560 [ 935.377812][T20156] do_blk_trace_setup+0x2fa/0x510 [ 935.382888][T20156] blk_trace_setup+0x85/0x110 [ 935.387582][T20156] sg_ioctl_common+0xa02/0x1790 [ 935.392429][T20156] ? do_vfs_ioctl+0x4f7/0xee0 [ 935.397102][T20156] sg_ioctl+0x54/0xc0 [ 935.401087][T20156] ? sg_poll+0x240/0x240 [ 935.405367][T20156] __se_sys_ioctl+0xcb/0x140 [ 935.409951][T20156] __x64_sys_ioctl+0x3f/0x50 [ 935.414615][T20156] do_syscall_64+0x34/0x50 [ 935.419088][T20156] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 935.424988][T20156] RIP: 0033:0x466459 [ 935.428911][T20156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 935.449809][T20156] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00f9fdffff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:09 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000e0ffff00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:09 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0xd], 0x0, 0x8, 0x4}) 05:53:09 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$char_usb(r1, &(0x7f0000000040)="e2", 0x1) r2 = socket$inet(0x2, 0x1, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) write$evdev(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x2710}, 0x5, 0xbc, 0x40}, {{r3, r4/1000+60000}, 0x14, 0x3f0, 0x4}, {{0x77359400}, 0x2, 0x6, 0x3}, {{0x0, 0x2710}, 0x11, 0x1, 0x1}, {{}, 0x16, 0x1, 0x100}, {{}, 0x0, 0x2, 0x5}, {{0x0, 0xea60}, 0x1f, 0x6, 0x8001}, {{0x77359400}, 0x1f, 0x20, 0x3}, {{0x77359400}, 0x4, 0x40, 0x400}], 0xd8) socketpair(0x1d, 0xa, 0x7, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x30, r5, 0x1a90000) read(r2, &(0x7f0000000240)=""/162, 0xa2) r6 = mq_open(&(0x7f0000000000)='\x00', 0x40, 0x80, &(0x7f0000000080)={0xff, 0x6, 0x1, 0x3}) ioctl$int_out(r6, 0x2, &(0x7f0000000140)) r7 = getpid() clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r7], 0x1}, 0x58) syz_open_procfs(r7, &(0x7f0000000480)='fdinfo/3\x00') r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000001c0)={0x5, &(0x7f0000000180)=[{0x3ff, 0xba, 0x8}, {0x1, 0x6, 0x7, 0xe2}, {0x7fff, 0x6, 0x7, 0x2}, {0x2, 0x6, 0xf8, 0x7fff}, {0xff, 0x81, 0x1, 0x699b}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000580)={0x0, 0x0, 0xffffffffffffffff, 0x8001, 0x80000}) dup2(r8, r0) [ 935.458256][T20156] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 935.466228][T20156] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 935.474205][T20156] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 935.482179][T20156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 935.490150][T20156] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:09 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000fff7ffff00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fdfdffff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:09 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000fffbffff00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:09 executing program 5 (fault-call:2 fault-nth:57): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f007fffffff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:09 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000f9fdffff00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:09 executing program 3: connect(0xffffffffffffffff, &(0x7f00000001c0)=@un=@file={0x1, './file0\x00'}, 0x80) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x401, 0x4000) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000140)=""/106) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:53:09 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0xe], 0x0, 0x8, 0x4}) 05:53:10 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000fdfdffff00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:10 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x10], 0x0, 0x8, 0x4}) [ 935.700435][T20215] blktrace: Concurrent blktraces are not allowed on sg0 [ 935.717334][T20218] FAULT_INJECTION: forcing a failure. [ 935.717334][T20218] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 935.730593][T20218] CPU: 1 PID: 20218 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 935.739354][T20218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 05:53:10 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000007fffffff00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:10 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000008cffffff00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 935.749537][T20218] Call Trace: [ 935.752815][T20218] dump_stack+0x137/0x19d [ 935.757197][T20218] should_fail+0x23c/0x250 [ 935.761658][T20218] __alloc_pages_nodemask+0xe7/0x310 [ 935.766946][T20218] alloc_pages_current+0x21d/0x310 [ 935.772065][T20218] relay_open_buf+0x20c/0x810 [ 935.776763][T20218] relay_open+0x25b/0x560 [ 935.781164][T20218] do_blk_trace_setup+0x2fa/0x510 [ 935.786192][T20218] blk_trace_setup+0x85/0x110 [ 935.790900][T20218] sg_ioctl_common+0xa02/0x1790 [ 935.795917][T20218] ? do_vfs_ioctl+0x4f7/0xee0 05:53:10 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000040)={0xffffff80, 0x8000, 0x8000, 0xdf, 0x1f, 0xffff2151}) write$char_usb(r0, &(0x7f0000000000)="b3846704b148e5ef3583f5ae14c279c59c7a838871c524b0fcac9ccdb009de9d3edc907319d9438f6230d7491131f9781471c3bd09c156f4a05d69f03c0e", 0x3e) [ 935.800757][T20218] sg_ioctl+0x54/0xc0 [ 935.804810][T20218] ? sg_poll+0x240/0x240 [ 935.809483][T20218] __se_sys_ioctl+0xcb/0x140 [ 935.814072][T20218] __x64_sys_ioctl+0x3f/0x50 [ 935.818655][T20218] do_syscall_64+0x34/0x50 [ 935.823074][T20218] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 935.828987][T20218] RIP: 0033:0x466459 05:53:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f008cffffff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 935.832877][T20218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 935.854135][T20218] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 935.862554][T20218] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 935.870529][T20218] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 935.878579][T20218] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 05:53:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00e2ffffff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 935.886556][T20218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 935.902074][T20218] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:10 executing program 5 (fault-call:2 fault-nth:58): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:10 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000200)={0x8, 0x8, 0xffffffff, 0xf6, 0x49, 0x4, 0x9, 0x3}, &(0x7f0000000240)={0x3, 0x5, 0x7, 0x3f, 0x4, 0x9, 0x7, 0x1000}, &(0x7f0000000280)={0x7, 0xfffffffffffffffb, 0x6, 0x2, 0x1, 0x6, 0x7f, 0x81}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={[0x7d34]}, 0x8}) pselect6(0x40, &(0x7f0000000840)={0x100000000, 0x7, 0xffffffff, 0x1, 0x40, 0x4bc, 0x401, 0x6a4}, &(0x7f0000000880)={0x1246, 0x0, 0x63, 0x8e87, 0x9, 0xfffffffffffffff7, 0x2, 0xffffffffffffffff}, &(0x7f00000008c0)={0x5, 0x65, 0xfffffffffffffffa, 0x6, 0x7, 0x3, 0xee7, 0x7fffffff}, &(0x7f0000000900)={0x0, 0x989680}, &(0x7f0000000980)={&(0x7f0000000940)={[0x1]}, 0x8}) write$evdev(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0xea60}, 0x16, 0x7c, 0x2}, {{r1, r2/1000+60000}, 0x14, 0x0, 0x6}, {{r3, r4/1000+10000}, 0x2, 0xad, 0x5}, {{r5, r6/1000+10000}, 0x6, 0x3, 0x8}], 0x60) recvmmsg(0xffffffffffffffff, &(0x7f0000000800)=[{{&(0x7f0000000380)=@hci, 0x80, &(0x7f0000000680)=[{&(0x7f0000000400)=""/234, 0xea}, {&(0x7f0000000500)=""/3, 0x3}, {&(0x7f0000000540)=""/63, 0x3f}, {&(0x7f0000000580)=""/51, 0x33}, {&(0x7f00000005c0)=""/94, 0x5e}, {&(0x7f0000000640)=""/17, 0x11}], 0x6, &(0x7f0000000700)=""/224, 0xe0}, 0x7}], 0x1, 0x162, 0x0) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:53:10 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000f0ffffff00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:10 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x11], 0x0, 0x8, 0x4}) 05:53:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00f0ffffff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 936.020250][T20261] FAULT_INJECTION: forcing a failure. [ 936.020250][T20261] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 936.033519][T20261] CPU: 0 PID: 20261 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 936.042369][T20261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.052418][T20261] Call Trace: [ 936.055764][T20261] dump_stack+0x137/0x19d [ 936.060167][T20261] should_fail+0x23c/0x250 [ 936.064585][T20261] __alloc_pages_nodemask+0xe7/0x310 [ 936.069884][T20261] alloc_pages_current+0x21d/0x310 [ 936.075276][T20261] relay_open_buf+0x20c/0x810 [ 936.080003][T20261] relay_open+0x25b/0x560 [ 936.084341][T20261] do_blk_trace_setup+0x2fa/0x510 [ 936.089462][T20261] blk_trace_setup+0x85/0x110 [ 936.094146][T20261] sg_ioctl_common+0xa02/0x1790 [ 936.099176][T20261] ? do_vfs_ioctl+0x4f7/0xee0 [ 936.103857][T20261] sg_ioctl+0x54/0xc0 [ 936.107843][T20261] ? sg_poll+0x240/0x240 [ 936.112137][T20261] __se_sys_ioctl+0xcb/0x140 [ 936.116728][T20261] __x64_sys_ioctl+0x3f/0x50 [ 936.121330][T20261] do_syscall_64+0x34/0x50 [ 936.125827][T20261] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 936.131776][T20261] RIP: 0033:0x466459 [ 936.135667][T20261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 936.155374][T20261] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:10 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000f6ffffff00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00f5ffffff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 936.163793][T20261] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 936.171771][T20261] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 936.179921][T20261] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 936.188070][T20261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 936.196047][T20261] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:10 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000feffffff00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:10 executing program 5 (fault-call:2 fault-nth:59): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:10 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x12], 0x0, 0x8, 0x4}) 05:53:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00f6ffffff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 936.317592][T20288] blktrace: Concurrent blktraces are not allowed on sg0 [ 936.332724][T20292] FAULT_INJECTION: forcing a failure. [ 936.332724][T20292] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 936.345998][T20292] CPU: 0 PID: 20292 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 936.354976][T20292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.365109][T20292] Call Trace: [ 936.368386][T20292] dump_stack+0x137/0x19d [ 936.372744][T20292] should_fail+0x23c/0x250 [ 936.377333][T20292] __alloc_pages_nodemask+0xe7/0x310 [ 936.382627][T20292] alloc_pages_current+0x21d/0x310 [ 936.387746][T20292] relay_open_buf+0x20c/0x810 [ 936.392424][T20292] relay_open+0x25b/0x560 [ 936.396761][T20292] do_blk_trace_setup+0x2fa/0x510 [ 936.401797][T20292] blk_trace_setup+0x85/0x110 [ 936.406483][T20292] sg_ioctl_common+0xa02/0x1790 [ 936.411341][T20292] ? do_vfs_ioctl+0x4f7/0xee0 [ 936.416022][T20292] sg_ioctl+0x54/0xc0 [ 936.420022][T20292] ? sg_poll+0x240/0x240 [ 936.424322][T20292] __se_sys_ioctl+0xcb/0x140 [ 936.428914][T20292] __x64_sys_ioctl+0x3f/0x50 [ 936.433507][T20292] do_syscall_64+0x34/0x50 [ 936.437986][T20292] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 936.444033][T20292] RIP: 0033:0x466459 [ 936.447972][T20292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:53:10 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r1 = socket$inet(0x2, 0x2, 0xffff) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x5306f000) r2 = pidfd_open(0x0, 0x0) clock_gettime(0x0, &(0x7f00000085c0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000008480)=[{{&(0x7f0000002b00)=@pppol2tp, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000002b80)=""/170, 0xaa}, {&(0x7f0000002c40)=""/109, 0x6d}, {&(0x7f0000002cc0)=""/36, 0x24}, {&(0x7f0000002d00)=""/98, 0x62}, {&(0x7f0000002d80)=""/219, 0xdb}, {&(0x7f0000002e80)=""/47, 0x2f}, {&(0x7f0000002ec0)=""/182, 0xb6}, {&(0x7f0000002f80)=""/30, 0x1e}], 0x8, &(0x7f0000003040)}, 0x80000000}, {{&(0x7f0000003080)=@ax25={{0x3, @rose}, [@remote, @default, @bcast, @rose, @remote, @rose, @remote, @null]}, 0x80, &(0x7f0000003300)=[{&(0x7f0000003100)=""/76, 0x4c}, {&(0x7f0000003180)=""/192, 0xc0}, {&(0x7f0000003240)=""/152, 0x98}], 0x3, &(0x7f0000003340)=""/61, 0x3d}, 0x80000000}, {{&(0x7f0000003380)=@ax25={{0x3, @default}, [@netrom, @netrom, @netrom, @netrom, @remote, @default, @null, @netrom]}, 0x80, &(0x7f00000048c0)=[{&(0x7f0000003400)=""/167, 0xa7}, {&(0x7f00000034c0)=""/4096, 0x1000}, {&(0x7f00000044c0)=""/201, 0xc9}, {&(0x7f00000045c0)=""/40, 0x28}, {&(0x7f0000004600)=""/155, 0x9b}, {&(0x7f00000046c0)=""/228, 0xe4}, {&(0x7f00000047c0)=""/72, 0x48}, {&(0x7f0000004840)=""/13, 0xd}, {&(0x7f0000004880)=""/57, 0x39}], 0x9}, 0x8}, {{&(0x7f0000004980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000005f80)=[{&(0x7f0000004a00)=""/4096, 0x1000}, {&(0x7f0000005a00)=""/120, 0x78}, {&(0x7f0000005a80)=""/210, 0xd2}, {&(0x7f0000005b80)=""/196, 0xc4}, {&(0x7f0000005c80)=""/63, 0x3f}, {&(0x7f0000005cc0)=""/249, 0xf9}, {&(0x7f0000005dc0)=""/244, 0xf4}, {&(0x7f0000005ec0)=""/112, 0x70}, {&(0x7f0000005f40)=""/22, 0x16}], 0x9, &(0x7f0000006040)=""/79, 0x4f}, 0x1ff}, {{&(0x7f00000060c0)=@pppoe, 0x80, &(0x7f0000008380)=[{&(0x7f0000006140)=""/4096, 0x1000}, {&(0x7f0000007140)=""/4096, 0x1000}, {&(0x7f0000008140)=""/76, 0x4c}, {&(0x7f00000081c0)=""/255, 0xff}, {&(0x7f00000082c0)=""/182, 0xb6}], 0x5, &(0x7f0000008400)=""/69, 0x45}, 0xfffffffe}], 0x5, 0x23, &(0x7f0000008600)={r3, r4+10000000}) r6 = syz_open_dev$loop(&(0x7f0000008640)='/dev/loop#\x00', 0xd, 0x2000c2) r7 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000008680)='/proc/thread-self\x00', 0x404400, 0x0) r8 = socket$inet(0x2, 0x1, 0x0) close_range(r8, 0xffffffffffffffff, 0x2) recvmmsg(r8, 0x0, 0x0, 0x0, 0x0) r9 = socket$inet(0x2, 0x1, 0x0) close_range(r9, 0xffffffffffffffff, 0x2) recvmmsg(r9, 0x0, 0x0, 0x0, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) close_range(r10, 0xffffffffffffffff, 0x2) recvmmsg(r10, 0x0, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008700)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000002a40)=[{&(0x7f00000001c0)={0x12b8, 0x26, 0x8, 0x70bd26, 0x25dfdbfe, "", [@nested={0x12e, 0x5e, 0x0, 0x1, [@typed={0x12, 0xa, 0x0, 0x0, @binary="8372c9572f8520ea241ca3742c69"}, @typed={0x14, 0x35, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, [], 0x3c}}, @generic="cb8dc2aba53b5f83ae864aa7f72859c7690e39f6dd63b578e779bd23b3cfcdad5231a14183a619c67737e3a8103a5634348cefd272e2637c8f2e82cfb1194606207f79e388e1f7953cbbf3cd7ada2d6302bd67aeb2ae18e105ccc73ddf8908fa52178abe908f078a9fd64df55ed2c8fce48085ab7bad8282bf239579a11870bf251263469c3f8aec5725c0d1988d8eba6a5ef47dfc72edef9ceb81b652bc9e17162f848dda774b35b1b21a61e25dbf0b2442e7e8570f31060cebbf2df9399af9b71ccc545064d9e3ac16c00e5612dca84c32047b1168b406589b0153c3d1c0c5c8e4f24fa2958a630042d4bff621bd625ea2", @typed={0x8, 0x80, 0x0, 0x0, @fd}, @typed={0x8, 0x36, 0x0, 0x0, @u32=0xffffff3e}]}, @generic="0c269c8e6368af0ccd835577daa4cbcc9b53544eadefebc7afdc449fae3b0302047d", @generic="fe4534dcb027efd0716040b8248d72dfe76f1904cb44b299bd55f2c698c3e907d5e90821eaea5fe3b5533b44f30ba24b9a5843b65fd0bf0822127118415b6e7c07c949155f26fa987a0e3e53a3638598de5aaa631c25fa2ea626295fb0926b3a", @nested={0xdd, 0x75, 0x0, 0x1, [@generic="3ebf89f69bbd9f74e1030f71d612b7d18829342dc186cdc833f397308846579b947b5c22c1a5d08dcad7fb6962728078dec06968c6144fd97734340585277cf4eb25a07a62e1dc2049ba589cf8441891128afeef8ade50e9c399e10d566a367be0fad07522e0b256d018527afe68a208a86e11f8ebc448cc2acd3d49f6aad0a8fd99696e285d4444b5ca92d8e9a4fcfb51bb3d786b506317311861a3606d6e74ff25f73c997b5c37141df4333faabb1ed99df77f3e6caa1abe3f2bc8601f07fdeaeff18b53160edfe6859f62465d7377ef", @typed={0x8, 0x30, 0x0, 0x0, @pid}]}, @typed={0x8, 0x38, 0x0, 0x0, @fd=r0}, @typed={0x1004, 0x5c, 0x0, 0x0, @binary="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"}, @typed={0x8, 0x7e, 0x0, 0x0, @uid}]}, 0x12b8}, {&(0x7f0000001480)={0x30, 0x29, 0x800, 0x70bd28, 0x25dfdbff, "", [@nested={0xc, 0x4, 0x0, 0x1, [@typed={0x8, 0x7, 0x0, 0x0, @fd}]}, @typed={0x8, 0x33, 0x0, 0x0, @fd=r1}, @typed={0x4, 0x4f}, @typed={0x8, 0x30, 0x0, 0x0, @fd}]}, 0x30}, {&(0x7f00000014c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="6180306d265d1292d4b203e0d823c3aa8fa41af57c2a2fe53821e3b91871f9018b5a90b52bdcb1957e62ce22a7a2051c8ebc9f4f13b328060ecbfd92bfef110237f4598650d632949725663b87f0937580b6d822386dee8466478819bc74cb304399bc063464065c2fd77494d9aae5ebd30e53130165f3cac377be13c1afe2e1e58eeefa17ce6fd1125aa95810b3724c23d1cc5b62472905cb853478501512487cc530c2144554ffe5e8dfb22f5b592f812267f895dc486a0400740008007000", @ANYRES32, @ANYBLOB='\x00\x00'], 0x20c}, {&(0x7f0000001700)={0x11dc, 0x34, 0x20, 0x70bd29, 0x25dfdbfe, "", [@nested={0x1118, 0x5e, 0x0, 0x1, [@generic="269925de4d16849d78ffaf3506521e0a735872be8e00f592221370dc278ef9040003af6442fe4f2b9724cd291017485207d2c8dd1db46f8a9b3f0a408fbbcb0ec74518204538a92d948a364d0401845d7c214acac28c4262d9efa847085ea2d277cc2b1fda7372f76b246afd7527ecfdc0c25ee78b578d9af25b4c03468c93c651e4f12964ccb5833ec11d01513b7748d69ee6fe0fe169ad220b1598d0ccc9773f3536031b39ba3dffe146fe19beb6d5fdc25c44eb566a084f85a84ca1fed3ae69aacdb39c6a224f487cb5f55f9fb250a595bf83271e830e3e5110a4de5d7d39f5947431eb5b08690c717f3c7dc62f1140a5f0a5082b08663baa3b20f6158ba6c6b58e1aba45c01ac8ff33c6d330e3da3cf1250c763e33385121c867975e59d0acb487c0c63a2055fb2bfa9db4de4afaddd765a9a0929a88ec10aae99515427b3a23eb27196fed5d0a36b178e768677a0561ce70b1e621dbfb57e452639d22615ba9035cae52d1d787a6e8184f83805c17f09d96e30c5da07c2578ac409df5c3909d136a2eee731a51b22abfa4d2cb095c37653eff3f1d8af538a55110ed236d9009f52fdc1d6863f86c82d775208c594afb863cb5900df3182281ee677c7532aeab4428a2d81ca6337b333fd0343744df88abe523520c764618db1c943ff5d8b23cf9316393a4339cf5e1e7fb51a0a2a31868582a6b4ca8c5d0a876ef2d5cc5d3a9b3163d324974b2910cc5a5afd67ea3302499cc189d62750f51165c88b6e9b446e2bc12cf903765e89e742df722184912651fb324673dd1eaddcbbd375da43286711458746d0d76e779dcc470656ed01f65223960c0b59228150412fb808d132b401b86358499daaa8deba581a796b9ce68925ca4e5f3eaf8820fa64887805fc654df953338f5c5494e88c488effd96597a311e9e790f5a5bf3b97a70e0924e7457ab76a86cb2152c86a952954a9f8fdad3b7bc1f804252a1b48b3617f30425761a61b028877918831ff615537a36f40c92d08030730e017f7f79cc63fb8928d0b210b1d9d54b3764192d580b87cb77983a0913cc40c73fb18eb1b4c4c8e0d8d91b8491e4a84b8a0bcec235a6025a8730ed9f6da83a98f95bddadc3785d402871e3c103ee67e6df2b05b1b50fd95c7e74ca09db96decf88758d7dd2ab3117adbd43517bbc8d74ae51275a92ec489e49232c794061dba9b8b10870f24f162b245e3a1f67fa7a88b4c6efe835f6d5bc7f3837b759b96ed5baa3112449fe52544b418f2fcc7cfae11fe59636eef1426557c56ff4712fbb24066f33e39e07042a21818194a00cfb83460bd4da22e2eae6f41de4099197846809f97ee94775f7a6499236820a8df707e83bb9030eb6730af4c30cfe6e0ec8049e903060930b160bd30877c1bef34ac5c12b3f244c976d58c08e0eb250ce63cb84ddb52a1b7b7918d46cc817277b2f3833c28903d2401d13dc5e16d1159fd8c16e0bfa363faad8b106cc5990778a4f6d142d9bade2fbbd3cc9d45607131065aeffba479af0aae88b9978a62d9d80ca7ac56a5c88cf734dd52f16166dbcc764524457c81688efb11c47fd3a69ac89d68e3ac476ad1fc9cdba5c48f80638055cef9706dc4b71ecdf8a0361f54987eaf0d3be59183f1b6b179b66b160435334b9cccbfcb1536e4b9574ebc9d9c869df3d320c7f4cf7530375d54a87a3baf460c18eab5b10e6d5a26ffd1134386b3e15315f1396e4246bef0bb175b1249227f081e1ff6b4b604b9636d3d048a2a132a6038d4eec19f4e98308ac644e39955f3703a421b4e5ba942c2abbcc1839855bbc8078f70a8708c0661b08f2a8248437a7be82d9e74dbf1bc644438af7bfc7f99d19f0448d011089b9e1ccbe989cd9c0eb9850ed93a66811de85e50d7ce507e0e85c9d1219e79fa578766024d481b9f9dd47092b531c114c985425ae4b9ba8526513ee5e131afdbc8b49394c359ca712e621cfe918723a267c0af62b400afcf49fec3b1b9cb7925b4a485dfecd6bd1e065b979484bd7eaeb4d83c559a902dcffe0a8681df3564440b7e9df9817421a2a4488f5e315ef3f476a2f993484a70bb46ee876559a4445ddab5eee3648ec9224adebec0225ba2e22bd4356f205e1f10f21d1a0c796a139518efb8e98403d13d1eecb09fd81d0b8fcedae2a2ee5e2d9a25bbb49b0f58e079c7e121fd9b121ca1ce0258a7276f4ce7db80c649b292a2f112fafa6bd93eb5c768fd0390696f62dd5c2a1b78174ee941ba0c5b4d435595bcd0bb15a7c2cb7f2007e3646731c2f35d644b4e17ac744021a1f904bcdececa93529157bcbb557ef516aac3084c51db0472a2681f9584959a8943c5005a6c51431615436fc85c65536e3b9d3cb82481d0d5a4debf66236a83d44d6e1d6a5fb0851aadf7ee3a5d3a65d3922b3db7017bea36333edbfe609df33f1d331dcd281efa300d2c3ba5ac20e0814248ce22c8adf11115e807c31e6b531bc3662502c92737c1580aa461a64d69a3a59a90753483425c9ed9d9c78e91085e702e7577208a7f20f20d889497924bc71c2f8b1d2a0d63963ea66a4c1dc64a90c7c2454121c60e04e3f3821579a5fbd89698216c0bc511f9310af1109f336f2ac63a082a93828d4d94fefa49b69d718244d29030dcbb992d1b0d20e61e64b1f2a3a025faca18af256bdabec01d00469352883f4f1712350f3abef63197573b596ae3628448c174d601b6b0ffa68d3138961fbe8a18086ffcab241c9a3edd733bcc9c64fb18a28066af75f04dd01dc21b4a4fab5585ef5e599b30bd200b6203eb25fd1ff77186924b7519101dae3c66b7d2b2066787a94d6c5d0bcdb2d94e98b120b50cded297f7efd4d791d34c442ff7a1a3530bcfe72d8368fc8f51d0550231dffb353092f4815ce310b90f3bd29c76fc79bff9a8c32ec7b0503ed7888c08eec0bf77c58dd554521d93f01e906b90f08fbb36c40a4410ecb3a415ddc85bd1d00df5c87f7b1cc73f033d845b34345c5ee3bfce1bfbc0a179fe34c71755365c5c64e7c0fe5e76d154e1a61c89d6883ca324913b48177be6b18e12f21e0d04ebc759ac3ac1e218252009a68824e75eb0285d0b4cc1e7162d9ef189ce0fd8f8474d93e363042fc4e91b0252e6e8195ed5569033ce27ee6606dba4b722748e01cfcb1ff71e7a101931efb147fc12aef088aeae2e3961c2760944a384ae94b348c5aa8cd30c62b8dacf62afbcd41a182cbcc44e6d6d3150a36d9cce843dc53dd0186d65cf0da2bc4501db7b5736ec9c3638946d1db236bc8d3ab48bcf1f199d3f01b9ba0a36d818a3033bf3ec05daf8791d4b378ee230637ef67a4a25670e89e3876456a4cdfffb321568e75815cc2b21ff876aae7afd02cd795618dcf512fc4c82cc8d5936fe967af1937776c96ea990fd788beff4eb0bc20d0ffb4bf22a401128f47569d26d0e2570caa500287bc408dd726f8b1846970401663b0ab71768568986626525e0547463c28dfbd3749d4a7a8c1024143fbfc8f1f4183339054ccb518906c62e98409d9b72a653873f84d49522434f36358c55286c9ea7799369da49f38200b27233374c1afb64845521e4816bca3b6d247b28c77a86cc4702f79b687950b35885d3e10a1d12ced21dd30feb52ad111493821aae9d0c2877324ea0215e917d0523bd4ec8afdd9becbd55f3e6e46bb061ce71560f5037c1aedf29812a4e00445db4d86b6ecb41dbf8b352b9eb3907a9b08dd728b58e6576b9e6112d63df82afef0df1841a6c76c1ec30e588b37f463d52efc1c532b1e3b65e51faa28fbe37f3b582c050242aa3eb6a8295e111a8afac3ddca11f02347ecaede0c7a5d8eb6827fa93635e431493bf55fb4bb4a56d36207111b0f5ee51f7550328aae9a6df73d12272a6911dd39a24bd0f8d797e762a420e4614275f1995a871943460abfede8e11284db185320326dc50f229f2a6feded2a99860c64d94b9645d4d6922155f2d3f9ce95433d9cd7da45061dcf208ad2eeb46fbeabcaed43543602fa2db0b59cb8b34bcc40a5fd5083b1632c75ecf7cdaeed7a9c6837c348c309ff62bae63c768232a9930c8bf0d0bdbc70bd65568ab7d75ae6836082d5f7f9136836b1740f8154c6cd2d8f430d59c53562c49c1c0fd34d69b9b3c38962b85eb796ff7326d798d056b82c4f126ade99156cb07fdb74d2a3418f1b6ca6e401af9f4761d45785d6dac291ec687f99c84970912c72d4389d314fd60dcb45bf198d24237de8122c67d1f179ca28955d8c0c3bcc9a86222cf78cc2e34b391092f8c5f0d20a67de3d00caf1c6b94e1f429be14359d11d30b89e6c4b83c5f17c03cca4e34b77ba0551c14bf271dfc235439783df1a7b7f54249636cff55eb485c1cf672f12bb355f8dedbc72be4876d63025b74c844c4c51e5a8ff11799d53099074eaba4f07ccad0d03f5d121ef5d17ed0b8d152848787689f348c9e4360ab4f7b540ed352645fb61c03f3598f72431afc319d74367ecdc4521ca8de877175f0695cdea1f64d98634e026893da53ec16220843417d46dbae2deb4b86c1821528e84cc8bae7e545fdfb9adf0c8450821c4a38ce4cae51465d120dfb8341c444ed70466aa83686a6afe368e116817b392b2dddc9b7daeb4dc750295cd0dccf647d1c2722be5f49669a1674fb8c8e58de44e49a1ee4ee325f2d800de9402b7dd960cf07aeebeb75fd3b23748a28167f73ab8f92c599f95ce8e6858d36702d0c5e2ab93c90e8eb4e9769236be6138073ced280ca06006aaa29703add11db4333a0f30b73efb928e0c3a3ac7bb84ec92f0743cfe3af9dcee323b9bfa2d8e572e533763845162ecbb69cd685dec175f2774a68cd2fb470a0546cfcd4f74aef344c1127503fa1bd27117a178fed41659281d14b0894730179451d153e2cda025a6dd0109262a8496d1bbaa3164105e4b78a312234c413c4913d5de16b714947428c8dd19bdb6f51b7c5a24e626e7ace6c35f52a89d3ac96f2085793e4c9f47c42ba1164b1095739af1d58c7445584ef95ddf60266ad7dedb65d00a3b44a9ded3358c72e5fee8e84f233aabc8b2c36f816b36765e55600c1b308b9871e4871eb04cacb754451e4fd688a7fbf5394a4c322b66226fb7cf95a815d7156d1ef9a1ac7218cfe6edfd726b6e88e098cd9f97d703537cab12fb97ccafbfc4d9a7123e49de0ef440e0e2857097f483fde7ed9f6e1a6396cee6636cdd6b0f8d649f2de27613ac3576f4010e024064d4bc8ac233f76a1af2372c4f7e681fc2fc4a78104eb3ac32ae899a449638e3425ed448b3ef9082becb0d973b52cc0f48449d792ef495562d9bc8633a76638f0e369e55ecad8b985a77a13295fa5c0758a045b1b4d023fd2365e77587592d49a6b95965d5dded02ed0337d044ac4808abb76a29fdc5661baf6ee5f2f6855c2fc4b0c4e9357124dc57501572e2b3cd64880ccba86bf78cc6b90d7bc500e475859b8ace00f6ef3664de5e9431e09bfe8b641dfd8b075819287237e5e1e2b48a3f7e797cbcd6c2873a57671887db4c55916061e17662a14eb499606d2600b94e2c8372fb214993a64119c6ed6d3a811b3f255cdcd04eef6f34fd0f2a98f4f221c6e2a1c3220066e9b201d442175508b8a5d868818ea77767317a4baa7528e20d7459fdc305fcfce0a4206eacc39421856a1ede5902d70b1de3ba224f5ff9280d35dcb1a289918d1b0afdba6dc4aa457ba95fdc861304e0f14daacf7a9b4e686b74a8d19f19c70df84111d4ef2fa59eee7f1bfa9c2706fb84cb04f72a6254da7e03b3dc1b7b88", @typed={0x12, 