f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}, 0x48) [ 1353.469267] XFS (loop1): unknown mount option [seclabel]. [ 1353.515079] XFS (loop2): Invalid superblock magic number 16:57:06 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r1, 0xe) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x20, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:57:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}, 0x48) 16:57:06 executing program 0: r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) request_key(&(0x7f0000000200)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffffb) getpeername(r0, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x24, 0x0) io_setup(0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000340)={0x0, 0xffffffffffffffff}, &(0x7f00000004c0)=0x8) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) pipe(&(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) fcntl$getown(r1, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f00000000c0)={0x0, 0x1, 0x0, [], &(0x7f00000001c0)={0x98f90a, 0xfffffffffffffffd, [], @p_u32=&(0x7f0000000040)}}) 16:57:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c12") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4, 0x6, &(0x7f0000000680)=[{&(0x7f0000000200)="3d1d056340c3daea74534c9240b0f4bb229ce0d105", 0x15, 0x5a}, {&(0x7f0000000240)="3594ac1907b622dbb01b542874e119e3199ca18890c6d154da8e69df474748601e81e9e88d7f7d3874f44f9d06cb113793cdf148056e8f0acd711e65f78e9a0386cddaa92584a144dd22f777771538157106b6352140e6c69b9cd9c0ae209c63ed94d70a5a49f56a0c33aa06ab7554148d6a48884563ae018a65425b21a9876546f23d3eccef4fd6b353c53d0de96f21cf78cb0bf03b049ac2ca2e16f0d77c5d4b698af8c0aebfd16df465709f24de642729ec45b96527b7b7c76c20fa3c42f32dafdc37af01", 0xc6, 0x42}, {&(0x7f0000000340)="471712c44ed372aab00159fdc8411aad20996cad4aa0b373af4bd29db6e85d913586360dd61decd94e63123d2820f0f7576e0fd8f6d72151465c4b223689240d0132bc4969a13d3b504438b26fbe706d5047837c8d4d4a7b1105e8988e13f5cab00be565b79a09d748097c9b7a71e5d8cdf5ecac8968500de3a04b14f8b02f3f5bdb93709544a58257f2babad4ea65e58a1858ac0c63d9f3f35d12f5cd3ec2a1f42ba9195ab510be3ab26686db287a526db58e246cee3f16e84f12ff848e41d338c95dc7929e94a16f101286f7bb45ec16b0", 0xd2, 0x8}, {&(0x7f0000000440)="a59fe43381b7a8f4b605fb386d2753d116179057545593e89fab5c528f0dc29bd3e968aa7e7c9af14feef0b717ffeae706168ff336b344ab1ca0a607133001da18a7f3276f82702e29109484975c7d7dd8c7213f22cc209fb563df468d599b4b17fdb143aea49dd413dd3643255e915941a12c1cfe1ece5555e9824254674d25e74bb0078c7db2b62b6d443469b0a2fb5cd85b58c8ec2375c649036a1bdacdb1327ecfe70cb195cc8817888d5b6ee77acf9c314d39baf575ef88ad774c6781327346e32eb50448fe26b9e13dd3342ece82c7f13c148722c0761592a7da3249332f01048da639b1e63ba7d62ada7d49", 0xef, 0x21c}, {&(0x7f0000000540)="a406ec163fd9", 0x6, 0x4}, {&(0x7f0000000580)="5b5d1d660f7be89299e38c7e5f92531e1b95898e10568163925f04c11e3ccda8692052e733a1b53d0f4d001644895305e2e1e48d2cbda667d59d3acc539cdda5d41323e8ac964217cbc3a546bee3ffebe0bc97b4095433572eeb723e38c163013147c9a1a899abb5115213831eac7ff098ca83f014e64583f43402a241765cd066e6681a3856b5ff184f7ee413f2213a9e4b22d9b8e5e8dc5feecefa8f43b65922a9acd41f2157f42831c470a6f0d7040804db610e5faeadb444c5f1d2bb7146bb283139f14fb587b8c66a25b6a19e23558f82a2472e874e4534b61a560532df382ea6dbcc2cb1b17b53afca7c75727e06a7d2e8", 0xf4, 0x1}], 0x8000, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) 16:57:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000900)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e24, 0xe15, @local, 0x97}}, 0x0, 0x10000, 0x0, "3541b8146731357c8aae3631ad2a3b593f12ed0db4e2eab73452e4ce57790d72ecf385e4faf61cb9b292a0de2bc3e74e6119c87dae55298a67d5da81423b4fd4f946349cdb905de28259ff3391745554"}, 0xd8) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) 16:57:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff]}, 0x48) 16:57:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 1356.266663] XFS (loop1): unknown mount option [seclabel]. 