0x11, 0x0, 0x0, @binary="db67d87ea999ecb9700ecc67fd2f"}, @generic="51bbeb1862aab58e7004faffd9d66e47bb1bd77b296f2aa47b8dd418d96356d900b5f98899a1bdbfbe195a4ababe259baaf813ad3c65016f2a6f903c2914a4e5e30c852af7b6cd331beadac4f5578340fadf52f8", @typed={0x14, 0x85, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, [], 0x14}}, @generic, @generic="c0bdc4add80281e7c23f89c0764185703521257f7abbae265da60df592cd3832a4d64446dbee99614f8f4904b87aed1bc647a1462681798808b3cbd7931dc34150cf6c07a0c83f73ae6fd3ad85e07e", @generic="47fb4a0c3fe2fcca19b6872e70f249af677bba2bf09a6e34c5de8131def0424f16967e4296128e65b421e9c64850564a6f1d9f6ba5f736f69c92cea768ad3154860942f4645aa3a3c7"]}, @typed={0x8, 0x89, 0x0, 0x0, @pid}, @generic="4c35bd09dbb3fab3d7ed84388b8303611b401c65676d8b97431ceede0b0ea4f396bf864f63c2af48b43d8ff89c08d17f9c71aac692a6bdb7b2a8a1856493f54d73765ebeb18d9feda7bb9c6fe038a69d7e37a98d0d3c4da9aeb8dc8672580c967f4ce83069996f9d8bdf51d6a266e698c27433141c1b4c5e605c21163f3454ee69ea87f4b586ce8a116444ddd6c9ec1537117a2390a420fda5ec9e76bf8764503556b9a29d828a04778b525d"]}, 0x11dc}, {&(0x7f0000002900)={0xf4, 0x10, 0x20, 0x70bd2b, 0x25dfdbff, "", [@nested={0x4, 0x82, 0x0, 0x1, [@generic]}, @generic="8b279d2513bce13b183c2e84efc035347756edc3dff5f10c3238ad5968e7e9f57cb95fb2412f7dd0fd3bd5a5508045a7d000c20005154e8e55f13815a7fe8bab584a4b382393bad7dc4efcba72e7229c30ac40bf718f1646e4661868cfbc25d0575dc2283d5b4b27b6a2a05f3b013d088f4edae820b74469348fb548448e809e33303126affa0d67c8132741307da7417760956dce9bdfc8fb6f8effb70bcc7ccff95e0cd2e97f7a4a36e60b96b894e9493d8062c1928b9b1b277ff96def099651e7d18f579d4e9bade57ac67f4429fe0e583b8a5fc214", @typed={0x8, 0x52, 0x0, 0x0, @ipv4=@empty}]}, 0xf4}, {&(0x7f0000002a00)={0x30, 0x3b, 0x100, 0x70bd26, 0x25dfdbfc, "", [@typed={0x16, 0x1e, 0x0, 0x0, @str='/dev/input/event#\x00'}, @typed={0x8, 0x60, 0x0, 0x0, @pid}]}, 0x30}], 0x6, &(0x7f00000086c0)=[@rights={{0x34, 0x1, 0x1, [r0, 0xffffffffffffffff, r2, r5, r6, r7, r8, r9, r10]}}], 0x38, 0x4000000}, 0x80) 05:53:10 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000c0ed0000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fbffffff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00feffffff00000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:10 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x25], 0x0, 0x8, 0x4}) [ 936.467588][T20292] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 936.475996][T20292] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 936.483966][T20292] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 936.492083][T20292] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 936.500081][T20292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 936.508115][T20292] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:10 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x345200, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1, 0xff, 0x52bf) 05:53:10 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000100000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000400000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:10 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x48], 0x0, 0x8, 0x4}) 05:53:10 executing program 5 (fault-call:2 fault-nth:60): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:10 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000400000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000001000000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 936.662656][T20336] blktrace: Concurrent blktraces are not allowed on sg0 [ 936.704370][T20339] FAULT_INJECTION: forcing a failure. [ 936.704370][T20339] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 936.717633][T20339] CPU: 0 PID: 20339 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 936.726397][T20339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.736445][T20339] Call Trace: [ 936.739721][T20339] dump_stack+0x137/0x19d [ 936.744065][T20339] should_fail+0x23c/0x250 [ 936.748487][T20339] __alloc_pages_nodemask+0xe7/0x310 [ 936.753774][T20339] alloc_pages_current+0x21d/0x310 [ 936.758888][T20339] relay_open_buf+0x20c/0x810 [ 936.763582][T20339] relay_open+0x25b/0x560 [ 936.767914][T20339] do_blk_trace_setup+0x2fa/0x510 [ 936.772935][T20339] blk_trace_setup+0x85/0x110 [ 936.777613][T20339] sg_ioctl_common+0xa02/0x1790 [ 936.782483][T20339] ? do_vfs_ioctl+0x4f7/0xee0 [ 936.787195][T20339] sg_ioctl+0x54/0xc0 [ 936.791180][T20339] ? sg_poll+0x240/0x240 [ 936.795425][T20339] __se_sys_ioctl+0xcb/0x140 [ 936.800014][T20339] __x64_sys_ioctl+0x3f/0x50 [ 936.804603][T20339] do_syscall_64+0x34/0x50 [ 936.809094][T20339] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 936.814988][T20339] RIP: 0033:0x466459 [ 936.818877][T20339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 936.838921][T20339] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:11 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r1, &(0x7f0000000040)="e2", 0x35000) 05:53:11 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000ffffffffffff0700000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:11 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000800000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:11 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x4c], 0x0, 0x8, 0x4}) [ 936.847429][T20339] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 936.855500][T20339] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 936.863545][T20339] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 936.871603][T20339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 936.879753][T20339] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000001000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:11 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000c00000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:11 executing program 5 (fault-call:2 fault-nth:61): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:11 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x60], 0x0, 0x8, 0x4}) 05:53:11 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000140)=0xd3) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x2, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f00000001c0)=""/96) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) write$evdev(r1, &(0x7f00000002c0)=[{{}, 0x1, 0x3f, 0x9}, {{0x77359400}, 0x2, 0x200, 0x8}, {{0x77359400}, 0x4, 0x6, 0x401}, {{0x0, 0x2710}, 0x14, 0x8, 0x7}, {{r2, r3/1000+10000}, 0x17, 0x1, 0x8000}, {{r4, r5/1000+10000}, 0x1f, 0x7, 0x2}, {{0x0, 0x2710}, 0x0, 0x2, 0x5}, {{0x0, 0xea60}, 0x17, 0x63, 0x6}, {{0x0, 0xea60}, 0x1, 0x20, 0x1}, {{0x0, 0x2710}, 0x3, 0x9e8, 0xfffffffe}], 0xf0) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) io_setup(0x3fe, &(0x7f0000000000)=0x0) io_destroy(r8) io_getevents(r8, 0x0, 0x0, 0x0, 0x0) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r9, 0x0) preadv(r9, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r8, 0x1, &(0x7f00000005c0)=[&(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0xfc01, r0, &(0x7f00000004c0)="5339d30b573a8a95ceb8effb0b2a62d263d61a683096139cfbcffe529b7d1de1fa37c22f86a4ad507152b38625a0af88384a5704b5bf4c4a24e4fb7313d9f41283c1f7503fda53356fe6f99fca7f1eca84608e6a973f782585f67ba9cd75cf5b11813ab17789cde76a90126ee32657622268ee6e2e9dfa409546a4f027a64b65d5282574e477d7af29584d7c583b389f8e63dc6e94e6874413df8c97", 0x9c, 0x8, 0x0, 0x0, r9}]) write$evdev(0xffffffffffffffff, &(0x7f0000000400)=[{{r6, r7/1000+10000}, 0x16, 0x1, 0x8}, {{}, 0x15, 0x7, 0x88}, {{0x0, 0x2710}, 0x1, 0xff, 0x1}, {{0x77359400}, 0x1, 0xfff, 0x6}, {{0x0, 0x2710}, 0x15, 0x9}, {{}, 0x1, 0x5, 0x5}, {{}, 0x3, 0xf4, 0x4}], 0xa8) r10 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x100000000, 0x420000) write$evdev(r10, &(0x7f0000000080)=[{{0x0, 0x2710}, 0x12, 0x0, 0x7a1}, {{0x0, 0xea60}, 0x5, 0x40, 0x9}], 0x30) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) [ 937.000963][T20372] FAULT_INJECTION: forcing a failure. [ 937.000963][T20372] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 937.014254][T20372] CPU: 1 PID: 20372 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 937.023024][T20372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.033095][T20372] Call Trace: [ 937.036375][T20372] dump_stack+0x137/0x19d [ 937.042752][T20372] should_fail+0x23c/0x250 [ 937.047171][T20372] __alloc_pages_nodemask+0xe7/0x310 [ 937.052522][T20372] alloc_pages_current+0x21d/0x310 [ 937.057670][T20372] relay_open_buf+0x20c/0x810 [ 937.062359][T20372] relay_open+0x25b/0x560 [ 937.066698][T20372] do_blk_trace_setup+0x2fa/0x510 [ 937.071727][T20372] blk_trace_setup+0x85/0x110 [ 937.076782][T20372] sg_ioctl_common+0xa02/0x1790 [ 937.081640][T20372] ? do_vfs_ioctl+0x4f7/0xee0 [ 937.086323][T20372] sg_ioctl+0x54/0xc0 [ 937.090305][T20372] ? sg_poll+0x240/0x240 [ 937.094612][T20372] __se_sys_ioctl+0xcb/0x140 05:53:11 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000ffffe000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 937.099269][T20372] __x64_sys_ioctl+0x3f/0x50 [ 937.103858][T20372] do_syscall_64+0x34/0x50 [ 937.108346][T20372] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 937.114245][T20372] RIP: 0033:0x466459 [ 937.118135][T20372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 937.137744][T20372] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000e01000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:11 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000001000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:11 executing program 5 (fault-call:2 fault-nth:62): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 937.146168][T20372] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 937.154143][T20372] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 937.162227][T20372] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 937.170197][T20372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 937.178170][T20372] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:11 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000002000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:11 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x68], 0x0, 0x8, 0x4}) [ 937.245990][T20392] FAULT_INJECTION: forcing a failure. [ 937.245990][T20392] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 937.259294][T20392] CPU: 1 PID: 20392 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 937.268056][T20392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.278111][T20392] Call Trace: [ 937.281389][T20392] dump_stack+0x137/0x19d [ 937.285887][T20392] should_fail+0x23c/0x250 [ 937.290297][T20392] __alloc_pages_nodemask+0xe7/0x310 [ 937.295707][T20392] alloc_pages_current+0x21d/0x310 [ 937.300834][T20392] relay_open_buf+0x20c/0x810 [ 937.305545][T20392] relay_open+0x25b/0x560 [ 937.309895][T20392] do_blk_trace_setup+0x2fa/0x510 [ 937.314929][T20392] blk_trace_setup+0x85/0x110 [ 937.319612][T20392] sg_ioctl_common+0xa02/0x1790 [ 937.324521][T20392] ? do_vfs_ioctl+0x4f7/0xee0 [ 937.329218][T20392] sg_ioctl+0x54/0xc0 [ 937.333216][T20392] ? sg_poll+0x240/0x240 [ 937.337456][T20392] __se_sys_ioctl+0xcb/0x140 [ 937.342041][T20392] __x64_sys_ioctl+0x3f/0x50 05:53:11 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000402000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000002000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 937.346696][T20392] do_syscall_64+0x34/0x50 [ 937.351124][T20392] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 937.357133][T20392] RIP: 0033:0x466459 [ 937.361016][T20392] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 937.380617][T20392] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:11 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000003000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:11 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x6c], 0x0, 0x8, 0x4}) [ 937.389036][T20392] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 937.397242][T20392] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 937.405208][T20392] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 937.413181][T20392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 937.421233][T20392] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:11 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$evdev(r1, &(0x7f0000000140)=[{{}, 0x2, 0x0, 0x1}, {{0x77359400}, 0x4, 0x0, 0x101}, {{0x77359400}, 0x8331f3cab558b3d, 0x2, 0x7}], 0x48) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 05:53:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000008000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:11 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000004000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:11 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000011c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000001200)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000001240)={0x0, 0x0}) write$evdev(r0, &(0x7f0000001280)=[{{r1, r2/1000+60000}, 0x17, 0x81, 0x3f}, {{r3, r4/1000+60000}, 0x0, 0x6, 0x20}, {{r5, r6/1000+60000}, 0x16, 0x81, 0x3}, {{r7, r8/1000+60000}, 0x15, 0x5, 0x6}, {{}, 0x15, 0x2, 0x6}], 0x78) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x11, 0x74, &(0x7f0000000140)="576ba177301afb6b88d1e9de2007f203358e783b61b9967c754d1b1a703e5433f3eae7383e9f07947f0ec3c8565c60c7eaece3b708e1b0558cc0591f0cc576194437e2c5395cdb502751bb50cce3092e2ff221264067283c1e3f3387f17da76819cb377c3e5bf43eb6d8df9e2fe94e974232df0d"}) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7c, 0x2}], 0x18) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f00000001c0)=""/4096) 05:53:11 executing program 5 (fault-call:2 fault-nth:63): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:11 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x74], 0x0, 0x8, 0x4}) [ 937.594916][T20439] FAULT_INJECTION: forcing a failure. [ 937.594916][T20439] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 937.608185][T20439] CPU: 0 PID: 20439 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 937.616973][T20439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.627032][T20439] Call Trace: [ 937.630315][T20439] dump_stack+0x137/0x19d [ 937.634662][T20439] should_fail+0x23c/0x250 [ 937.639080][T20439] __alloc_pages_nodemask+0xe7/0x310 [ 937.644377][T20439] alloc_pages_current+0x21d/0x310 [ 937.650183][T20439] relay_open_buf+0x20c/0x810 [ 937.654861][T20439] relay_open+0x25b/0x560 [ 937.659247][T20439] do_blk_trace_setup+0x2fa/0x510 [ 937.664318][T20439] blk_trace_setup+0x85/0x110 [ 937.668999][T20439] sg_ioctl_common+0xa02/0x1790 [ 937.673952][T20439] ? do_vfs_ioctl+0x4f7/0xee0 [ 937.678637][T20439] sg_ioctl+0x54/0xc0 [ 937.682650][T20439] ? sg_poll+0x240/0x240 [ 937.687010][T20439] __se_sys_ioctl+0xcb/0x140 [ 937.691612][T20439] __x64_sys_ioctl+0x3f/0x50 [ 937.696280][T20439] do_syscall_64+0x34/0x50 [ 937.700728][T20439] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 937.706627][T20439] RIP: 0033:0x466459 [ 937.710514][T20439] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 937.730207][T20439] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:12 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000020000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:12 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000005000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 937.739575][T20439] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 937.747546][T20439] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 937.755519][T20439] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 937.763490][T20439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 937.771460][T20439] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:12 executing program 3: r0 = getpid() clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r0], 0x1}, 0x58) tkill(r0, 0x18) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) clone(0xc0028000, 0x0, 0x0, 0x0, 0x0) clone(0x40001000, &(0x7f00000000c0)="d399f18c854756e584f9150e79d28bce832b6b0e9ad9ce07444c9949f476bd45d78f236b3b1554d5d63514b786364818481db23dadf7a4282d31e55c4c1a2ba685e4c9f507746fad423893b1aad2cb74df65a8890ef62b6beeff65a63fee16f6795fa76a5b3e1d63156c47445562307a5a09217385f8bb368107b9aaafd2a9b2a266ddadf76886e696e2a4812bed73db8e8f988ec2dd086cad1963d1c3e992062b4565f6ad354a188552a79e756cefe392eb59e45df0534e05d08c9a3fba2930963366ac3cd92ec683be6eb51a6cc40b54a5eb690d6254ec8fc8", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="cffcd28e467aa38ca85b7d7f6c3e55093ba39571e155fcd885e2f3c176ebcb0659766321c2e356d4be4718d3d3014e18def857164a6f6c58af75dc78df24f4686aeab91aa9a3f5b981") gettid() write$sndseq(0xffffffffffffffff, &(0x7f0000000380)=[{0x1, 0xf4, 0x7, 0x1, @time={0x8000, 0x5}, {0x0, 0x2}, {0x0, 0xff}, @note={0x40, 0x4, 0x85, 0xf, 0xffffffff}}, {0x8, 0x5, 0x0, 0x4, @tick=0x1f, {0x1, 0x37}, {0x2, 0xf8}, @raw8={"894d2b418dbefa0d22cca7b6"}}, {0x7, 0x4, 0xff, 0x9, @tick=0x7, {0x8}, {0x1f, 0xcd}, @queue={0xc0, {0x7e98, 0x56}}}, {0x8, 0xf8, 0x0, 0x8, @tick=0x1, {0x8, 0x4}, {}, @note={0x6, 0x3, 0x66, 0x0, 0x7}}, {0x0, 0x9, 0x5, 0x8, @time={0xe798, 0x4}, {0x3f, 0x20}, {0x81}, @addr={0x83}}, {0x9, 0xf8, 0x5, 0x0, @time={0x200, 0x7}, {0x9, 0xf8}, {}, @quote={{0x3}, 0x9}}, {0x20, 0xcc, 0xe0, 0x0, @tick=0x1d, {0x4, 0x5}, {0x28, 0x7}, @ext={0x60, &(0x7f0000000300)="0dfdf0227dd96bba72cb921e3fa0c1df9cee15762507c45cffc0567e7dd70623630d25582335e791be0e9150f4e875781159a74fe45ab6ec29a0d9aca67cac3d8e2ec453321fb7973cb9674359c511121ac76e8b69d1018b159b48a17415cd94"}}, {0xc8, 0x8, 0x26, 0x2, @time={0x10000, 0x5}, {0x1}, {0x40, 0x7}, @note={0x40, 0x3, 0x8, 0x7, 0x5}}, {0xe7, 0x7, 0x1, 0x1f, @tick=0xb0, {0x1, 0x2}, {0x8, 0x5}, @raw32={[0xadb8, 0x2, 0x5]}}, {0xff, 0x80, 0x3, 0x3, @tick=0x7f, {0x40, 0x7}, {0x29, 0x9}, @raw8={"016895cc077ba6954512d130"}}], 0x118) 05:53:12 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x7a], 0x0, 0x8, 0x4}) 05:53:12 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000006000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:12 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x50b080, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(0xffffffffffffffff, 0x8008330e, &(0x7f0000000080)) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='illinois\x00', 0x9) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x240}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a5c7f1f6d88b967487a4257357d803d7da6a13876ae1241ba7860ac5cf65ac60cded8971395abeaf4b4834ff922b3f1e0b0a3a07e758044ab4ea6f7ae55d8", 0xfe92, 0x20c49a, 0x0, 0x76) 05:53:12 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000028000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:12 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000406000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:12 executing program 5 (fault-call:2 fault-nth:64): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:12 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:53:12 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000007000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 937.983529][T20482] FAULT_INJECTION: forcing a failure. [ 937.983529][T20482] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 937.996963][T20482] CPU: 1 PID: 20482 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 938.005786][T20482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.015851][T20482] Call Trace: [ 938.019137][T20482] dump_stack+0x137/0x19d [ 938.023474][T20482] should_fail+0x23c/0x250 [ 938.027938][T20482] __alloc_pages_nodemask+0xe7/0x310 [ 938.033257][T20482] alloc_pages_current+0x21d/0x310 [ 938.038376][T20482] relay_open_buf+0x20c/0x810 [ 938.043077][T20482] relay_open+0x25b/0x560 [ 938.047412][T20482] do_blk_trace_setup+0x2fa/0x510 [ 938.052440][T20482] blk_trace_setup+0x85/0x110 [ 938.057143][T20482] sg_ioctl_common+0xa02/0x1790 [ 938.061994][T20482] ? do_vfs_ioctl+0x4f7/0xee0 [ 938.066679][T20482] sg_ioctl+0x54/0xc0 [ 938.070701][T20482] ? sg_poll+0x240/0x240 [ 938.075284][T20482] __se_sys_ioctl+0xcb/0x140 05:53:12 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000030000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 938.079875][T20482] __x64_sys_ioctl+0x3f/0x50 [ 938.084814][T20482] do_syscall_64+0x34/0x50 [ 938.089277][T20482] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 938.095240][T20482] RIP: 0033:0x466459 [ 938.099215][T20482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 938.118824][T20482] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:12 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000008000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 938.127243][T20482] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 938.135219][T20482] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 938.143191][T20482] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 938.151158][T20482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 938.159130][T20482] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:12 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000038000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:12 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x2], 0x0, 0x8, 0x4}) 05:53:12 executing program 5 (fault-call:2 fault-nth:65): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:12 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000009000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 938.283534][T20507] FAULT_INJECTION: forcing a failure. [ 938.283534][T20507] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 938.296890][T20507] CPU: 0 PID: 20507 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 938.305649][T20507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.316048][T20507] Call Trace: [ 938.319320][T20507] dump_stack+0x137/0x19d [ 938.323650][T20507] should_fail+0x23c/0x250 [ 938.328108][T20507] __alloc_pages_nodemask+0xe7/0x310 [ 938.333402][T20507] alloc_pages_current+0x21d/0x310 [ 938.338570][T20507] relay_open_buf+0x20c/0x810 [ 938.343386][T20507] relay_open+0x25b/0x560 [ 938.347749][T20507] do_blk_trace_setup+0x2fa/0x510 [ 938.352938][T20507] blk_trace_setup+0x85/0x110 [ 938.357616][T20507] sg_ioctl_common+0xa02/0x1790 [ 938.362531][T20507] ? do_vfs_ioctl+0x4f7/0xee0 [ 938.367210][T20507] sg_ioctl+0x54/0xc0 [ 938.371264][T20507] ? sg_poll+0x240/0x240 [ 938.375552][T20507] __se_sys_ioctl+0xcb/0x140 [ 938.380144][T20507] __x64_sys_ioctl+0x3f/0x50 [ 938.384802][T20507] do_syscall_64+0x34/0x50 [ 938.389302][T20507] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 938.395279][T20507] RIP: 0033:0x466459 [ 938.399167][T20507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 938.418792][T20507] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 938.427359][T20507] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 938.435329][T20507] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 938.443404][T20507] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 938.451503][T20507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 938.459474][T20507] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:13 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x321040, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x48, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0xfffffffe, 0x5f}}}}, [@NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x17f}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xfbe}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xb8}]}, 0x48}}, 0x24000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x3, 0x81) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000100)=0x395f, 0x4) close(r1) sendmsg$unix(r2, &(0x7f0000002580)={&(0x7f0000000000), 0x6e, 0x0}, 0x0) recvmmsg(r2, &(0x7f0000001d40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 05:53:13 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000040000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:13 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000000000000a000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:13 executing program 5 (fault-call:2 fault-nth:66): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:13 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x3], 0x0, 0x8, 0x4}) [ 938.847514][T20530] FAULT_INJECTION: forcing a failure. [ 938.847514][T20530] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 938.860796][T20530] CPU: 1 PID: 20530 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 938.869558][T20530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.879615][T20530] Call Trace: [ 938.882897][T20530] dump_stack+0x137/0x19d [ 938.887232][T20530] should_fail+0x23c/0x250 [ 938.891667][T20530] __alloc_pages_nodemask+0xe7/0x310 [ 938.897004][T20530] alloc_pages_current+0x21d/0x310 [ 938.907218][T20530] relay_open_buf+0x20c/0x810 [ 938.911905][T20530] relay_open+0x25b/0x560 [ 938.916235][T20530] do_blk_trace_setup+0x2fa/0x510 [ 938.921252][T20530] blk_trace_setup+0x85/0x110 [ 938.925925][T20530] sg_ioctl_common+0xa02/0x1790 [ 938.930892][T20530] ? do_vfs_ioctl+0x4f7/0xee0 [ 938.935571][T20530] sg_ioctl+0x54/0xc0 [ 938.939615][T20530] ? sg_poll+0x240/0x240 [ 938.943861][T20530] __se_sys_ioctl+0xcb/0x140 [ 938.948447][T20530] __x64_sys_ioctl+0x3f/0x50 [ 938.953074][T20530] do_syscall_64+0x34/0x50 [ 938.957488][T20530] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 938.963387][T20530] RIP: 0033:0x466459 [ 938.967278][T20530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 938.986883][T20530] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:13 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000080000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 938.995303][T20530] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 939.003276][T20530] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 939.011251][T20530] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 939.019223][T20530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 939.027211][T20530] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:13 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000000000000b000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:13 executing program 5 (fault-call:2 fault-nth:67): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:13 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x4], 0x0, 0x8, 0x4}) 05:53:13 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000008f000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 939.117393][T20547] FAULT_INJECTION: forcing a failure. [ 939.117393][T20547] name failslab, interval 1, probability 0, space 0, times 0 [ 939.130044][T20547] CPU: 1 PID: 20547 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 939.138802][T20547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 939.148909][T20547] Call Trace: [ 939.152189][T20547] dump_stack+0x137/0x19d [ 939.156600][T20547] should_fail+0x23c/0x250 [ 939.161098][T20547] __should_failslab+0x81/0x90 05:53:13 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000002000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 939.165890][T20547] should_failslab+0x5/0x20 [ 939.170395][T20547] kmem_cache_alloc_node_trace+0x59/0x300 [ 939.176113][T20547] ? __get_vm_area_node+0x11b/0x260 [ 939.181331][T20547] __get_vm_area_node+0x11b/0x260 [ 939.186354][T20547] vmap+0x8c/0x1b0 [ 939.190097][T20547] ? relay_open_buf+0x2cd/0x810 [ 939.194951][T20547] ? alloc_pages_current+0x21d/0x310 [ 939.200247][T20547] relay_open_buf+0x2cd/0x810 [ 939.205512][T20547] relay_open+0x25b/0x560 [ 939.209858][T20547] do_blk_trace_setup+0x2fa/0x510 [ 939.214885][T20547] blk_trace_setup+0x85/0x110 [ 939.219590][T20547] sg_ioctl_common+0xa02/0x1790 [ 939.224442][T20547] ? do_vfs_ioctl+0x4f7/0xee0 [ 939.229117][T20547] sg_ioctl+0x54/0xc0 [ 939.233097][T20547] ? sg_poll+0x240/0x240 [ 939.237380][T20547] __se_sys_ioctl+0xcb/0x140 [ 939.241969][T20547] __x64_sys_ioctl+0x3f/0x50 [ 939.246562][T20547] do_syscall_64+0x34/0x50 [ 939.250982][T20547] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 939.256956][T20547] RIP: 0033:0x466459 05:53:13 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000000000000c000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 939.260844][T20547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 939.280469][T20547] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 939.289012][T20547] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 939.296978][T20547] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 939.304952][T20547] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 939.313013][T20547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 939.320992][T20547] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:14 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x5], 0x0, 0x8, 0x4}) 05:53:14 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000003000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:14 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000000000000d000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:14 executing program 5 (fault-call:2 fault-nth:68): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 939.874085][T20573] blktrace: Concurrent blktraces are not allowed on sg0 [ 939.887991][T20578] FAULT_INJECTION: forcing a failure. [ 939.887991][T20578] name failslab, interval 1, probability 0, space 0, times 0 [ 939.900805][T20578] CPU: 1 PID: 20578 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 939.909565][T20578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 939.919626][T20578] Call Trace: 05:53:14 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000001900)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee01, r1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) fstat(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee01, r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r5, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000080)={{}, {0x1, 0x6}, [{0x2, 0x7}, {0x2, 0x5, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x1}, {0x2, 0x0, r3}], {0x4, 0x1}, [{0x8, 0x4, r5}], {0x10, 0x8}, {0x20, 0x3}}, 0x54, 0x3) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000001c0)='tmpfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000004c0)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 05:53:14 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000000000000e000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 939.922900][T20578] dump_stack+0x137/0x19d [ 939.927233][T20578] should_fail+0x23c/0x250 [ 939.931649][T20578] __should_failslab+0x81/0x90 [ 939.936413][T20578] should_failslab+0x5/0x20 [ 939.940917][T20578] kmem_cache_alloc_node+0x56/0x2f0 [ 939.946122][T20578] ? alloc_vmap_area+0x12f/0x1340 [ 939.951149][T20578] alloc_vmap_area+0x12f/0x1340 [ 939.956001][T20578] ? kmem_cache_alloc_node_trace+0x1cb/0x300 [ 939.962023][T20578] __get_vm_area_node+0x165/0x260 [ 939.967052][T20578] vmap+0x8c/0x1b0 [ 939.970773][T20578] ? relay_open_buf+0x2cd/0x810 [ 939.975684][T20578] ? alloc_pages_current+0x21d/0x310 [ 939.980979][T20578] relay_open_buf+0x2cd/0x810 [ 939.985712][T20578] relay_open+0x25b/0x560 [ 939.990075][T20578] do_blk_trace_setup+0x2fa/0x510 [ 939.995157][T20578] blk_trace_setup+0x85/0x110 [ 939.999834][T20578] sg_ioctl_common+0xa02/0x1790 [ 940.004685][T20578] ? do_vfs_ioctl+0x4f7/0xee0 [ 940.009400][T20578] sg_ioctl+0x54/0xc0 [ 940.013497][T20578] ? sg_poll+0x240/0x240 [ 940.017742][T20578] __se_sys_ioctl+0xcb/0x140 05:53:14 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000004000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 940.022331][T20578] __x64_sys_ioctl+0x3f/0x50 [ 940.026969][T20578] do_syscall_64+0x34/0x50 [ 940.031394][T20578] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 940.037291][T20578] RIP: 0033:0x466459 [ 940.041178][T20578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 940.060888][T20578] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:14 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000000000000f000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 940.069295][T20578] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 940.077271][T20578] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 940.085310][T20578] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 940.093367][T20578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 940.101334][T20578] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:14 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000010000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:14 executing program 5 (fault-call:2 fault-nth:69): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:14 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000005000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1000000000022, &(0x7f00000001c0)=0x1, 0x4) r2 = syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x0, &(0x7f0000000180), 0x1, &(0x7f0000000200)={[{@huge_advise='huge=advise'}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) ioctl$BTRFS_IOC_SEND(r2, 0x40489426, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000240), 0x2, 0x5, [0x8, 0x5, 0x3, 0x7]}) setsockopt$inet_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) preadv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/243, 0xf3}], 0x1, 0x50000, 0x53) sendmmsg(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="04", 0x1}], 0x2}, 0x62d8d56b}], 0x1, 0x2400c875) 05:53:14 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x6], 0x0, 0x8, 0x4}) [ 940.196600][T20607] FAULT_INJECTION: forcing a failure. [ 940.196600][T20607] name failslab, interval 1, probability 0, space 0, times 0 [ 940.209251][T20607] CPU: 1 PID: 20607 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 940.218013][T20607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.228105][T20607] Call Trace: [ 940.231388][T20607] dump_stack+0x137/0x19d [ 940.235725][T20607] should_fail+0x23c/0x250 [ 940.240137][T20607] __should_failslab+0x81/0x90 05:53:14 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000011000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 940.244905][T20607] should_failslab+0x5/0x20 [ 940.249407][T20607] kmem_cache_alloc_node+0x56/0x2f0 [ 940.254646][T20607] ? alloc_vmap_area+0x202/0x1340 [ 940.259954][T20607] alloc_vmap_area+0x202/0x1340 [ 940.264886][T20607] ? kmem_cache_alloc_node_trace+0x1cb/0x300 [ 940.270881][T20607] __get_vm_area_node+0x165/0x260 [ 940.275909][T20607] vmap+0x8c/0x1b0 [ 940.279666][T20607] ? relay_open_buf+0x2cd/0x810 [ 940.284523][T20607] ? alloc_pages_current+0x21d/0x310 [ 940.289855][T20607] relay_open_buf+0x2cd/0x810 05:53:14 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000012000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 940.294536][T20607] relay_open+0x25b/0x560 [ 940.298868][T20607] do_blk_trace_setup+0x2fa/0x510 [ 940.303900][T20607] blk_trace_setup+0x85/0x110 [ 940.308580][T20607] sg_ioctl_common+0xa02/0x1790 [ 940.313429][T20607] ? do_vfs_ioctl+0x4f7/0xee0 [ 940.318104][T20607] sg_ioctl+0x54/0xc0 [ 940.322084][T20607] ? sg_poll+0x240/0x240 [ 940.326329][T20607] __se_sys_ioctl+0xcb/0x140 [ 940.330916][T20607] __x64_sys_ioctl+0x3f/0x50 [ 940.335507][T20607] do_syscall_64+0x34/0x50 [ 940.339928][T20607] entry_SYSCALL_64_after_hwframe+0x44/0xae 05:53:14 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000018000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 940.345826][T20607] RIP: 0033:0x466459 [ 940.349713][T20607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 940.369318][T20607] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 940.377757][T20607] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 940.385746][T20607] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 05:53:14 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000019000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:14 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x7], 0x0, 0x8, 0x4}) 05:53:14 executing program 5 (fault-call:2 fault-nth:70): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:14 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000006000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 940.393711][T20607] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 940.401717][T20607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 940.409686][T20607] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 [ 940.421829][T20614] tmpfs: Unsupported parameter 'huge' [ 940.432710][T20613] blktrace: Concurrent blktraces are not allowed on sg0 05:53:14 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000020000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 940.494096][T20614] tmpfs: Unsupported parameter 'huge' [ 940.513602][T20640] blktrace: Concurrent blktraces are not allowed on sg0 [ 940.521899][T20643] FAULT_INJECTION: forcing a failure. [ 940.521899][T20643] name failslab, interval 1, probability 0, space 0, times 0 [ 940.534544][T20643] CPU: 0 PID: 20643 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 940.543310][T20643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.553366][T20643] Call Trace: [ 940.556764][T20643] dump_stack+0x137/0x19d [ 940.561097][T20643] should_fail+0x23c/0x250 [ 940.566034][T20643] __should_failslab+0x81/0x90 [ 940.570801][T20643] ? relay_open_buf+0x399/0x810 [ 940.575701][T20643] should_failslab+0x5/0x20 [ 940.580215][T20643] kmem_cache_alloc_trace+0x49/0x320 [ 940.585552][T20643] ? vmap+0x181/0x1b0 [ 940.589537][T20643] relay_open_buf+0x399/0x810 [ 940.594278][T20643] relay_open+0x25b/0x560 [ 940.598617][T20643] do_blk_trace_setup+0x2fa/0x510 [ 940.603647][T20643] blk_trace_setup+0x85/0x110 [ 940.608327][T20643] sg_ioctl_common+0xa02/0x1790 [ 940.613178][T20643] ? do_vfs_ioctl+0x4f7/0xee0 [ 940.617952][T20643] sg_ioctl+0x54/0xc0 [ 940.621935][T20643] ? sg_poll+0x240/0x240 [ 940.626172][T20643] __se_sys_ioctl+0xcb/0x140 [ 940.630762][T20643] __x64_sys_ioctl+0x3f/0x50 [ 940.635352][T20643] do_syscall_64+0x34/0x50 [ 940.639774][T20643] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 940.645734][T20643] RIP: 0033:0x466459 [ 940.649626][T20643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 940.669234][T20643] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 940.677755][T20643] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 940.685826][T20643] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 05:53:15 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000180)=[{0xa, 0x0, 0x0, 0x7ffc0001}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x7, 0x4, 0x3}]}) pkey_alloc(0x0, 0x0) [ 940.693802][T20643] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 940.701877][T20643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 940.709858][T20643] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:15 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000007000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:15 executing program 3: r0 = socket$inet(0x10, 0x809, 0x20) write(r0, &(0x7f0000000040)="520000001e00630014fffffffff8077a0700000000000000000008000800090000b70000", 0x52) 05:53:15 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000001020000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:15 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x8], 0x0, 0x8, 0x4}) 05:53:15 executing program 3: setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000040), &(0x7f0000000080)=0x4) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x4540, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000140)=0x4) preadv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000180)=""/60, 0x3c}, {&(0x7f00000001c0)=""/158, 0x9e}, {&(0x7f0000000280)=""/20, 0x14}, {&(0x7f00000002c0)=""/250, 0xfa}, {&(0x7f00000003c0)=""/235, 0xeb}, {&(0x7f00000004c0)=""/189, 0xbd}], 0x6, 0xfffffff9, 0x9) r1 = socket(0x2, 0x800, 0x3) r2 = dup3(r0, r1, 0x80000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) r3 = signalfd4(r1, &(0x7f0000000600)={[0x834]}, 0x8, 0x100000) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3000003, 0x4010, r3, 0x41201000) connect$inet(r3, &(0x7f0000000640)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) write$binfmt_misc(r0, &(0x7f0000000680)={'syz1', "ad5bf318d7c74baeffa44abd43be04905a0ff0c18e26d8cad235b16e097dd989a95d0fa8d3360f1514bd4774b1f6a1421a921d4a00cdd9f99a7dce8f3a124b3b9ceefc2c7995a3524966e6c1fdb27c8850d62f5ec066c1bd885ad39d171275d773a70d501d931d3fa9815ca5ba158144ddcc907d00ab67ecb70d64d350012710a24a9662fd21c0614800850c1e7054602d35971ae846083fffcb781bfd7b96d1cebf9d944e16c3d473f750b111ea69ef15111946fc303fdbd72fe83056271d34e1d45d4f6f980e5bb45b5f566a8b153806e25023ecf0c9d765"}, 0xdd) r4 = open_tree(r3, &(0x7f0000000780)='./file0\x00', 0x900) fcntl$getownex(r4, 0x10, &(0x7f00000007c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000880)=@IORING_OP_WRITE={0x17, 0x3, 0x2007, @fd_index=0x6, 0x7fff, &(0x7f0000000800)="843fc9fd5ffc52adf0bda626f60fb890ed5e4b563bd4cb468fa6132357428953dc9005b2d83b7cea348a9c2d696fbbaf8590062dc5065cd8150f1e94f1750d18cb8f01cdcf4b38f7c0eab76fcb64e68ac1d8c9f23b68c18124337d899dabe161ea8b48052234391b13608335633922dfbde1eb8f2b30492b5b88c2b38d9b7833", 0x80, 0xc, 0x1}, 0x81) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f00000008c0)={0x34}) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000940)={&(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x8}) fsetxattr(r2, &(0x7f0000000980)=@known='trusted.overlay.impure\x00', &(0x7f00000009c0)='-*/\x00', 0x4, 0x2) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r5) 05:53:15 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000008000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:15 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000022000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:15 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000025000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:15 executing program 5 (fault-call:2 fault-nth:71): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:15 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000009000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:15 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x4052, r0, 0x0) mlock2(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x810, r0, 0x9e695000) r1 = open(&(0x7f0000000000)='./bus\x00', 0x800000141042, 0x0) ftruncate(r1, 0x200006) mlock2(&(0x7f0000000000/0x4000)=nil, 0x104000, 0x0) 05:53:15 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000000000003f000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:15 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x9], 0x0, 0x8, 0x4}) [ 941.020101][T20699] FAULT_INJECTION: forcing a failure. [ 941.020101][T20699] name failslab, interval 1, probability 0, space 0, times 0 [ 941.032897][T20699] CPU: 0 PID: 20699 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 941.041696][T20699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.051752][T20699] Call Trace: [ 941.055058][T20699] dump_stack+0x137/0x19d [ 941.059406][T20699] should_fail+0x23c/0x250 [ 941.063823][T20699] ? __d_alloc+0x36/0x370 [ 941.068195][T20699] __should_failslab+0x81/0x90 [ 941.072963][T20699] should_failslab+0x5/0x20 [ 941.077469][T20699] kmem_cache_alloc+0x46/0x300 [ 941.082231][T20699] __d_alloc+0x36/0x370 [ 941.086388][T20699] ? avc_has_perm_noaudit+0x19a/0x240 [ 941.091760][T20699] d_alloc+0x2a/0x130 [ 941.095770][T20699] d_alloc_parallel+0x46/0xba0 [ 941.100622][T20699] ? selinux_inode_permission+0x2ca/0x430 [ 941.106341][T20699] ? selinux_inode_permission+0x350/0x430 [ 941.112068][T20699] ? security_inode_permission+0xab/0xc0 [ 941.117707][T20699] ? __d_lookup+0x3c8/0x400 [ 941.122216][T20699] __lookup_slow+0x7f/0x280 [ 941.126722][T20699] lookup_one_len+0xd0/0x180 [ 941.131356][T20699] start_creating+0x137/0x250 [ 941.136031][T20699] __debugfs_create_file+0x74/0x360 [ 941.141321][T20699] debugfs_create_file+0x45/0x50 [ 941.146259][T20699] blk_create_buf_file_callback+0x2d/0x40 [ 941.151987][T20699] ? blk_subbuf_start_callback+0x60/0x60 [ 941.157650][T20699] relay_open_buf+0x3fb/0x810 [ 941.162369][T20699] relay_open+0x25b/0x560 [ 941.166719][T20699] do_blk_trace_setup+0x2fa/0x510 [ 941.171841][T20699] blk_trace_setup+0x85/0x110 [ 941.176520][T20699] sg_ioctl_common+0xa02/0x1790 [ 941.181369][T20699] ? do_vfs_ioctl+0x4f7/0xee0 [ 941.186049][T20699] sg_ioctl+0x54/0xc0 [ 941.190063][T20699] ? sg_poll+0x240/0x240 [ 941.194299][T20699] __se_sys_ioctl+0xcb/0x140 [ 941.198929][T20699] __x64_sys_ioctl+0x3f/0x50 [ 941.203543][T20699] do_syscall_64+0x34/0x50 [ 941.207965][T20699] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 941.213884][T20699] RIP: 0033:0x466459 [ 941.217770][T20699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 941.237374][T20699] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 941.245829][T20699] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 941.253793][T20699] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 941.261757][T20699] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 05:53:15 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000a000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 941.269728][T20699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 941.277705][T20699] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:15 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000040000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:15 executing program 3: r0 = socket(0x10, 0x80000000000802, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) r1 = socket$inet(0x2, 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x2) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x1, 'erspan0\x00', {}, 0x400}) 05:53:15 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000048000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:15 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000b000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:15 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000000000004c000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 941.385100][T20717] netlink: 148 bytes leftover after parsing attributes in process `syz-executor.3'. [ 941.426105][T20717] netlink: 148 bytes leftover after parsing attributes in process `syz-executor.3'. 