16:57:07 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r1, 0xe) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x20, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:57:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c12") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4, 0x6, &(0x7f0000000680)=[{&(0x7f0000000200)="3d1d056340c3daea74534c9240b0f4bb229ce0d105", 0x15, 0x5a}, {&(0x7f0000000240)="3594ac1907b622dbb01b542874e119e3199ca18890c6d154da8e69df474748601e81e9e88d7f7d3874f44f9d06cb113793cdf148056e8f0acd711e65f78e9a0386cddaa92584a144dd22f777771538157106b6352140e6c69b9cd9c0ae209c63ed94d70a5a49f56a0c33aa06ab7554148d6a48884563ae018a65425b21a9876546f23d3eccef4fd6b353c53d0de96f21cf78cb0bf03b049ac2ca2e16f0d77c5d4b698af8c0aebfd16df465709f24de642729ec45b96527b7b7c76c20fa3c42f32dafdc37af01", 0xc6, 0x42}, {&(0x7f0000000340)="471712c44ed372aab00159fdc8411aad20996cad4aa0b373af4bd29db6e85d913586360dd61decd94e63123d2820f0f7576e0fd8f6d72151465c4b223689240d0132bc4969a13d3b504438b26fbe706d5047837c8d4d4a7b1105e8988e13f5cab00be565b79a09d748097c9b7a71e5d8cdf5ecac8968500de3a04b14f8b02f3f5bdb93709544a58257f2babad4ea65e58a1858ac0c63d9f3f35d12f5cd3ec2a1f42ba9195ab510be3ab26686db287a526db58e246cee3f16e84f12ff848e41d338c95dc7929e94a16f101286f7bb45ec16b0", 0xd2, 0x8}, {&(0x7f0000000440)="a59fe43381b7a8f4b605fb386d2753d116179057545593e89fab5c528f0dc29bd3e968aa7e7c9af14feef0b717ffeae706168ff336b344ab1ca0a607133001da18a7f3276f82702e29109484975c7d7dd8c7213f22cc209fb563df468d599b4b17fdb143aea49dd413dd3643255e915941a12c1cfe1ece5555e9824254674d25e74bb0078c7db2b62b6d443469b0a2fb5cd85b58c8ec2375c649036a1bdacdb1327ecfe70cb195cc8817888d5b6ee77acf9c314d39baf575ef88ad774c6781327346e32eb50448fe26b9e13dd3342ece82c7f13c148722c0761592a7da3249332f01048da639b1e63ba7d62ada7d49", 0xef, 0x21c}, {&(0x7f0000000540)="a406ec163fd9", 0x6, 0x4}, {&(0x7f0000000580)="5b5d1d660f7be89299e38c7e5f92531e1b95898e10568163925f04c11e3ccda8692052e733a1b53d0f4d001644895305e2e1e48d2cbda667d59d3acc539cdda5d41323e8ac964217cbc3a546bee3ffebe0bc97b4095433572eeb723e38c163013147c9a1a899abb5115213831eac7ff098ca83f014e64583f43402a241765cd066e6681a3856b5ff184f7ee413f2213a9e4b22d9b8e5e8dc5feecefa8f43b65922a9acd41f2157f42831c470a6f0d7040804db610e5faeadb444c5f1d2bb7146bb283139f14fb587b8c66a25b6a19e23558f82a2472e874e4534b61a560532df382ea6dbcc2cb1b17b53afca7c75727e06a7d2e8", 0xf4, 0x1}], 0x8000, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) [ 1356.397325] XFS (loop2): Invalid superblock magic number 16:57:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa000000]}, 0x48) 16:57:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000900)='./file0\x00', 0x0, 0xfffffe65, 0x0, 0x20, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_logind_exec_t:s0\x00', 0x2b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) 16:57:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) 16:57:07 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x2, 0x0, 0x1ce4, 0x7475, 0x0, 0x0, 0x1, 0x9, 0x1, 0x6, 0x0, 0x0, 0xff, 0x6, 0x1f, 0x0, 0x3, 0x7f, 0x3, 0x40, 0x0, 0x4, 0x7fffffff, 0xda0, 0x1ff, 0x7ff, 0x100, 0xfffffffffffffffa, 0x4, 0xfffffffffffffffd, 0x4, 0x5, 0x2, 0x0, 0x9, 0xfff, 0x0, 0xffffffff, 0x6, @perf_config_ext={0x80000000, 0x3}, 0x11070, 0x8, 0x6cee, 0x6, 0x7, 0x7, 0x4}, r1, 0xf, r0, 0x1) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000080)=',vmnet0-\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x200003) r2 = socket$inet(0x10, 0x3, 0xc) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000180)) [ 1356.590241] XFS (loop1): unknown mount option [seclabel]. 16:57:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4, 0x6, &(0x7f0000000680)=[{&(0x7f0000000200)="3d1d056340c3daea74534c9240b0f4bb229ce0d105", 0x15, 0x5a}, {&(0x7f0000000240)="3594ac1907b622dbb01b542874e119e3199ca18