05:53:15 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000068000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:15 executing program 5 (fault-call:2 fault-nth:72): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:15 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000c000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=0xfffffffffffff801, 0x12) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0', [{}, {0x20, 'memory.current\x00'}, {0x20, '@-(+/&{\xaa,}$\')'}, {0x20, '#'}, {0x20, '#*'}, {0x20, 'memory.current\x00'}, {0x20, 'memory.current\x00'}, {0x20, 'memory.current\x00'}, {0x20, 'memory.current\x00'}], 0xa, "51b0e262025a0e4eba4ccf64bfe535a22f9c8c2c34397aa6925dcf11228c77775cc4cecd0f6d81d345858ebff8551bb030a086fdf9bbe82a1b6dc6a9fd00b17df4221aa72123b7a6e67bb3c6809b462ea66ca0a0d2982e62fd56f6126395fb6a453b0f27512007fba8887ce9db750cfd76811376710a8da31157e2e29d822845e88e630a1d3ff6b18019fb272b0af74e4260a4a43e88daf50ce2bca86c4bab3591dcec232f0930dbc655bb750339c0a6eec84eb5bf"}, 0x124) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ttyS3\x00', 0x900, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1800003, 0x30, 0xffffffffffffffff, 0xaa42d000) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='freezer.parent_freezing\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000008, 0x10, r2, 0x6f0a1000) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x12, r0, 0x0) fdatasync(r0) ioctl(r1, 0x27, &(0x7f0000000200)="50c463a2a7bcad6753c0dbc8c5d2219d7c4c3db860d759330c47d1e0106ff5da32ac0e2d646e2e1ff44ea9d0ef2fe6885ef81b31ae558f6bfa91fb36df3113a95ddcf9434dc8d0c6bc1648c03873072cb1b8bb440c18051008ca59ec00f7d6a2e75e54f94ce98d834570e15cfc") r4 = dup2(r0, r1) openat$cgroup_ro(r4, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(r5, &(0x7f0000000180), 0xf1, 0x0) 05:53:15 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000000000006c000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:15 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0xa], 0x0, 0x8, 0x4}) 05:53:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x9}, 0x8c20, 0x3f, 0x0, 0x9, 0xc0000001, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x0, 0x0) openat$bsg(0xffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x800, 0x0) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x98, 0x0, 0x20, 0x70bd2c, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xfff, 0x7}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0xa}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x49}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0xa}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x55}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x5d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x2b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x2b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x2b}]}, 0x98}, 0x1, 0x0, 0x0, 0x800}, 0x800) socket$nl_generic(0x10, 0x3, 0x10) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)=ANY=[@ANYBLOB='\x00']) [ 941.603101][T20749] FAULT_INJECTION: forcing a failure. [ 941.603101][T20749] name failslab, interval 1, probability 0, space 0, times 0 [ 941.615759][T20749] CPU: 0 PID: 20749 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 941.624701][T20749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.634772][T20749] Call Trace: [ 941.638044][T20749] dump_stack+0x137/0x19d [ 941.642422][T20749] should_fail+0x23c/0x250 [ 941.646865][T20749] ? new_inode_pseudo+0x5c/0x1c0 [ 941.651817][T20749] __should_failslab+0x81/0x90 [ 941.656599][T20749] should_failslab+0x5/0x20 [ 941.661108][T20749] kmem_cache_alloc+0x46/0x300 [ 941.665872][T20749] new_inode_pseudo+0x5c/0x1c0 [ 941.670718][T20749] new_inode+0x21/0x120 [ 941.674881][T20749] __debugfs_create_file+0x110/0x360 [ 941.680162][T20749] debugfs_create_file+0x45/0x50 [ 941.685112][T20749] blk_create_buf_file_callback+0x2d/0x40 [ 941.690936][T20749] ? blk_subbuf_start_callback+0x60/0x60 [ 941.696612][T20749] relay_open_buf+0x3fb/0x810 [ 941.701299][T20749] relay_open+0x25b/0x560 [ 941.705683][T20749] do_blk_trace_setup+0x2fa/0x510 [ 941.710734][T20749] blk_trace_setup+0x85/0x110 [ 941.715484][T20749] sg_ioctl_common+0xa02/0x1790 [ 941.720333][T20749] ? do_vfs_ioctl+0x4f7/0xee0 [ 941.725002][T20749] sg_ioctl+0x54/0xc0 [ 941.729079][T20749] ? sg_poll+0x240/0x240 [ 941.733799][T20749] __se_sys_ioctl+0xcb/0x140 [ 941.738390][T20749] __x64_sys_ioctl+0x3f/0x50 [ 941.742980][T20749] do_syscall_64+0x34/0x50 [ 941.747392][T20749] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 941.753318][T20749] RIP: 0033:0x466459 [ 941.757196][T20749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 941.777057][T20749] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 941.785519][T20749] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 941.793482][T20749] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 05:53:15 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000072000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:15 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000073000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:16 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000074000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:16 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000000000007a000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:16 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000ffffffffffffff7f000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000d000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 941.801450][T20749] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 941.809591][T20749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 941.817581][T20749] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 [ 941.825656][T20749] debugfs: out of free dentries, can not create file 'trace0' [ 941.841313][T20754] loop3: detected capacity change from 0 to 131456 05:53:16 executing program 5 (fault-call:2 fault-nth:73): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:16 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000ffffff8c000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 941.859090][T20767] blktrace: Concurrent blktraces are not allowed on sg0 [ 941.866710][T20754] EXT4-fs (loop3): Unrecognized mount option "À" or missing value [ 941.874700][T20754] EXT4-fs (loop3): failed to parse options in superblock: À 05:53:16 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0xb], 0x0, 0x8, 0x4}) [ 941.957819][T20781] FAULT_INJECTION: forcing a failure. [ 941.957819][T20781] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 941.971179][T20781] CPU: 1 PID: 20781 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 941.979945][T20781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.990136][T20781] Call Trace: [ 941.993455][T20781] dump_stack+0x137/0x19d [ 941.997826][T20781] should_fail+0x23c/0x250 [ 942.002238][T20781] __alloc_pages_nodemask+0xe7/0x310 [ 942.007535][T20781] alloc_pages_current+0x21d/0x310 [ 942.012846][T20781] __get_free_pages+0x8/0x30 [ 942.017445][T20781] inode_doinit_with_dentry+0x63d/0x940 [ 942.022997][T20781] selinux_d_instantiate+0x23/0x30 [ 942.028118][T20781] security_d_instantiate+0x87/0xb0 [ 942.033320][T20781] d_instantiate+0x36/0x90 [ 942.037736][T20781] __debugfs_create_file+0x20b/0x360 [ 942.043030][T20781] debugfs_create_file+0x45/0x50 [ 942.047997][T20781] blk_create_buf_file_callback+0x2d/0x40 [ 942.053751][T20781] ? blk_subbuf_start_callback+0x60/0x60 [ 942.059437][T20781] relay_open_buf+0x3fb/0x810 [ 942.064172][T20781] relay_open+0x25b/0x560 [ 942.068505][T20781] do_blk_trace_setup+0x2fa/0x510 [ 942.073621][T20781] blk_trace_setup+0x85/0x110 [ 942.078305][T20781] sg_ioctl_common+0xa02/0x1790 [ 942.083159][T20781] ? do_vfs_ioctl+0x4f7/0xee0 [ 942.087834][T20781] sg_ioctl+0x54/0xc0 [ 942.091915][T20781] ? sg_poll+0x240/0x240 [ 942.096154][T20781] __se_sys_ioctl+0xcb/0x140 [ 942.100790][T20781] __x64_sys_ioctl+0x3f/0x50 [ 942.105386][T20781] do_syscall_64+0x34/0x50 [ 942.109880][T20781] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 942.115842][T20781] RIP: 0033:0x466459 [ 942.119725][T20781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 942.139331][T20781] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 942.147886][T20781] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 05:53:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000e000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:16 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000a9c000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 942.156036][T20781] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 942.164014][T20781] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 942.171977][T20781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 942.179949][T20781] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 [ 942.196655][T20754] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a002c01c, mo2=0006] [ 942.219779][T20754] System zones: 1-2, 19-19, 35-38, 46-46 [ 942.251801][T20754] EXT4-fs (loop3): mounted filesystem without journal. Opts: À; ,errors=continue. Quota mode: none. 05:53:16 executing program 3: ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)={0x0, @aes256, 0x0, @desc1}) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000001680)=ANY=[@ANYBLOB="b00e000000000000000000000000e04bcc0008000000", @ANYRES32=0x0, @ANYBLOB="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"], 0xeb0}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)={0x3, 'macvlan0\x00', {0xfffffffb}, 0x2}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) 05:53:16 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0xc], 0x0, 0x8, 0x4}) 05:53:16 executing program 5 (fault-call:2 fault-nth:74): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 942.273698][T20754] ext4 filesystem being mounted at /root/syzkaller-testdir069049329/syzkaller.SxCJJA/3913/file0 supports timestamps until 2038 (0x7fffffff) 05:53:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000f000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:16 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000fffffff0000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 942.350529][T20809] blktrace: Concurrent blktraces are not allowed on sg0 [ 942.368804][T20811] FAULT_INJECTION: forcing a failure. [ 942.368804][T20811] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 942.382046][T20811] CPU: 1 PID: 20811 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 942.390821][T20811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.401045][T20811] Call Trace: [ 942.404325][T20811] dump_stack+0x137/0x19d [ 942.408664][T20811] should_fail+0x23c/0x250 [ 942.413101][T20811] __alloc_pages_nodemask+0xe7/0x310 [ 942.418393][T20811] alloc_pages_current+0x21d/0x310 [ 942.423593][T20811] __get_free_pages+0x8/0x30 [ 942.428186][T20811] inode_doinit_with_dentry+0x63d/0x940 [ 942.433729][T20811] selinux_d_instantiate+0x23/0x30 [ 942.438896][T20811] security_d_instantiate+0x87/0xb0 [ 942.444094][T20811] d_instantiate+0x36/0x90 [ 942.448615][T20811] __debugfs_create_file+0x20b/0x360 [ 942.453898][T20811] debugfs_create_file+0x45/0x50 [ 942.458866][T20811] blk_create_buf_file_callback+0x2d/0x40 [ 942.464645][T20811] ? blk_subbuf_start_callback+0x60/0x60 [ 942.470284][T20811] relay_open_buf+0x3fb/0x810 [ 942.475077][T20811] relay_open+0x25b/0x560 [ 942.479409][T20811] do_blk_trace_setup+0x2fa/0x510 [ 942.484486][T20811] blk_trace_setup+0x85/0x110 [ 942.489212][T20811] sg_ioctl_common+0xa02/0x1790 [ 942.494064][T20811] ? do_vfs_ioctl+0x4f7/0xee0 05:53:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000010000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 942.498779][T20811] sg_ioctl+0x54/0xc0 [ 942.502758][T20811] ? sg_poll+0x240/0x240 [ 942.506999][T20811] __se_sys_ioctl+0xcb/0x140 [ 942.511590][T20811] __x64_sys_ioctl+0x3f/0x50 [ 942.516179][T20811] do_syscall_64+0x34/0x50 [ 942.520592][T20811] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 942.526489][T20811] RIP: 0033:0x466459 [ 942.530379][T20811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:53:16 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0xd], 0x0, 0x8, 0x4}) [ 942.550022][T20811] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 942.558478][T20811] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 942.566447][T20811] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 942.574416][T20811] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 942.582395][T20811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 942.590366][T20811] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:16 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000fffffff6000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000011000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:16 executing program 3: mkdir(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x620080, 0xed43b9a180da313e) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000280)='binfmt_misc\x00', 0x0, 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') r2 = socket$inet(0x2, 0x1, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) statx(r0, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x6000, 0x800, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r2, &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f00000006c0)={{}, {0x1, 0x4}, [{0x2, 0x3, 0xee00}, {0x2, 0x0, 0xee00}, {0x2, 0x2, 0xee01}, {0x2, 0x5}], {0x4, 0x4}, [{0x8, 0x5, r3}], {0x10, 0x4}, {0x20, 0x3}}, 0x4c, 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r1, 0xf505, 0x0) rename(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', &(0x7f00000001c0)='./file0\x00') 05:53:17 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000fffffdf9000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000012000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:17 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000000007fc000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000018000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:17 executing program 5 (fault-call:2 fault-nth:75): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:17 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000fffffdfd000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:17 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) r2 = openat(r0, &(0x7f00000001c0)='./file0\x00', 0x200000, 0x80) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) write$binfmt_misc(r1, 0x0, 0x4240a2a0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010002000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800"], 0x1}}, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000180)) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = open_tree(r0, &(0x7f0000000300)='./file0\x00', 0x8000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f00000009c0)={'ip6gre0\x00', &(0x7f0000000940)={'sit0\x00', 0x0, 0x2f, 0x5, 0x48, 0x1, 0x0, @mcast2, @dev, 0x40, 0x80, 0x4, 0xfffffffb}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000c40)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="01002dbd7000fedbdf251500000058000180080003000200000014000200697036746e6c300000000000000000001400020076657468305f746f5f62617461647600", @ANYRES32=0x0, @ANYRESOCT, @ANYRES32=0x0, @ANYBLOB="14000200626174616476300000000000000000002c000180140002006e657464657673696d3000000000000014000200766c616e3100000000000000000000002000018008000100", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0100008000000000", @ANYRES32=0x0, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000300000000001400020076657468315f746f5f7465616d0000006400018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000300010000001400020067656e6576653000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000300030000001400020069705f76746930000000000000000000080003000200000044000180080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08aad5a1ee5a9dae7b7ee5cded030003004d6c2fc694da9b13", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1c000180", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080003000100000064000180080003000300000014000200767863616e31000000000000000000000800", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=0x0, @ANYRESDEC=r3, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB], 0x224}, 0x1, 0x0, 0x0, 0x20000000}, 0x41) write$binfmt_script(r4, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x5}, 0x900, 0x8f, 0x0, 0x9, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap(&(0x7f0000756000/0x3000)=nil, 0x3000, 0x3000004, 0x100010, 0xffffffffffffffff, 0xd9d9c000) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r7, r6, 0x0, 0x100000300) 05:53:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000019000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:17 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0xe], 0x0, 0x8, 0x4}) [ 942.867709][T20834] blktrace: Concurrent blktraces are not allowed on sg0 05:53:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000022000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:17 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000fffffffe000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 942.976886][T20872] FAULT_INJECTION: forcing a failure. [ 942.976886][T20872] name failslab, interval 1, probability 0, space 0, times 0 [ 942.989528][T20872] CPU: 0 PID: 20872 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 942.998302][T20872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.008467][T20872] Call Trace: [ 943.011742][T20872] dump_stack+0x137/0x19d [ 943.016077][T20872] should_fail+0x23c/0x250 [ 943.020493][T20872] __should_failslab+0x81/0x90 [ 943.025325][T20872] ? relay_open_buf+0xc1/0x810 [ 943.030400][T20872] should_failslab+0x5/0x20 [ 943.034900][T20872] kmem_cache_alloc_trace+0x49/0x320 [ 943.040232][T20872] relay_open_buf+0xc1/0x810 [ 943.044848][T20872] ? find_next_bit+0xc6/0xf0 [ 943.049437][T20872] relay_open+0x25b/0x560 [ 943.053842][T20872] do_blk_trace_setup+0x2fa/0x510 [ 943.058873][T20872] blk_trace_setup+0x85/0x110 [ 943.063629][T20872] sg_ioctl_common+0xa02/0x1790 [ 943.068550][T20872] ? do_vfs_ioctl+0x4f7/0xee0 [ 943.073224][T20872] sg_ioctl+0x54/0xc0 [ 943.077350][T20872] ? sg_poll+0x240/0x240 [ 943.081760][T20872] __se_sys_ioctl+0xcb/0x140 [ 943.086364][T20872] __x64_sys_ioctl+0x3f/0x50 [ 943.090952][T20872] do_syscall_64+0x34/0x50 [ 943.095371][T20872] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 943.101268][T20872] RIP: 0033:0x466459 [ 943.105163][T20872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:53:17 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000fffffffffffffffe000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 943.124797][T20872] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 943.133936][T20872] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 943.142404][T20872] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 943.150432][T20872] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 943.159188][T20872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 943.167160][T20872] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000025000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:17 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000fff000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:17 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000fffff7ff000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00002e000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:17 executing program 5 (fault-call:2 fault-nth:76): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:17 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x10], 0x0, 0x8, 0x4}) [ 943.373776][T20908] FAULT_INJECTION: forcing a failure. [ 943.373776][T20908] name failslab, interval 1, probability 0, space 0, times 0 [ 943.386426][T20908] CPU: 0 PID: 20908 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 943.395181][T20908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.407490][T20908] Call Trace: [ 943.410768][T20908] dump_stack+0x137/0x19d [ 943.415105][T20908] should_fail+0x23c/0x250 [ 943.419554][T20908] __should_failslab+0x81/0x90 [ 943.424325][T20908] ? kzalloc+0x16/0x20 [ 943.428440][T20908] should_failslab+0x5/0x20 [ 943.433018][T20908] __kmalloc+0x66/0x360 [ 943.437238][T20908] ? __kmalloc+0x1e0/0x360 [ 943.441649][T20908] ? relay_open_buf+0xc1/0x810 [ 943.446531][T20908] ? relay_open_buf+0xf1/0x810 [ 943.451355][T20908] kzalloc+0x16/0x20 [ 943.455255][T20908] relay_open_buf+0x1b0/0x810 [ 943.459930][T20908] ? find_next_bit+0xc6/0xf0 [ 943.464517][T20908] relay_open+0x25b/0x560 [ 943.468906][T20908] do_blk_trace_setup+0x2fa/0x510 [ 943.473931][T20908] blk_trace_setup+0x85/0x110 [ 943.478615][T20908] sg_ioctl_common+0xa02/0x1790 [ 943.484170][T20908] ? do_vfs_ioctl+0x4f7/0xee0 [ 943.488848][T20908] sg_ioctl+0x54/0xc0 [ 943.492950][T20908] ? sg_poll+0x240/0x240 [ 943.497204][T20908] __se_sys_ioctl+0xcb/0x140 [ 943.501831][T20908] __x64_sys_ioctl+0x3f/0x50 [ 943.506481][T20908] do_syscall_64+0x34/0x50 [ 943.510917][T20908] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 943.516827][T20908] RIP: 0033:0x466459 [ 943.520728][T20908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 943.540335][T20908] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 943.548785][T20908] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 943.556767][T20908] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 943.564737][T20908] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 05:53:17 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="5500000018007f0221fe0532a4a280b30a6005050002000005000000390009002d0050000600000019000540029b840200f75a4ff34ec6d1d1b947ca3ab82200007e0cec4fab91d471cd34938c42f030dd941e7931", 0x55}], 0x1}, 0x0) lremovexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='security.apparmor\x00') r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'team_slave_1\x00'}) 05:53:17 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000fffffbff000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000048000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 943.572706][T20908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 943.581023][T20908] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:17 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000001fffff000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:17 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x11], 0x0, 0x8, 0x4}) 05:53:17 executing program 5 (fault-call:2 fault-nth:77): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:17 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201bfffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x80, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x40010, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r1, 0x4277, 0xa448, 0x3, &(0x7f00000000c0)={[0xc1d]}, 0x8) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 05:53:18 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00004c000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 943.692957][T20937] FAULT_INJECTION: forcing a failure. [ 943.692957][T20937] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 943.706946][T20937] CPU: 1 PID: 20937 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 943.715877][T20937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.726054][T20937] Call Trace: [ 943.729334][T20937] dump_stack+0x137/0x19d [ 943.733670][T20937] should_fail+0x23c/0x250 [ 943.738185][T20937] __alloc_pages_nodemask+0xe7/0x310 [ 943.743478][T20937] alloc_pages_current+0x21d/0x310 [ 943.748594][T20937] relay_open_buf+0x20c/0x810 [ 943.753366][T20937] relay_open+0x25b/0x560 [ 943.754360][T20943] loop3: detected capacity change from 0 to 1 [ 943.757770][T20937] do_blk_trace_setup+0x2fa/0x510 [ 943.768837][T20937] blk_trace_setup+0x85/0x110 [ 943.773518][T20937] sg_ioctl_common+0xa02/0x1790 [ 943.778405][T20937] ? do_vfs_ioctl+0x4f7/0xee0 [ 943.783109][T20937] sg_ioctl+0x54/0xc0 [ 943.787402][T20937] ? sg_poll+0x240/0x240 [ 943.791654][T20937] __se_sys_ioctl+0xcb/0x140 [ 943.796290][T20937] __x64_sys_ioctl+0x3f/0x50 [ 943.800904][T20937] do_syscall_64+0x34/0x50 [ 943.805748][T20937] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 943.811649][T20937] RIP: 0033:0x466459 [ 943.815534][T20937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 943.835317][T20937] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:53:18 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000000007fffffff000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 943.843738][T20937] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 943.851717][T20937] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 943.859777][T20937] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 943.867756][T20937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 943.876314][T20937] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:18 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000060000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 943.923411][T20943] loop3: p1 p2 p3 p4 [ 943.928191][T20943] loop3: p1 start 1 is beyond EOD, truncated [ 943.934271][T20943] loop3: p2 size 1073741824 extends beyond EOD, truncated 05:53:18 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000ffffffff000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:18 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000068000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 943.992722][T20943] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 944.006562][T20943] loop3: p4 size 32768 extends beyond EOD, truncated 05:53:18 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000007ffffffffffff000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:18 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x12], 0x0, 0x8, 0x4}) 05:53:18 executing program 5 (fault-call:2 fault-nth:78): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:18 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00006c000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:18 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000007fffffffffffffff000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 944.132403][T20983] blktrace: Concurrent blktraces are not allowed on sg0 [ 944.177631][T20986] FAULT_INJECTION: forcing a failure. [ 944.177631][T20986] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 944.190922][T20986] CPU: 0 PID: 20986 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 944.199681][T20986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.209761][T20986] Call Trace: [ 944.213038][T20986] dump_stack+0x137/0x19d [ 944.217444][T20986] should_fail+0x23c/0x250 [ 944.221862][T20986] __alloc_pages_nodemask+0xe7/0x310 [ 944.227155][T20986] alloc_pages_current+0x21d/0x310 [ 944.232276][T20986] relay_open_buf+0x20c/0x810 [ 944.236971][T20986] relay_open+0x25b/0x560 [ 944.241401][T20986] do_blk_trace_setup+0x2fa/0x510 [ 944.246466][T20986] blk_trace_setup+0x85/0x110 [ 944.251144][T20986] sg_ioctl_common+0xa02/0x1790 [ 944.255998][T20986] ? do_vfs_ioctl+0x4f7/0xee0 [ 944.260680][T20986] sg_ioctl+0x54/0xc0 [ 944.264658][T20986] ? sg_poll+0x240/0x240 [ 944.268903][T20986] __se_sys_ioctl+0xcb/0x140 [ 944.273510][T20986] __x64_sys_ioctl+0x3f/0x50 [ 944.278102][T20986] do_syscall_64+0x34/0x50 [ 944.282586][T20986] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 944.288589][T20986] RIP: 0033:0x466459 [ 944.292510][T20986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 944.312207][T20986] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 944.320627][T20986] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 05:53:18 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x25], 0x0, 0x8, 0x4}) 05:53:18 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x80010, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() tkill(r3, 0x1000000000016) ptrace(0x4206, r2) rt_tgsigqueueinfo(r2, r2, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffc58b}) ptrace(0x4208, r2) mount$9p_unix(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=unix,'}) [ 944.328599][T20986] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 944.336571][T20986] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 944.344537][T20986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 944.352521][T20986] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:18 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000feffffffffffffff000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:18 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000074000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:18 executing program 5 (fault-call:2 fault-nth:79): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:18 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x48], 0x0, 0x8, 0x4}) 05:53:18 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000ffffffffffffffff000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 944.473273][T21012] 9pnet: p9_fd_create_unix (21012): problem connecting socket: éq‰Y’3aK: -111 [ 944.485948][T21014] FAULT_INJECTION: forcing a failure. [ 944.485948][T21014] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 944.499189][T21014] CPU: 1 PID: 21014 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 944.507948][T21014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.518003][T21014] Call Trace: [ 944.521346][T21014] dump_stack+0x137/0x19d [ 944.526125][T21014] should_fail+0x23c/0x250 [ 944.530556][T21014] __alloc_pages_nodemask+0xe7/0x310 [ 944.535879][T21014] alloc_pages_current+0x21d/0x310 [ 944.540988][T21014] relay_open_buf+0x20c/0x810 [ 944.545734][T21014] relay_open+0x25b/0x560 [ 944.550552][T21014] do_blk_trace_setup+0x2fa/0x510 [ 944.555715][T21014] blk_trace_setup+0x85/0x110 [ 944.560397][T21014] sg_ioctl_common+0xa02/0x1790 [ 944.565252][T21014] ? do_vfs_ioctl+0x4f7/0xee0 [ 944.569991][T21014] sg_ioctl+0x54/0xc0 05:53:18 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000077000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 944.573994][T21014] ? sg_poll+0x240/0x240 [ 944.578302][T21014] __se_sys_ioctl+0xcb/0x140 [ 944.582894][T21014] __x64_sys_ioctl+0x3f/0x50 [ 944.587483][T21014] do_syscall_64+0x34/0x50 [ 944.591908][T21014] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 944.597855][T21014] RIP: 0033:0x466459 [ 944.601737][T21014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:53:18 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000002000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:18 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000079000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 944.621559][T21014] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 944.629968][T21014] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 944.638030][T21014] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 944.646020][T21014] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 944.653987][T21014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 944.661979][T21014] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:19 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000003000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:19 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x4c], 0x0, 0x8, 0x4}) 05:53:19 executing program 5 (fault-call:2 fault-nth:80): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 944.771152][T21043] FAULT_INJECTION: forcing a failure. [ 944.771152][T21043] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 944.784616][T21043] CPU: 1 PID: 21043 Comm: syz-executor.5 Not tainted 5.12.0-rc8-syzkaller #0 [ 944.793382][T21043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.803560][T21043] Call Trace: [ 944.806869][T21043] dump_stack+0x137/0x19d [ 944.811235][T21043] should_fail+0x23c/0x250 [ 944.815744][T21043] __alloc_pages_nodemask+0xe7/0x310 [ 944.821036][T21043] alloc_pages_current+0x21d/0x310 [ 944.826194][T21043] relay_open_buf+0x20c/0x810 [ 944.830879][T21043] relay_open+0x25b/0x560 [ 944.835216][T21043] do_blk_trace_setup+0x2fa/0x510 [ 944.840321][T21043] blk_trace_setup+0x85/0x110 [ 944.845036][T21043] sg_ioctl_common+0xa02/0x1790 [ 944.850001][T21043] ? do_vfs_ioctl+0x4f7/0xee0 [ 944.854786][T21043] sg_ioctl+0x54/0xc0 [ 944.858859][T21043] ? sg_poll+0x240/0x240 [ 944.863105][T21043] __se_sys_ioctl+0xcb/0x140 [ 944.867702][T21043] __x64_sys_ioctl+0x3f/0x50 [ 944.872321][T21043] do_syscall_64+0x34/0x50 [ 944.876926][T21043] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 944.882889][T21043] RIP: 0033:0x466459 [ 944.886778][T21043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 944.906445][T21043] RSP: 002b:00007f3450a00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 944.914866][T21043] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 944.922838][T21043] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000003 [ 944.930815][T21043] RBP: 00007f3450a001d0 R08: 0000000000000000 R09: 0000000000000000 [ 944.938790][T21043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 944.946799][T21043] R13: 00007fff7524d55f R14: 00007f3450a00300 R15: 0000000000022000 05:53:19 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x4c], 0x0, 0x8, 0x4}) 05:53:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00007a000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:19 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000004000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:19 executing program 5 (fault-call:2 fault-nth:81): r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:19 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x60], 0x0, 0x8, 0x4}) 05:53:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00007b000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:19 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000005000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:19 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x4c], 0x0, 0x8, 0x4}) [ 945.292918][T21062] blktrace: Concurrent blktraces are not allowed on sg0 [ 945.328161][T21068] blktrace: Concurrent blktraces are not allowed on sg0 05:53:19 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x68], 0x0, 0x8, 0x4}) 05:53:19 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00007c000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:19 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000006000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 945.401833][T21080] blktrace: Concurrent blktraces are not allowed on sg0 [ 945.418342][T21084] blktrace: Concurrent blktraces are not allowed on sg0 05:53:19 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x4c], 0x0, 0x8, 0x4}) 05:53:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00007d000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:19 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x6c], 0x0, 0x8, 0x4}) 05:53:19 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000007000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:19 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000b8000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 945.515006][T21102] blktrace: Concurrent blktraces are not allowed on sg0 [ 945.525843][T21107] blktrace: Concurrent blktraces are not allowed on sg0 05:53:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) signalfd4(r2, &(0x7f0000000100)={[0x92]}, 0x8, 0x800) setsockopt$sock_int(r0, 0x1, 0x43, &(0x7f0000000080), 0x4) 05:53:19 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000008000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:19 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x74], 0x0, 0x8, 0x4}) 05:53:19 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x1267, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:19 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000000c0)) r2 = socket$inet(0x2, 0x1, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00007bf000/0x2000)=nil, 0x2000, 0x2000000, 0x80010, r2, 0xcf92c000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r1, r3, 0x0, 0x800000080004103) 05:53:19 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000009000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000c2000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:19 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x7a], 0x0, 0x8, 0x4}) 05:53:20 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x1274, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:20 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000a000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000c3000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:20 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000b000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:20 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x1275, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 945.718512][T21142] loop3: detected capacity change from 0 to 6 [ 945.738104][T21142] FAT-fs (loop3): Directory bread(block 6) failed 05:53:20 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:53:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x7e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103f17, 0x986}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="cc000004634d410207abd20c03771e3b74447cf83b89cb908087e3fd96f3c5", @ANYRES16=0x0, @ANYBLOB="000225bd700003dcdf2541000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f707300000000"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000180)=0xc) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x10041, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb20e, 0x7}, 0x802, 0x0, 0x4, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(r0, &(0x7f0000000640)) getrlimit(0x9, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x8}) fdatasync(0xffffffffffffffff) creat(&(0x7f0000000300)='./file0\x00', 0x0) 05:53:20 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000c000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:20 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x1276, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000c4000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:20 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x2], 0x0, 0x8, 0x4}) 05:53:20 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2201, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:20 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000d000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:20 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x3], 0x0, 0x8, 0x4}) 05:53:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000c5000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:20 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2202, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:20 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000e000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000c6000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 946.067491][T21192] EXT4-fs error (device sda1): mb_free_blocks:1488: group 9, inode 14357: block 297000:freeing already freed block (bit 2088); block bitmap corrupt. [ 946.082649][T21192] EXT4-fs (sda1): pa ffff88813cd71a28: logic 32768, phys. 296960, len 2048 [ 946.092291][T21192] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4172: group 9, free 2008, pa_free 2007 05:53:20 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e1d, @remote}, 0x10) splice(r0, 0x0, r2, 0x0, 0x2ffbf, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x3f, 0x8) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_AUTHENTICATE(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="410c0000eed855a748fd0133b894828203b88ed9fdb80d7f418bc7d5936c54538162ad07eb76e4f7a887c8312da1c32a", @ANYRES16=r5, @ANYBLOB="210200000000000000007e0000000c0099000000000000000000"], 0x20}}, 0x0) 05:53:20 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000f000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:20 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x4], 0x0, 0x8, 0x4}) 05:53:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000fe000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:20 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2203, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:20 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000010000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:20 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2205, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:20 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x5], 0x0, 0x8, 0x4}) 05:53:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000ba010000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:20 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000011000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000bb010000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 946.325427][T21251] blktrace: Concurrent blktraces are not allowed on sg0 05:53:20 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x6], 0x0, 0x8, 0x4}) 05:53:21 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000012000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:21 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2270, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:21 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000d0010000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:21 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x7], 0x0, 0x8, 0x4}) 05:53:21 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r4, r5, 0x0, 0x800000080004105) r6 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r7, r8, 0x0, 0x800000080004105) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000002980)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r8, 0xd000943e, &(0x7f0000000980)={r10, r9, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001980)={r10, r12, "becad4b53efa6b42fe7b42de07736be286cfd329b0cba554836370fa102801e53bbac1a429597140e4590c416f06ca7e2b6ad71471e00daa3105aa9b57872d82e9837f364da821b73bcbb3375ad821fa63372acde32b24b9c26dedbc6bcbe8bb28fb45519e1ec7d224f49dbd7e865dda3b7eafcd3388efed59e919da2264351644d8f5e4606c98533ca2bf39b7e01caf0c5fae28e21a6e3ca307e9b961d10dcdfc8e0ad877c2ea1ae64cd72b7da4630e0362e3c03be8f192990bf3050327f3316e7640048fc1cff8e18a813d1f82cc63579408afa6df4bb348fcd82101fb9fc9b6b278db4e6237351134a09c5a03e12870b3abb8238789c02523edfb618134e4", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b6c0)={0x400, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x6}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=r9, @ANYBLOB="01000000000000006600000000000000030000000000000004000000000000000700000000000400c300000000000000030000000000000081000000080000007c99180700000000020010000000000001000000000000000800000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aa660d8732ec8fae32daa47bbb0384553c385134212a0461c525ed607f936f3b272927e03d919408217073ee3d2fd8820a85a028f5972339901ade187859e7c9463c3ca9a80c196f381bc2cb103bbc5cad077054ea07fe5acfe3f5fc44074f9e4be2da4e4484c5409f71356c7a8d0991741a6d1c69067e6902cfea2b9e6dcaff46349e385829e3d6ea09ac57884a25750748c8c8d7140b0a338808c1a81e0b4212952de4fb722e5f273764b76c8ff80f505a75742ea376242824daf8c3c6d6cfc86b0d16cb45c0bc9c087310cc3d9d71"]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000063280)={0x2, [{r1}, {}, {r2, r3}, {r2}, {0x0, r3}, {}, {}, {}, {r2, r3}, {}, {r1}, {0x0, r3}, {r2, r3}, {0x0, r3}, {r2, r3}, {0x0, r3}, {0x0, r3}, {}, {}, {r2}, {}, {}, {r1}, {}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {r1}, {r2}, {}, {0x0, r3}, {}, {r1}, {r2}, {r2, r3}, {0x0, r3}, {}, {r2, r3}, {r2}, {0x0, r3}, {}, {r1}, {}, {r1}, {r2, r3}, {r2}, {}, {r1}, {r2}, {}, {0x0, r3}, {}, {r2, r3}, {}, {r1, r3}, {r2, r3}, {}, {r2, r3}, {r2}, {0x0, r3}, {0x0, r3}, {r2, r3}, {r2}, {}, {r1}, {r1}, {}, {0x0, r3}, {r2}, {0x0, r3}, {}, {r2}, {}, {r2, r3}, {}, {r2, r3}, {0x0, r3}, {r2}, {}, {}, {r2}, {r2, r3}, {r2}, {0x0, r3}, {r1, r3}, {0x0, r3}, {r1}, {r2}, {0x0, r3}, {}, {0x0, r3}, {}, {}, {0x0, r3}, {r2, r3}, {0x0, r3}, {r2}, {0x0, r3}, {0x0, r3}, {}, {0x0, r3}, {r1, r3}, {0x0, r3}, {r2}, {}, {}, {}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {}, {}, {}, {r1}, {0x0, r3}, {}, {}, {0x0, r3}, {r2, r3}, {}, {0x0, r3}, {0x0, r3}, {r2, r3}, {0x0, r3}, {}, {r1, r3}, {r1}, {r2, r3}, {r2}, {r2}, {0x0, r3}, {r2}, {}, {}, {}, {r1, r3}, {0x0, r3}, {r2}, {0x0, r3}, {0x0, r3}, {}, {r2, r3}, {}, {r1, r3}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {r2}, {}, {}, {r1, r3}, {r2}, {}, {}, {0x0, r3}, {r1}, {0x0, r3}, {}, {}, {r1}, {}, {r1}, {r2}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {r2, r3}, {r2, r3}, {0x0, r3}, {r2, r3}, {r1}, {}, {r1, r3}, {r2, r3}, {r1, r3}, {}, {0x0, r3}, {}, {r2, r3}, {r2}, {0x0, r3}, {r1, r3}, {}, {0x0, r3}, {0x0, r3}, {}, {}, {r1, r3}, {r1, r3}, {}, {r2, r3}, {}, {0x0, r3}, {0x0, r3}, {}, {0x0, r3}, {r1, r3}, {}, {r1}, {}, {}, {r1}, {}, {r1}, {}, {}, {r1}, {0x0, r3}, {}, {r1}, {0x0, r3}, {}, {}, {r2, r3}, {}, {}, {}, {}, {0x0, r3}, {}, {r2}, {r2}, {r2}, {}, {0x0, r3}, {}, {}, {0x0, r3}, {0x0, r3}, {r1, r3}, {r2, r3}, {r1}, {r2}, {r2, r3}, {0x0, r3}, {r1}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {r1}, {r2}, {r1}, {0x0, r3}, {r9, r14}], 0xff, "a759770dd72105"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005da40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005dc40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1, r15}], 0x1, "a12ac2fd2d8e1d"}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f00000022c0)=ANY=[@ANYBLOB="1d"]) 05:53:21 executing program 3: fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x2, 0x5576, 0x7f, 0xffffffffffffffff}) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000440)={0x8048000, 0x0, 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, {r0}}, 0x58) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x8008f513, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pidfd_getfd(r2, r0, 0x0) exit_group(0x3) 05:53:21 executing program 3: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fd2049e0aeeb585bf09c1950344b5e8168ba51199599072a0d206c3ee9035bb6a8c6da656f82fb8ea5c637980335f402f63001e0be4fb372ad13897d29346a5b20e450274490cba14b8384bb6e6fc00d8342134f7cd74c0ae50882f50eaa6ad2955e290af336cdf3344fcd4a4f249635d09bd34dc919b690e317b8a1a28ad761528466a6c60c6ccc", 0x88) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munmap(&(0x7f0000851000/0x6000)=nil, 0x6000) mremap(&(0x7f00003e3000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000b6a000/0x2000)=nil) munlockall() [ 947.111399][T21284] blktrace: Concurrent blktraces are not allowed on sg0 05:53:21 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000018000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:21 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2271, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:21 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000d1010000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:21 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x7) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x2) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x80402, 0x0) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x400}, {r1, 0x142}, {r2, 0x4}], 0x3, 0x7) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaaaaaaaac43, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000e3ff0200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 05:53:21 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x8], 0x0, 0x8, 0x4}) 05:53:21 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2272, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:21 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000019000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:21 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x9], 0x0, 0x8, 0x4}) 05:53:21 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000f8010000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:21 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2275, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:21 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000022000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:22 executing program 3: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fd2049e0aeeb585bf09c1950344b5e8168ba51199599072a0d206c3ee9035bb6a8c6da656f82fb8ea5c637980335f402f63001e0be4fb372ad13897d29346a5b20e450274490cba14b8384bb6e6fc00d8342134f7cd74c0ae50882f50eaa6ad2955e290af336cdf3344fcd4a4f249635d09bd34dc919b690e317b8a1a28ad761528466a6c60c6ccc", 0x88) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munmap(&(0x7f0000851000/0x6000)=nil, 0x6000) mremap(&(0x7f00003e3000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000b6a000/0x2000)=nil) munlockall() 05:53:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000004020000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:22 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0xa], 0x0, 0x8, 0x4}) 05:53:22 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2276, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:22 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2279, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:22 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000025000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00002e020000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:22 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0xb], 0x0, 0x8, 0x4}) 05:53:22 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x227a, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00002f020000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:22 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x9ffe0000) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000440)=0x7fffffff) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in6=@empty}}, &(0x7f0000000040)=0xe8) r2 = accept4(r0, &(0x7f0000000540)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f00000005c0)=0x80, 0x80000) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x100, 0x0) dup3(r3, r4, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = socket$inet(0x2, 0x1, 0x0) dup3(r2, r5, 0x80000) close_range(r5, 0xffffffffffffffff, 0x2) recvmmsg(r5, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r5, 0x6, 0x23, &(0x7f0000000640)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000680)=0x10) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80800) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r6, &(0x7f0000000500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="580000000308050000000000000000000a00000106000240888d00000c00048008000140000000020601000000040000e8000480080001400000000508000140000000080c00048008000140000095657100000600024000070000"], 0x58}, 0x1, 0x0, 0x0, 0xd0}, 0x4000005) ioctl$CHAR_RAW_BSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff00000001, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="206a62004000000003000000300000000f000000000000000200000b02000000008000000080000020000000dcf4655fdc82e05f0100ffff53ef010001000000dbf4655f00ef0000ca3011cd0777ffc6a50008000001000000000000000b00800000020000280200000284b8e926d0f440bc76d50fa36aca482317616db7a4b1b7816ee80e3ac76679dbf940eb3816e5f5444a54b2d93458a6c74d77c7b716ea10d582a1cee2e17d415f9945751e93626d8e65538b20d2d47525aae34cddcb62fc16860beaba39f215c9f9835589a877d79c95c8", 0xd4, 0x402}], 0x9b540c, &(0x7f0000000740)=ANY=[@ANYBLOB='fsname=]+(}-.-*&+!\x00,smackfshat=,context=user_u,uid>', @ANYRESDEC=r1, @ANYRES32, @ANYRESDEC=r1, @ANYBLOB="2c00ed8cbb9f5573916f075515ee27bafa42ded56c8e3dee14f9ae266a59a30b8392efe44ff23788a81696fed1222013cf2e17934d7caf436e06353d731fdef9e6323808f859b10aa837087c6e15a2a82f5d"]) 05:53:22 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000048000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:22 executing program 3: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x78, 0x0, 0x8, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_REQUEST={0x8, 0x1, 0x1, 0x0, 0x7}]}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_LAST_ACK={0x8, 0x6, 0x1, 0x0, 0xfae00000}, @CTA_TIMEOUT_TCP_SYN_SENT={0x8, 0x1, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_TCP_SYN_SENT={0x8, 0x1, 0x1, 0x0, 0x20000000}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8863}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x401}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xffff}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x7}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8924, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 05:53:22 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0xc], 0x0, 0x8, 0x4}) 05:53:22 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x227b, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:22 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x2) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="8c60a2337301929090", 0x9}], 0x1, &(0x7f0000000240)=[{0x78, 0x119, 0x4, "b67dfb4dbffd935c07f29b8cb5d8f54c0d6219dacce2dfe58da692bd8172c1427caf54008e888c441317bf76b86444da06addd0cc1e465dc2c17811798b7a0e0200e3a0d9aa47bafc8f4ccba2812efc853c1344f669ac50ee4c2e985f85472b058e92507064a"}, {0xd8, 0xff, 0x8, "26cd0b38f39dba488189ac49e8d32c160fc0c9a5de4123641d85b8419b6ad417263757e0ca570c9dd813e8bb969e153087da3215a35980f8a313f29c8da68e389af6114cea8faba4dacf5b937bbbedeb1dca2c72c0795568ba49a803aade12707fb207aeb9abba4c7771f88ba20da0aff8c7ea9ce1780855f4240652b7253795ab24a79672b7aeba551e40adb44e36c2eb0337d2a71c5d35e9bd40276d9c50fbba88c56e3a8b8ad05b3a25888c556f0627f90f87616cf4cb3f694e6a82fc213db3d0f7"}, {0xe8, 0x100, 0x4, "681c5ddbc9986760e72953fb60c3a139cac86b1b037257c44656afc978c8bdd483244b7de9e39d6984e3031af84edabef874c243e58551bf1ae4f7186488a0f4a75eb448cab3218552f4773a4ccbdbd4669571d7708670cdd20d877f1f73a040c1d5b44396ab46415f425b85e8c86751675bdcbf0f4f4c78a0a3ae11d00ccbe92b21a49b0c01872316593388cc1b523da04515d5139112ef990900568c2f536f69ba0e37e28e6528f2e1c2ca1856b7dfd359e99aa82273a69de10a27faa790cf5a0482bf505368046cbbadebe92d948abef1f0"}, {0x48, 0x110, 0x3, "ccfa7c507072aad1909093af4693706b71853cbac74ac27e7c88f8e94afa5f579f43feeda28aeea7921f983d6d86ef194648f447"}, {0x50, 0x119, 0x783, "d1b09c307ee81751315558a35da264057e95cacf32ad97c3af80496970aaacb5cf4d803af07198e614da4b5ef80fd8db41043881646126d67405ea2f20"}, {0x30, 0x116, 0x401, "144981d67c4bd99cb22f8a297578e511e0066d261e6f6ec1bcc317b3c6e41755"}, {0x58, 0x103, 0xf7, "72a744f524de5fdabc3516042669b754d69fb8705312fe26860ecdcbbd4480e1468ec358bc358fb9d5b3d3ec56f504e1c3ccbec5cd2795841d199735375e929e79d19c3df8af11"}], 0x358}, 0x4004000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f00000022c0)) 05:53:22 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000004c000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000044020000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000045020000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:22 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x227c, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:22 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000068000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:22 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="1638cb6ebdeec16895fb8a7731ecddb498afa921955d2efa8d375c2f3e2b80525d9e2e5be062baf269"]) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x4, 0x3c5002) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/247, 0xf7}, {&(0x7f0000000080)=""/48, 0x30}], 0x2, 0x1, 0x5) 05:53:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000030000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:22 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0xd], 0x0, 0x8, 0x4}) [ 948.421535][T21416] blktrace: Concurrent blktraces are not allowed on sg0 05:53:22 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000002580)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in=@broadcast, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r2, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe, &(0x7f0000000300)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=0xee00, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="0200000053652aad710d14b7", @ANYRES32=r0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee01, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0xee01, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="040005000000000008000300", @ANYRES32=r2, @ANYBLOB="08000200", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=r3, @ANYBLOB="10000400000000002000010000000000"], 0x8c, 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:53:22 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000006c000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:22 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x227d, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:22 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV(r1, 0x5000940b, &(0x7f0000000240)={{r1}, "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"}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x109080, 0xcc) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f00000022c0)) 05:53:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000047030000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:22 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0xe], 0x0, 0x8, 0x4}) 05:53:22 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000072000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 948.542556][T21452] loop3: detected capacity change from 0 to 256 05:53:22 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x227e, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000002040000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:22 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x50, r0, 0x4000) r1 = socket$inet(0x2, 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x2) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f00000000c0)) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f00000022c0)) 05:53:22 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x10], 0x0, 0x8, 0x4}) 05:53:22 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000073000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000000)=0x80000001, 0x2) set_mempolicy(0x0, &(0x7f0000000140)=0x5e, 0xfffffffffffffff7) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) write$P9_RWALK(r2, &(0x7f0000000180)={0x23, 0x6f, 0x1, {0x2, [{0x4, 0x3, 0x6}, {0x0, 0x0, 0x6}]}}, 0x23) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = inotify_init1(0x40800) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000080)={0x10000004}) 05:53:22 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x227f, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000006040000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:23 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="d80100141c09d8a8046a000091488fbe0000002000000000aa83f6c05a480000000f6bf0af00000000"]) openat(r0, &(0x7f0000000080)='./file0\x00', 0x410001, 0x140) 05:53:23 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x11], 0x0, 0x8, 0x4}) 05:53:23 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2282, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:23 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000074000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:23 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) getdents(r0, &(0x7f0000000040)=""/190, 0xbe) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f00000022c0)) 05:53:23 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x12], 0x0, 0x8, 0x4}) 05:53:23 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x104) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(r0, 0x1, &(0x7f0000000100)={{}, {r3, r4+60000000}}, &(0x7f0000000140)) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000340), 0x4) clock_gettime(0x0, &(0x7f00000001c0)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r7, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r7, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) write(r6, &(0x7f0000000080)="bd", 0x1) tee(r5, r2, 0x3, 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) 05:53:23 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2283, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:23 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000010040000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:23 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000007a000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:23 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket(0x2, 0x4, 0x1ff) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/125, 0x7d}], 0x1, 0x3, 0xa8e) preadv(r0, &(0x7f00000001c0), 0x0, 0xd9f, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) lseek(r2, 0x9, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f00000022c0)) 05:53:23 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x25], 0x0, 0x8, 0x4}) 05:53:23 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2284, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:23 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x48], 0x0, 0x8, 0x4}) 05:53:23 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000fe000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:23 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mmap(&(0x7f00003ca000/0x4000)=nil, 0x4000, 0x4, 0x810, r0, 0xd9b0c000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x1997}], 0x0, &(0x7f00000022c0)) 05:53:23 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000050000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:23 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2285, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:26 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) open_tree(r0, &(0x7f0000000300)='./file0\x00', 0x8000) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)={'syz0', "d2ec1a3a51fe9cdc8d272e204458779af44834334a2f762bea61fd2706c260"}, 0x23) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f00000009c0)={'ip6gre0\x00', &(0x7f0000000940)={'sit0\x00', 0x0, 0x2f, 0x5, 0x48, 0x1, 0x0, @mcast2, @dev, 0x40, 0x80, 0x4, 0xfffffffb}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000c40)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYRESOCT, @ANYRES32=0x0, @ANYBLOB="14000200626174616476300000000000000000002c000180140002006e657464657673696d3000000000000014000200766c616e3100000000000000000000002000018008000100", @ANYRES32=0x0, @ANYBLOB="140002006d6163766c616e3000000000000000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="01000080000000", @ANYRES32=0x0, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000300000000001400020076657468315f746f5f7465616d0000006400018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1c000180", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080003000100000064000180080003000300000014000200767863616e31000000000000000000000800", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="080001", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB], 0x224}, 0x1, 0x0, 0x0, 0x20000000}, 0x41) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x100000300) 05:53:26 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000004020000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:26 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x4c], 0x0, 0x8, 0x4}) 05:53:26 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f00000022c0)) mmap(&(0x7f000042f000/0x2000)=nil, 0x2000, 0x2000000, 0x30, r1, 0xadcd5000) 05:53:26 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2286, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000060000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000004060000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:26 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2287, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:26 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x60], 0x0, 0x8, 0x4}) 05:53:26 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000030000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:26 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x8}], 0x0, &(0x7f00000022c0)) r2 = socket$inet(0x2, 0x1, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000100)={"c29ab0276b4252cf9526b006f245a886", 0x0, 0x0, {0xfffffffffffffffc, 0x7fffffff}, {0x53}, 0x1f, [0x0, 0x2, 0xe, 0x0, 0x8, 0x1000, 0x3, 0xfff, 0x0, 0x4, 0x5, 0x7, 0x8000, 0x3, 0x5, 0x6]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000240)={"f750e7da6886c8f9b56a4c00ee74a111", r3, r4, {0x8c07, 0x3}, {0x8000, 0x9}, 0x579a, [0x5, 0x400, 0xffffffff, 0x81, 0x6, 0x41fc, 0x2, 0x3ff, 0xff, 0x7, 0x8, 0x2, 0x1000, 0x2, 0xefa, 0x5]}) 05:53:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000070000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:26 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) 05:53:26 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x68], 0x0, 0x8, 0x4}) 05:53:26 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2288, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:26 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000002040000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:26 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f00000022c0)) 05:53:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000090000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:26 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f", 0x52}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fspick(r1, &(0x7f0000000040)='./file0\x00', 0x1) exit_group(0x0) 05:53:26 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x6c], 0x0, 0x8, 0x4}) 05:53:26 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x2010, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fstat(r1, &(0x7f00000001c0)) ioctl$KDSKBMODE(r1, 0x5603, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0xff}], 0x180010, &(0x7f0000000040)=ANY=[@ANYBLOB="795ce56a65e024fadfc67862e300"]) 05:53:26 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000006040000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:26 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x2289, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000a0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:26 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r1, 0x0, 0x2) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) bind$unix(r3, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e22}, 0x6e) sendfile(r0, r4, 0x0, 0x8400fffffffa) 05:53:26 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x74], 0x0, 0x8, 0x4}) 05:53:26 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x183001, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0x3f, 0x8006) r1 = socket$inet(0x2, 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x2) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x5a6990a6c3d3550a, 0x0) r3 = accept$unix(r0, 0x0, &(0x7f0000000080)) r4 = syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0xe, 0x6, &(0x7f0000001580)=[{&(0x7f0000000180)="2a28dcd74c767a7c53bed4ae763f8ee7dcb48449e87ef04125cfafd97bab563379a3770542b2284ed078789389af0074dc104e0c544545aa22921f0b3678bd9e2199de448de3e262cbbb01", 0x4b, 0x96}, {&(0x7f0000000340)="8d7b1ef628f77f9fd4cc0624608d9e1b2b831b4aba347fc576717902477bee6e6c6238c91d2b3cf8a12f82c281687a1064439928ca9358e9389e8fc69fa5754c4edd1fd73003887c321da1600d3ec4a0e5c98ca7cd89e0a911c654b74ca1a1aadf9e9630ba3324631dd70bbcbb89f72d0f3f25ab86efb009dbaac6d05b84656e7a2f51ac4d803fbbd100e8aba601672a04c5acb25758f0e6a1cb8d52427463587099fb30becc6d0cae442ebb86b070bd41e2c313096005bcb6711df4c66137a08bd13e15478cacccda8cae42f14ab38b8dd0a11439d8161bf4ef000439cae639821b78c43e069a8dd51e43f656a1bf32c67c4b49329f81e0f8e43da1b99a66968361b2892e87663b9f376fd13421b864915eb7bd2120ab52dbb7ad61421249dd3c0e24752c65a0423dd40a1df2e9cc8d69b3c05106badd57f43861a9b3f19976e3b483afa077de306ebccd614a0dee1dbc5aee902c8757b83c5181cccf9b3990c96666438bd6a63ff620a16a543823777bcd541d2fc79beae398aacdb8491b20ace903b42a396b0dff9f3b0f5bc4cb3776ac8a78586fdd98ea095d0decb867def7dde8018eabf243302d366e7d5eb690833401bc0f3df3d448988fd12a3612c0be175eab50acce84be6c0780004797640adadf2561420553572f5ddd55456931471067c2ce34884a440f59957f76b918d780e02d479fce2fb293c1ac880a9dfdfa83bd0d2cc8d58c8b952f68ca9672b30dfdde05480235dc7b2d1f4c86b96aa1e282a0dd8cd0fa26fd32ea2704ba178b90655df4eda4f929f23e49e72d41f521d3af5de3e426c514d0b2d7834291352659c5174f6ba24be1dd8061053948a87b99db501688ab272c854276e1596db66513e4b020770b9c1cb07023e8e542a790dab39672496cbf3d1a655a2c3533597f644511ce488322a3ab8e66dab4d1101a159584ba7be1eb10b58b6a6a4bb1594ca78484b58b6e54040a84e4830f1f09962f1a64bbef33a011ab53544a5a22632100e3c2e49a01b5aa2e853d630565b612945c862ca5a1fed7533fdb04dfbc706ef6f4c3be1bbe1b2a15d1629b09e2ce2ab2d2b09ff9b5ac7d73e04f475cf9c7dee0bd97c76d32848bfea98af5ca0136fd844c132592f5ce1068297010963944f8718497dab6a2ebee15fe3623f2ebf49aa708299bfb8832ce4736349f88ed73bb9e1ef98f836506bdf80e54901da928b8880b4f45d7d1deeb184d529627f2ac39da5098723733fe03e333a3b9f3a34bf273385add85184dd9f1bb8d15d2b2d011439b049d2c27c3b4757b0e0e1ecea93c33e8f5b24626b3915f79f0b0e8a2eecd740326b042d39a286136573905844122b30dc7108c32ad4b25abee38bb33968463833894838b1e84a956200d947543100b0498ed1e060eb5496a949827d19c2cbe1ed4df9b8239e9e0b04cc7bc469a674bdef651690e024b584c40e0fac072525fb38ec0dced89f41502b27a7e6fb985f63e69e7733cb643f7052a8b3c616641d7647174689848253fc607c655006a8c08d847650e3fed30fe6f93b59aac04cc1a8736703bcab7e56209e2bca926eb6e3f5b2c265758f1925327761e268f5d35b6661197470dae5919389ad84f92938ebc7b2e2442315afc36cd5aa8740b2fdb58d02d47827f4240173aa2bb57c7d3a3c0a07ee8c4f23c94674cfe519f53f502024b38615591089111c17e29f8901e87a9c519af5c6aff1f6ad718b1a7bbe95407642d3e1b284e5ebb4894d47a63c37037faf6820043c838e904835540edf5a8561dd2e17040a9ba43af44496a38ebb1c242d950c08793ee744b1b9778159342ebd09482bfbe130dd03ccf50ff0457a16dc36f7ef37cfe35486a4d0d9de291ba69b92303e829e6e5c9356930f0f274fa9e5e911715676f9c651bcae783c56f6180cc9662242a6a0302600b9d9868d6b69fcb263025e8472bc6b2503fb67005cb2cd6239a58dbe4f03cde1d40205d8de182c98ca48c161d168389483012938a05135355e5c72e206ffa6cf14c9368a5d6e4816c28cfb44e89764bd92ba8cb8372c2ba30024dcab034a2bbdd1cfbc80c7e0d51900f33337d21de6457a61ba5caf9d8413750e35a6de3520e900c55f2ae5d8d6141b35768023f19485e66864b74070c3c9823aac4f73db4f812a224e92a28914ccf180824d2093334602dec58065fb4e9f31c245ab0f425cc85201cb9374750b3e020b46d0938b8be758b839588ba25a558f2091101a88c6877e282e0f29cbe02a6420af7de304f5dce90018d1f3319723d2d9a4e50504cb1e2862e1e2dbb40771d00712675c34f4240065e0bba35692d8b031dafdd5c2e782dcfaf6ff6fb0a95bd96d60e1fdbf6676959a2869f6546f33df53cd43b5cdc8b509e317d2093dd5ab96425b45e1edf8e228bf89735bf5e1af1a8f28799b192590882519439c2ceeee0885a3f5d035c18d904ab58fec2e41fe9d81ce18d9659783da738af338774076679823d56a3b0adb6041884ce062ebaa9c33399a9197abb03b52e5aee35a88a255c15e6585e8ab349b2f51aeb2d73c9ad25aa10b5e4cab25d59bd0be0af24ce984f86247a1acc3e7e2cdc060e3fab7ef1fb4803ccc4814d93f0ee4706c0b51c285935d14aeaac10beb7d0778948b991e31783b3b122e094a738c9ed3ee276f3c3feb52d3dc59c68495b9cc160188bd4f9ddbe843345001f923f0ab5ac28f9d9ab7f801be525c77c85cab1402a5fb42e99a6bfbdf4e8115f985a4c16813dc3d70b535dac71a178a772d363a0dfa15f74bddd8e8fb7607feb2cbbf3cf4ed48b854b17903ab36063e399bef3565f6598f18838643e2f99e27959fa61393a808c71c375ee39f81020a2a94f3ac2b447dacaec2da8a3ad5110a1f94a6dbd5bb3879be3787881221f6553e6ac81b1cdb1efd88d7327c51bfb1967cf457a0298f97f04d9e15828329348225879fe8804b9f05b1f7baaf407cc285d4ad31e8b639ba0ed3249644b43e50ddfb31a3b634e12fc4d3fd21e2d0efee3beb2e3a0fba01a9489a9eb3b55bde55641c19391cf4cf3cb690fe7596521639121896515d308b1cc6cf4ae4bc8bdec0475aa16d5926fd2cd52ccb49181c3728e3e5e08aba3dce8615b70a39d9dee4346dff099e76c499bb00004a5a2aefdbe525b2da0f1915b1f187c742e04035207a3bff18ac6ae05b701168868c76d97e1d890b2482ee9516afa56875f47831a25004bd3fb80009e8074c966004a2a96d59b7040dbcd5b5591a1942e12e206c18ce0332cf2e2a37dbace7943d6001232b5796ed63841ba739b9fcf61e7b284c97713f36b7b9d78c57d1868dcf5c3e6bf8c0c85c99028320f79c057d5a2b80198b779df626257ed91915649b165e20d65bda11195e2752a98f69d21aa55b8778c99b12d70a8fe8c2814e442ae54fcf0398897b49a7f9f717f70c263b9960cd37feea10f4d656b2412b42fbd673db1178c3e3a9766995ddc5225eef6ab0286db6b70824df52e8034ec96794572f3574fc0ced7ed17b987264ec08e73febad2df7399269bb6c96252aae7f4125a33b23749522735fffb3f72d6ff91ad950884ac935e5d5e5b64885849069893fd471d3b6b2b8498a52011023d61587f1dc4acbbcb0f7c0e43a47bacfcb4065e71bda1996741770cee20c23077083f1991d410b3729699122dc98ea1200c8c2708c526e21dabf16cedcdb4d8f851efdcddcb2fbcf6df2eb6d50453dc79ea44ad847d456553a958732ad020b2a0192c39c229e7042dca1088be179342db87cf2a94d11ad372a6008072ebab9785a718bd23077c2f8482aaf02d9907a42b70cce2df648a13a0a84bece36cf0cfbfb3a16107cc88f4fc9a1dedb1a1fcabee4f722ec8ca2f95d94e2f3531962a214f80202330ae481434160f9881a889d31919299e5b581ff44305bbaf01cc9d6b037653e8c0a5fb6f244ec8d24cd48eaf45a4515d62268a481e219cbc6706076541aa6209379be50b7eb10a74328c8c5b9ded625d24bf72aa791e6aaaae3535d7cc14317b8c75c1f4a10b006996b4cec8e8791fc8815842a7954b274c5b5bb3e00b1b6314874f4841081ef7c5686ece52586c1b55dc28f5c69192506e91a25fa86e1b7e73bf668407f233dc85660c739d6d6e92700fc23c1abaa639e7c0ffd207dd7a5730124755e34b86996bfb106370159e0ff5b3e7ed3bbb9107748055cc171eebc7a184976523ca1988ae4e3a5a826016fc52c7e9daedb29dabb3d026cc95a28c701c838141bb2e8b7ba0dd2f23523533c3cf772d9e829ccccaaa1720190844dc7de234672b9fe2e41509146cf0b01f3234bb2671bc88ad5ee52e6ba9b1e1d4339afd5fe802f5b8a16f92ebe83bf3fcbaefd4fc8eeaa5da569f222eb9b3db1b2c616117f69fe6449fba21741187dfbec0268cae3fad0a47c8410064d627a5c77927b5d10605d505f3aa82b0e4b4fce7a4af605ba48ab46d8db79de57a710bb3b0ec381a89e3c1d50ea094120d4e5b5d747af0306100ec486a3fcaa5283ceaa6ac8824442076aeb054b966b14fa0f2146aa25ff53929738f3df38739afe85cc1047aedc0e2a3e41be947dc79d332460162994b1fc9fdb8cc238db27e6fedfa9b8d50be7caeed07b8c22669ca6369a81d71b705ed9e54b3612e0bee8b88c7a8fa4ef0e6d6f45c230447bcf8441fc4447810be5c46bf7acb482ed0f875053cb063c1943b87af66b922cb4c97d068559f30476163c78f7edb44e7d6a02815098a741cde208345a21fbceaee20cab88dccf445cabdb937eae2ebff4fbbed117d8a5512a9e631a9afd259109a8dd5f2856c4a19d689dc5b4e24f7a1b01188b849f6a749ade6fc40af09667802ea2a72d60ff9160e10f78c335ddf40b94fc947e51a708ff00766f156a1f749d3d67f74f02464c675097c86c70cfad7a014c2652fac0e777e29ae3e7b329186025bf6070240c9dc5a5615b6a935766c57d97fd87ca06280d659b2a4d0efeba8a9f3bff10d5a692efe6081b8c8a8aef2aae6699c6b462374a2ca4c4382a03afb9a07feeef9dc470943a3cec43017b40cbc3d4d1036e3303fb242f4ace245e5d0dc1f33cf879dc660145b24619d1857cd7f1cbe9dfdf72ca163e5e4094aac66c088b4cf4b683ebd37eb564e21c83feb87940641e4c0d1a97228ff25e4d6cdc701086328ddc29dbd89cdcf58ee315d313f3f063686d35a9fe4163572de5107c566349bfac3ab46b0971eaa74e7e5895f059a30a3dd4df23b5b772507967277fd99612d615127a4db961b9e4614fc9d69394937aca619b89e8b7b4710825cccffa45a51f877611750bdd8dace39f3e8bf4923e8d56813b6f1b51474dff9777f4317006ae6cd34da15dc7006bab390185a2b734e1cfcdcb307f1524380f86679fd67585c350a8f7fb1c5d4980376b611dd2d83d3b7e64bbae0c2f6038671a94c01fbe8351180573745ca8bd10cf265af6972835b8f20ca222b161e900a126955db7d374a8027451a69e3a6518339bcacdb72ae133c96f4628dad1ec24aaa44cc86a87fd925062939e267cf6fbea0af1ffc98fa7e69648d255e52c4547fbea754287dd6106e8b2604a10148dec4f0b996ef9b065cb1034e20628fb7a1f01706a1734e2664e831a942370618305cf2785e764c554e3ededb7cb6847d4d48f5e655ae04c61e2a321263d1741557a35ea6536eafb6e209426d0960fea4d41a7d435960c1334d5aab770cccffc50c00135657bffd66cab2cce8a46905e3d7f8115488622d01f2c20d2141797dfbcfca470461509d7c1bc165b69df62f", 0x1000, 0x5}, {&(0x7f0000001340)="e08879dbb92714973a190cba2fa620b859d4680d8d20b9b81b233e76dce251581266424d9c7b34502977a048d2ba17478563a1e7eb6e688f0badf39405d9f6a8757aad0236733c6cd051ec877bc2f9d843e5cde95be9597994a9c41ba1e594efd9b72d4ef001548572aee8b61cd7fe21a89a95ad6c8352a505e62de70f9d20577750d6a819420b574ee506c3b856f22808546748a90252b4", 0x98, 0x101}, {&(0x7f0000001400), 0x0, 0x2}, {&(0x7f0000001440)="8354d53b7a52", 0x6, 0xcebe7cd}, {&(0x7f0000001480)="aa8835f4656bb9a24bb0a6b5881ea07fa918bb0007a35ffaf2d72aa79db3684325cca2738a53f1212ac81bd970c33a85a329ebf5afbec1ab64ae99dcc5bfcdf5c40b5126140305aaef7492227c065bcf09bdbcca676791bbc85ee1ee6f18c9acaff90531afea37b9c3bb36426735952922def106f53c7ccc60823f2a4f8226a36cf798af4bb77fa0e298ab766a1f2e63a3b16a4b16b7242b4931934df053fe63d4d75d31c8c4f4c178f64d41932f240466b6b681504f077334474e18122c6ba403b8fb1f72b27b59f21abdf386ed364b566a66a4bc7893068a8d6d9d7ccfb9751030b00885dd9aa8", 0xe8, 0x4}], 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB='block=0x0000000000000e00,fsname=,smackfshat=ext2\x00,fowner=', @ANYBLOB="0ac82b3810da5ad3aaf1df981d10303185e6cdba27db24b1af28fa3231c8530df180069c7af5f1b61f3ab6c1a67119fd4d25cfb5c4c8dfb90dab329820c61e2028ada709f0f1b53eebcc16159936f73424a7242a3ba5ccb6c434b6d6e660e91eab03059455a3204e8ae3b5a3bbb20c21f7af161f4f48d1cf3046ee8e7b723a91321cb2091e2a4532fb0ff4c8efcb62c00bb94e7e185ee8327f6d9be07c88f41569ea5b2f5c4468eab0", @ANYBLOB="2c646f6e8d5f61707072616973652c646f6e745f61707072616973652c66756e633d4b455845435f494e495452414d46535f434845434b2c66736d616769633d3078303030303030303030303030656234342c7569643d", @ANYRESDEC, @ANYBLOB="4e77d223f82c706359083000303030303028303030303030303030"]) ioctl$SNAPSHOT_UNFREEZE(r0, 0x3302) r5 = socket$inet(0x2, 0x1, 0x0) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) bind$unix(r6, &(0x7f00000018c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000001640)=@ipx, 0x80, &(0x7f0000001400)=[{&(0x7f0000001ac0)=""/213, 0xd5}, {&(0x7f00000016c0)=""/113, 0x71}], 0x2, &(0x7f0000001bc0)=""/39, 0x27}, 0x4}, {{0x0, 0x0, &(0x7f0000002e80)=[{&(0x7f0000001c00)=""/73, 0x49}, {&(0x7f0000003080)=""/192, 0xc0}, {&(0x7f0000001d40)=""/90, 0x5a}, {&(0x7f0000001dc0)=""/24, 0x18}, {&(0x7f0000001e00)=""/51, 0x33}, {&(0x7f0000001c80)=""/60, 0x3c}, {&(0x7f0000001e80)=""/4096, 0x1000}], 0x7, &(0x7f0000002f00)=""/131, 0x83}, 0x80}], 0x2, 0x2102, &(0x7f0000003040)={0x77359400}) close_range(r5, 0xffffffffffffffff, 0x2) recvmmsg(r5, 0x0, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000001740)={0x8, 0x6f229557, 0xa, 0x0, 0x0, [{{r0}, 0x1}, {{r1}, 0x10000}, {{r2}, 0x2}, {{r0}, 0x3ff}, {{r3}, 0xfffffffffffffffe}, {{r4}, 0x10001}, {{r5}, 0x9641}, {{r0}, 0x8}, {{r0}, 0x1}, {{r0}, 0xa77}]}) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02b3d09fd34efc255e35e92268e181a8f1a84b59413bd26c428af8f694201bc93d009bd7bf7459510ed663ecdb7e0005bbcde792f709e6d155af6fcae2fa3a3daab63b5ed944b9041e912fcc97aeba99e310d1ce8bc6d2e17bdb063fdafe92b093689a14026eb3a76136664ea5e337d7863eeedb9083ca8e585240718a5d7df3a4b0d5f03529cb2baa3735d74b985e6d0e9afc9f8778d1b1d513154595abf94b58221d414c9a8c652bfa3cdb235964379a43d56d3a3ece1baddfa7f150b84f0f4822f3203dc08a63b3"]) 05:53:26 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000050000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:26 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x4b47, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000b0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:26 executing program 2: sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x7, 0xa, 0x5, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000508100000000000000000000010000abf8432ba4e7408e559325f5c9d09900000000000b00000000020000280200000284", 0x71, 0x400}], 0x0, &(0x7f00000022c0)) r1 = openat$cgroup(r0, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) sendfile(r0, r1, &(0x7f00000001c0)=0x1181, 0x1) [ 952.300493][T21672] loop3: detected capacity change from 0 to 264192 05:53:26 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x7a], 0x0, 0x8, 0x4}) 05:53:26 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x4b49, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:26 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000060000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:26 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) process_vm_writev(0x0, &(0x7f00000024c0)=[{&(0x7f0000000300)=""/102, 0x66}], 0x1, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = accept4$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @empty}, &(0x7f0000002040)=0x10, 0x0) ftruncate(r1, 0x8000000000001000) r2 = fork() wait4(r2, &(0x7f0000000040), 0x4, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) syz_open_pts(r3, 0x9e000) sendfile(r3, r0, 0x0, 0x40810ffe) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x24d) recvmmsg(r0, &(0x7f00000022c0)=[{{&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f00000000c0)}, 0x8}, {{&(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/22, 0x16}, 0x9}, {{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001440)=""/95, 0x5f}, {&(0x7f00000014c0)=""/24, 0x18}, {&(0x7f0000001500)=""/29, 0x1d}, {&(0x7f0000001540)=""/80, 0x50}], 0x4, &(0x7f0000001600)=""/118, 0x76}, 0x1}, {{0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001680)=""/87, 0x57}, {&(0x7f0000001700)=""/130, 0x82}, {&(0x7f00000017c0)=""/171, 0xab}, {&(0x7f0000001880)=""/218, 0xda}, {&(0x7f0000001980)=""/107, 0x6b}, {&(0x7f0000001a00)=""/40, 0x28}], 0x6, &(0x7f0000001ac0)=""/69, 0x45}, 0x2}, {{&(0x7f0000001b40)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001bc0)=""/197, 0xc5}, {&(0x7f0000001cc0)=""/132, 0x84}, {&(0x7f0000001d80)=""/100, 0x64}, {&(0x7f0000001e00)=""/23, 0x17}, {&(0x7f0000001e40)=""/155, 0x9b}, {&(0x7f0000001f00)=""/139, 0x8b}, {&(0x7f0000002180)=""/111, 0x6f}, {&(0x7f0000002040)}, {&(0x7f0000002500)=""/4096, 0x1000}], 0x9, &(0x7f0000002140)=""/4, 0x4}, 0x4}], 0x5, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x7, 0x0, 0xd, 0x81, 0x0, 0xfffffffffffffffd, 0x10090, 0xd, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffffffff, 0x2, @perf_bp={0x0, 0x4}, 0x100, 0x1000, 0x81, 0x7, 0x7fff, 0x3, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, 0x0, 0x0) open(&(0x7f0000002000)='./file0\x00', 0x220080, 0x82) ioctl$TCSETS(r3, 0x5402, &(0x7f0000001fc0)={0x9, 0xce, 0x9, 0x10001, 0xc, "bb33ed6d0a0dc8057cd251d7b01053f51bef7d"}) 05:53:26 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000004060000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:27 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:53:27 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000c0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:27 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x5382, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:27 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000070000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:27 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000000)={0x0, 0x200000000000004d}, 0x8) 05:53:27 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r1, 0x0, 0x2) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) bind$unix(r3, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e22}, 0x6e) sendfile(r0, r4, 0x0, 0x8400fffffffa) 05:53:27 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000fc070000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:27 executing program 2: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r1, 0x0, 0x2) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) bind$unix(r3, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e22}, 0x6e) sendfile(r0, r4, 0x0, 0x8400fffffffa) 05:53:27 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x8, 0x4}) 05:53:27 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000d0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:27 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000090000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:27 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x5385, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 952.909155][T21751] loop3: detected capacity change from 0 to 264192 [ 952.917178][T21753] blktrace: Concurrent blktraces are not allowed on sg0 05:53:27 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x8, 0x4}) 05:53:27 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000e0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:27 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000a0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:27 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x5386, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:27 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x8, 0x4}) [ 953.160839][T21782] blktrace: Concurrent blktraces are not allowed on sg0 05:53:27 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r1, 0x0, 0x2) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) bind$unix(r3, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e22}, 0x6e) sendfile(r0, r4, 0x0, 0x8400fffffffa) 05:53:27 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000009c0a0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 953.480285][T21795] loop3: detected capacity change from 0 to 264192 [ 953.674154][T21800] ================================================================== [ 953.682255][T21800] BUG: KCSAN: data-race in mark_buffer_dirty_inode / mark_buffer_dirty_inode [ 953.693541][T21800] [ 953.695855][T21800] write to 0xffff88813ce48b50 of 8 bytes by task 21795 on cpu 1: [ 953.703566][T21800] mark_buffer_dirty_inode+0x18b/0x1d0 [ 953.709022][T21800] fat_mirror_bhs+0x205/0x330 [ 953.713696][T21800] fat_alloc_clusters+0x95e/0xa50 [ 953.718716][T21800] fat_get_block+0x213/0x5a0 [ 953.723297][T21800] __block_write_begin_int+0x4a2/0x1060 [ 953.728846][T21800] cont_write_begin+0x522/0x850 [ 953.733703][T21800] fat_write_begin+0x61/0xf0 [ 953.738291][T21800] generic_perform_write+0x196/0x3a0 [ 953.743581][T21800] __generic_file_write_iter+0x161/0x300 [ 953.749217][T21800] generic_file_write_iter+0x75/0x130 [ 953.754595][T21800] do_iter_readv_writev+0x2cb/0x360 [ 953.759794][T21800] do_iter_write+0x112/0x4c0 [ 953.764385][T21800] vfs_iter_write+0x4c/0x70 [ 953.768954][T21800] iter_file_splice_write+0x40a/0x750 [ 953.774318][T21800] direct_splice_actor+0x80/0xa0 [ 953.779246][T21800] splice_direct_to_actor+0x345/0x650 [ 953.784615][T21800] do_splice_direct+0xf5/0x170 [ 953.789459][T21800] do_sendfile+0x773/0xda0 [ 953.793879][T21800] __x64_sys_sendfile64+0xf2/0x130 [ 953.798998][T21800] do_syscall_64+0x34/0x50 [ 953.803415][T21800] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 953.809308][T21800] [ 953.811623][T21800] read to 0xffff88813ce48b50 of 8 bytes by task 21800 on cpu 0: [ 953.819243][T21800] mark_buffer_dirty_inode+0x92/0x1d0 05:53:28 executing program 2: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r1, 0x0, 0x2) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) bind$unix(r3, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e22}, 0x6e) sendfile(r0, r4, 0x0, 0x8400fffffffa) 05:53:28 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x541b, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000f0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:28 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x5], 0x0, 0x8, 0x4}) 05:53:28 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000b0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 953.824623][T21800] fat_mirror_bhs+0x205/0x330 [ 953.829304][T21800] fat_ent_write+0xc2/0xd0 [ 953.833714][T21800] fat_chain_add+0x149/0x400 [ 953.838734][T21800] fat_get_block+0x429/0x5a0 [ 953.843421][T21800] __block_write_begin_int+0x4a2/0x1060 [ 953.848977][T21800] cont_write_begin+0x522/0x850 [ 953.853831][T21800] fat_write_begin+0x61/0xf0 [ 953.858417][T21800] generic_perform_write+0x196/0x3a0 [ 953.863699][T21800] __generic_file_write_iter+0x161/0x300 [ 953.869319][T21800] generic_file_write_iter+0x75/0x130 [ 953.874684][T21800] do_iter_readv_writev+0x2cb/0x360 [ 953.879875][T21800] do_iter_write+0x112/0x4c0 [ 953.884630][T21800] vfs_iter_write+0x4c/0x70 [ 953.889128][T21800] iter_file_splice_write+0x40a/0x750 [ 953.894506][T21800] direct_splice_actor+0x80/0xa0 [ 953.899436][T21800] splice_direct_to_actor+0x345/0x650 [ 953.904827][T21800] do_splice_direct+0xf5/0x170 [ 953.909591][T21800] do_sendfile+0x773/0xda0 [ 953.914100][T21800] __x64_sys_sendfile64+0xf2/0x130 [ 953.919212][T21800] do_syscall_64+0x34/0x50 [ 953.923626][T21800] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 953.929521][T21800] [ 953.931840][T21800] Reported by Kernel Concurrency Sanitizer on: [ 953.937976][T21800] CPU: 0 PID: 21800 Comm: syz-executor.3 Not tainted 5.12.0-rc8-syzkaller #0 [ 953.946746][T21800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 953.956792][T21800] ================================================================== 05:53:28 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x8, 0x4}) 05:53:28 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x5421, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:28 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000c0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000004100000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:28 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000d0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:28 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r1, 0x0, 0x2) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) bind$unix(r3, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e22}, 0x6e) sendfile(r0, r4, 0x0, 0x8400fffffffa) 05:53:28 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x5450, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 954.239036][T21848] loop3: detected capacity change from 0 to 264192 05:53:29 executing program 2: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r1, 0x0, 0x2) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) bind$unix(r3, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e22}, 0x6e) sendfile(r0, r4, 0x0, 0x8400fffffffa) 05:53:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000020100000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:29 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x7], 0x0, 0x8, 0x4}) 05:53:29 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000e0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x5451, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:29 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r1, 0x0, 0x2) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) sendfile(r0, r4, 0x0, 0x8400fffffffa) 05:53:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000110000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:29 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x8, 0x4}) 05:53:29 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000f0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 954.803262][T21864] loop3: detected capacity change from 0 to 264192 05:53:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x5452, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:29 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000020100000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:29 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x9], 0x0, 0x8, 0x4}) 05:53:30 executing program 2: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r1, 0x0, 0x2) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) sendfile(r0, r4, 0x0, 0x8400fffffffa) 05:53:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000120000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:30 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x5460, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:30 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000110000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:30 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0xa], 0x0, 0x8, 0x4}) 05:53:30 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r1, 0x0, 0x2) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) 05:53:30 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000120000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:30 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x40049409, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:30 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0xb], 0x0, 0x8, 0x4}) [ 955.885818][T21913] blktrace: Concurrent blktraces are not allowed on sg0 [ 955.902682][T21914] loop3: detected capacity change from 0 to 264192 05:53:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000180000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:30 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000180000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:30 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0xc], 0x0, 0x8, 0x4}) [ 956.041387][T21945] blktrace: Concurrent blktraces are not allowed on sg0 05:53:31 executing program 2: munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) pipe2$9p(&(0x7f0000000000), 0x0) mlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000040)=0x2, 0x8000, 0x3) 05:53:31 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000190000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:31 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x40086602, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:31 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0xd], 0x0, 0x8, 0x4}) 05:53:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000190000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:31 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r1, 0x0, 0x2) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) 05:53:31 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0xe], 0x0, 0x8, 0x4}) 05:53:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000200000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 957.045364][T21964] blktrace: Concurrent blktraces are not allowed on sg0 [ 957.052057][T21963] loop3: detected capacity change from 0 to 264192 05:53:31 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000200000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:31 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x40087602, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000010200000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:31 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x10], 0x0, 0x8, 0x4}) [ 957.222502][T21996] blktrace: Concurrent blktraces are not allowed on sg0 05:53:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01000053eda14942ba9051"], 0x3c}}, 0x0) sendfile(r2, r1, 0x0, 0x100006c00) fcntl$addseals(r2, 0x409, 0xb) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$NL80211_CMD_TDLS_OPER(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x100, 0x70bd2a, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x3d}}}}, [@NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x42) 05:53:31 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000010200000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:31 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x11], 0x0, 0x8, 0x4}) 05:53:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000220000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:31 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x4020940d, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 957.490227][T22020] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 05:53:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000250000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:31 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x80086601, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:31 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x12], 0x0, 0x8, 0x4}) 05:53:31 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r1, 0x0, 0x2) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) 05:53:31 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000220000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:31 executing program 2: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x10) write(r0, &(0x7f0000000000)="1c00000016009b8a14cef4050000000002000000fe02000004000500", 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00', r0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x94, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xc7ba}]}, @IPVS_CMD_ATTR_SERVICE={0x6c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x13, 0x20}}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x14, 0x17}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x55a}]}, 0x94}, 0x1, 0x0, 0x0, 0x4}, 0x20004000) 05:53:31 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x80087601, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 957.671949][T22040] blktrace: Concurrent blktraces are not allowed on sg0 05:53:32 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x25], 0x0, 0x8, 0x4}) 05:53:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000002e0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:32 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000250000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:32 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0x80086601, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:32 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0045878, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:32 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000003f0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000022e0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:32 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x48], 0x0, 0x8, 0x4}) [ 957.798404][T22065] loop3: detected capacity change from 0 to 264192 05:53:32 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0045878, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:32 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x195200, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x5, 0x110, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r3 = socket$inet(0x2, 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) recvmmsg(r3, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000002c0)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="665307359e52731aac5c99c4c265c500ae897094e7b126825deaa769be6d05c41bd34f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9f054859cff15f715134d82ce9c0952d644157684e3dae491de7642a7c52ca392aeb56b80d6b89affd171c1c2d523be877341e0e1dcc2025aa18c9228103b66e1000031d322dbecfa63da445b8bef5bd9125939f50bd2d4edccbf938604a348a666bf58b23ac4edcce412245deacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d58160fa73f4e946381a61500f763b300ac9c3b764a21eae193e82bb2368d59d1ffc82e6f7ea600c1072a3284f7022e1ee7c3527cb7bfaad114fdb0dac6b518a50e484c839a47260295cd506ddeb1a3d19335840ca7e42cef5db7f4f7ed2e76f6ceff12d22b431158f9c65b1", 0x13c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x22e3, &(0x7f00000004c0)="bb86df2db20f85959e7e1e2aacad3e41753ef242c5b9c69559807f98027e7e07e66868f37110a61dd65581b719428b4047d7eba6867a6c211783e02747b9da5d5dc9617dc52a33b11351d16093b0a274144563880ef5ef82bee470b4931bd8e593349a4d39e9f7b5701c403100bc1f809dded1815d1a9559febd60966fb074f7fb504bb914a3ef97aa7b72f872988306e53e5f4ef01ed5f57e1f68f2cd561f170bacff3c67e85501bd77b65f23604b5bb98b674c85e4a807df01249ac7a8bb6b65") ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 05:53:32 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000400000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000022f0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:32 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r1, 0x0, 0x2) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) sendfile(r0, r3, 0x0, 0x8400fffffffa) 05:53:32 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x4c], 0x0, 0x8, 0x4}) 05:53:32 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000480000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x200000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[@ANYRES64=0x0, @ANYRESDEC, @ANYRESDEC, @ANYRESOCT, @ANYRESDEC]) 05:53:32 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0189436, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 958.239278][T22097] blktrace: Concurrent blktraces are not allowed on sg0 05:53:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000003f0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:32 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x60], 0x0, 0x8, 0x4}) 05:53:32 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000004c0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:32 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc020660b, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:32 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0045878, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 958.353575][T22124] loop3: detected capacity change from 0 to 264192 05:53:32 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r1, 0x0, 0x2) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) sendfile(r0, r3, 0x0, 0x8400fffffffa) 05:53:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000400000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:32 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000680000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:32 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x68], 0x0, 0x8, 0x4}) 05:53:32 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0045878, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:32 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481223, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:32 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x6c], 0x0, 0x8, 0x4}) 05:53:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000002440000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:32 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) sendfile(r0, r3, 0x0, 0x8400fffffffa) 05:53:32 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000006c0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:32 executing program 2: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000040), 0x3}, 0x402, 0x200000000000, 0x5, 0x0, 0x0, 0x0, 0x82d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0xfffc, 0xfbff, 0xf}) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000003c0)={0x46e3, 0x5f3, 0x6b7897ab, 0x85ab, 0x2, "ec4b2cf4dd291ac55a0cde0c254d6c6cb5a8c4", 0x3, 0x8}) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x20, 0xa1, 0xdf, 0x0, 0x6, 0x10004, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6b7, 0x4, @perf_config_ext={0xbe, 0xfffffffffffffffc}, 0x4c658, 0x400, 0xe1d, 0x6, 0x5, 0x0, 0xdbf}, 0x0, 0x8, 0xffffffffffffffff, 0x2) pipe2(0x0, 0x0) r1 = msgget(0x0, 0x204) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000000)=""/46) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) ioctl$KDMKTONE(r0, 0x4b30, 0x8000) 05:53:32 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481225, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:32 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x74], 0x0, 0x8, 0x4}) [ 958.537978][T22165] loop3: detected capacity change from 0 to 264192 05:53:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000002450000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:32 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000720000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 958.629139][T22186] loop3: detected capacity change from 0 to 264192 05:53:32 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x7a], 0x0, 0x8, 0x4}) 05:53:33 executing program 2: setgid(0xee01) clone(0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000d40)="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") r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000600)={0x2, &(0x7f0000000240)=[{0x5, 0x81, 0x6, 0x7fffffff}, {0x100, 0x5, 0x6, 0x3}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) getgroups(0x2, &(0x7f0000000a00)=[0x0, 0xee01]) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000a40)='cgroup.procs\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x4, 0xa9, 0xf4, 0x3ff, 0x40, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, 0x7800, 0x1, 0x1, 0xeb71}}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000580)={'syztnl2\x00', r3, 0x29, 0x7f, 0x4, 0x80000001, 0x3a, @mcast1, @private0={0xfc, 0x0, [], 0x1}, 0x20, 0x8, 0x7, 0x1}}) getpgrp(0x0) sendmsg$unix(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="000076c7"], 0x78}, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r4, 0x89f7, &(0x7f00000019c0)={'ip6tnl0\x00', 0x0}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000b80)=[{&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000003c0)="871b6c781e871f2656308cad235c3ec2dda9a8a0f15ecac9587c67eb6c3d20217d4120a0e937a0b6ddd44821eee9a42e844fde4feeda387afbef8f52176efa42c245c6bf075af4f1696f8a1ff2c75513d4cbd4c31e2ee1f331769d6937c71fe95885fa1b694fac6afa71a1a55650f59c2dab89845727b9d59e4ea9691598cc4e2fd8ba68cf3678842c1ed1df356118d226e5e92956b274a367856c108beb9b0736e954894d15c709d374e949daa1a529", 0xb0}, {&(0x7f0000000480)="05e35dfada22857152e4ad90759efa011ae48f5de9ae233670b8ad6c5cf6115483becaf7c5137a59ab2e498de03bcce036bdc2e2167385596881adfec18e49a3c69963970d46cff223069031833900f568a285d9d767efc7b025f95d4672dbbaff7d51b4d73a1c388395b6e23c6d57b360284db0fa57247dcf2623e98084334b80e4a1e88effb6f12a9132ed47df219c2a9fb5066fa4915fa4feae2c1ed8a5bf752959733c965a5b3375c10f5ff75565d7066a1daf3a15ee6cd57bdb82db376226e6d525513474cdf852d5dd63ec72d795938427e9cf08fb72281461faaa3ed81b573819244bd0c3febd6b0d105af033b8d83d3b4c97e5", 0xf7}], 0x2}, {&(0x7f0000000740)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000009c0)=[{&(0x7f00000007c0)="aec0e3b1631d66203e88b2a44ba2dbc74ab986c101b382ec2e208370ddeec763eb3676e388aae22366b83008fb52b8085d79e97f8d9468738c32d1ec5e963e91d3f4b0ed492d76f7e6e64d69b1ddf0290129471ff001a0f0fd9f6a5e34a793341a0d39083281ecadd7a19d49d6ab5aa65a71beee8c64d9950ff2acd9e4d2684f75f96c4a57655db3e1f64f4dd996916cb7ca75b98881ce3f0676e96d60f39aa2a0ff2384278cf67df107d291b243ddb47d81367d531a84dae481d965cd3a13edf93804dd69853865a990cf709fe1f893f755173f0bff89c018aa8e", 0xdb}, {0xfffffffffffffffe}, {&(0x7f00000008c0)="30e6127ed2b29ab315760b32221000349c40ec8714cb7ba06c137e5580ec9c92d508696bb6472ebd1f20609ee884d52c3ea3d8fc85a62cf059fc12218747eb37b3704a0dcc1804f68f332e12e4af257a8cdbb7562437c6a4cb19757eea721a4ce74b6979ac9490ef1a8666f4c08e1eddefb5e5b3645086bb81c4ff077f11365547a27ea7b95dd7944534aa0bbabd0d9db797904f6cf2ab36f04f8dc097763f28b63579fce1f1f6ee39b3df3a312bb752a0f907b58e243a", 0xb7}], 0x3, 0x0, 0x0, 0x880}], 0x2, 0x0) 05:53:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122a, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:33 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000730000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:33 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) sendfile(r0, r2, 0x0, 0x8400fffffffa) 05:53:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000003470000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122b, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:33 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x8, 0x4}) 05:53:33 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000740000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000480000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:33 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000007a0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 958.823882][T22232] blktrace: Concurrent blktraces are not allowed on sg0 [ 958.838669][T22230] loop3: detected capacity change from 0 to 264192 05:53:33 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x8, 0x4}) 05:53:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122d, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x9, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) close(r0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) preadv(r2, &(0x7f0000000100), 0x0, 0xd9d, 0x7) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000040)) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = socket$inet(0x2, 0x1, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, &(0x7f0000000100)={0x40, 0x4, 0x1, 0x1800000, 0x0, [0x2, 0x1f, 0x1, 0x40]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e21, 0x8, @private2, 0x6}, 0x1c) recvmmsg(r3, 0x0, 0x0, 0x0, 0x0) fcntl$setownex(r3, 0xf, &(0x7f0000000080)={0x1, 0xffffffffffffffff}) 05:53:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122e, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:33 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000a9c0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000004c0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:33 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(r1, 0x1000) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) sendfile(r0, r2, 0x0, 0x8400fffffffa) 05:53:33 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x8, 0x4}) 05:53:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122f, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:33 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) sendfile(r0, r1, 0x0, 0x8400fffffffa) [ 958.997798][T22270] loop3: detected capacity change from 0 to 264192 05:53:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000600000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:33 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000c0ed0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:33 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x8, 0x4}) 05:53:33 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000007fc0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:33 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122d, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481230, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:33 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) sendfile(r0, r1, 0x0, 0x8400fffffffa) 05:53:33 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0x0, 0x8, 0x4}) 05:53:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000680000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 959.139771][T22295] loop3: detected capacity change from 0 to 264192 05:53:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048124c, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:33 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122d, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:33 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000fffe0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481258, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:33 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x8, 0x4}) 05:53:33 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122d, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000006c0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:33 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f450000000000000fff0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 959.261936][T22328] loop3: detected capacity change from 0 to 264192 05:53:33 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000feff0000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:33 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) sendfile(r0, r1, 0x0, 0x8400fffffffa) 05:53:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481263, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000740000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:33 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0x0, 0x8, 0x4}) 05:53:33 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000240)={0x109, 0x29, 0x2, {0x800, [{{0x80, 0x1, 0x8}, 0x0, 0x20, 0x7, './file0'}, {{0x8, 0x3, 0x2}, 0x9, 0x5, 0x7, './file0'}, {{0x0, 0x2, 0x6}, 0x0, 0x23, 0x7, './file0'}, {{0x40, 0x2, 0x5}, 0x7, 0x1, 0x7, './file0'}, {{0x18, 0x4, 0x7}, 0x100000001, 0x80, 0xd, './file0/file0'}, {{0x10, 0x4}, 0x9b4, 0x7, 0x7, './file0'}, {{0x40, 0x2, 0x8}, 0x2, 0x2, 0x7, './file0'}, {{0x8, 0x0, 0x1}, 0x9, 0x8, 0x7, './file0'}]}}, 0x109) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0xea60}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = syz_open_pts(r0, 0x40) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x2010, r3, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) fstat(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee01, r5) quotactl(0x133b, &(0x7f00000000c0)='./file0\x00', r5, &(0x7f0000000100)="7edbe11bed9562dba48e795a99375f47eda2e1cb162b6a3665acdd845d5dd9ac03598e9641401925aa604f7e1abab8e03ac16357cc6f0522166579b7685bea8a11a2f64cc9") sendfile(r0, r1, 0x0, 0x0) 05:53:33 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000400000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:33 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x8, 0x4}) 05:53:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481264, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000770000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:33 executing program 2: clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone3(&(0x7f0000000440)={0x8048000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0x0], 0x1}, 0x58) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) [ 959.479456][T22367] loop3: detected capacity change from 0 to 264192 05:53:33 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000800000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481268, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) [ 959.525944][T22377] blktrace: Concurrent blktraces are not allowed on sg0 05:53:33 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) sendfile(r0, r2, 0x0, 0x8400fffffffa) 05:53:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000790000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:33 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x0, 0x8, 0x4}) 05:53:33 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000c00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:33 executing program 2: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000180)=0xffffffffffffffff, 0x12) sendfile(r1, r2, 0x0, 0x8400fffffffa) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40406}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x30) fcntl$addseals(r3, 0x409, 0x1) sendfile(r0, r4, 0x0, 0x8400fffffffa) readlink(&(0x7f0000000100)='./bus\x00', &(0x7f0000000400)=""/254, 0xfe) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x0, 0x12) 05:53:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481269, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:33 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0x0, 0x8, 0x4}) 05:53:34 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000ffff1f00000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:34 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000007a0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 959.713398][T22418] loop3: detected capacity change from 0 to 264192 05:53:34 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000ffffe000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:34 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048126c, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:34 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xb], 0x0, 0x8, 0x4}) 05:53:34 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) sendfile(r0, r2, 0x0, 0x8400fffffffa) 05:53:34 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000001000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:34 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000007b0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:34 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000002000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 959.844775][T22439] blktrace: Concurrent blktraces are not allowed on sg0 05:53:34 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x80000, 0x22) mkdir(0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chdir(&(0x7f0000000200)='./bus\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000300)=ANY=[], 0x116) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0x0, 0x0}) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x0, './file0/file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="100000000000000000000000000000002e184dd750741183634aed12167cb5b95d3e9ca9ae1175bc2c06e8a79ba93a6837e5776598bc9970b34519aba87392e92039710a2275af39dcbe6ff5f734e0ef486dfd2cf9fa0e33af3695ab254edaed4ecb17f3d3f47419d2d7c23c4cbdc5a2484b6bb2dc8717d8e608e408ebaca0253e91f413019703ca9f5614789394b0d0d16314dc8c3be38eb5d0b9224e0907"], 0x10}}], 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="02000000010004000000000002000400", @ANYRES32=0x0, @ANYBLOB="02000700", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040001000000000008000000", @ANYRES32=0xee01, @ANYBLOB="0800eafab24cdaf283464493de55b013dbea823e2e8cd53afea29a4f754b76d141d0c0c0b5ac544cc0da74a3af0e0179704bb6d951392f58dbf4f92ad596ae54d4e43476e2920027a675c36c999f5e868a31d147933b4c2f6817a45be6553f6b16a22f9a06b6e9cfe707e9e29ec851212032b16745e0a9f6090437ee1021b71a453c1cb80491eea927dd3889bbed977b14148ac9191973cc1876a4c9d3f24c17316c0fe656341ef1cc4452538ed4ea211c4999016d1e1fca15a91cf1", @ANYRES32=0x0, @ANYBLOB="10000200000000002000020000000000"], 0x4c, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x12, 0x7fff) 05:53:34 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048126f, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:34 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000402000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:34 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xc], 0x0, 0x8, 0x4}) 05:53:34 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000007c0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) [ 959.911237][T22455] loop3: detected capacity change from 0 to 264192 05:53:34 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481270, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:34 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000003000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:34 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000004000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:34 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) sendfile(r0, r2, 0x0, 0x8400fffffffa) 05:53:34 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000007d0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:34 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x29, 0x10, 0x0, 0x0) 05:53:34 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xd], 0x0, 0x8, 0x4}) 05:53:34 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481274, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:34 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000b80000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:34 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '$'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, '\\\'M'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "770318f105c7c6ad4609fb28e45717845bb60c5c43c4205b0aa8f5e845bf111aa6016129fd3d31036d18f14c5c4b53f2d1650e5775638f43a99efc4efb534dd3d07f086935ae48c1b6fad764b0d30cf7b14232159c59d808fd1acdc36f84b3627e9c31f62895d866dde2a07c5ba59a21d185dc8c9acf15dc7c6043981fa848183759d9fafcbc85af433270681e8e70abc94b32cdef9194bd81f5c0349bc527fefa7b65788fb467bd3f3af6ff5e5edc0c696dd53862b022e41564111e33454cddb95604e3a40bc1bf00ccf150af0eacfc710a9bcfd17121592cdad900aa7d1d28cb4df4936ed0850f8ec7a189172a2d9c80314b06c0"}, 0x130) ftruncate(0xffffffffffffffff, 0x1000) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x28) sendfile(r0, r1, 0x0, 0x8400fffffffa) 05:53:34 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000005000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) [ 960.122033][T22500] loop3: detected capacity change from 0 to 264192 05:53:34 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000006000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000280)={[{@cruft='cruft'}, {@map_off='map=off'}]}) 05:53:34 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x13, 0xd9f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe], 0x0, 0x8, 0x4}) 05:53:34 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000001ba0000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000022c0)={[{@i_version='i_version'}]}) 05:53:34 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8c, &(0x7f0000000340)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334cd4afab5d8673c6f1e036a1fd1bb12a97ac2b7f0fb4aabebae8dc5dffbcd48a70502156e2bb08487ddca7fdb8e4189ebe84c95ed983ac128b83e5150eaa22c1b17e8b0686d3b5a92c184464c96a762a3bbd10db5b47"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x3, &(0x7f0000000140)) r2 = fork() ptrace$cont(0x7, r2, 0x7, 0x1) r3 = gettid() tkill(r3, 0x40) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x100000003) migrate_pages(0x0, 0x100, 0x0, &(0x7f0000000080)=0x5) write(0xffffffffffffffff, 0x0, 0x0) 05:53:34 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481275, &(0x7f0000000140)={[], 0x0, 0x3, 0x10001, 0x1, 0x1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 05:53:34 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff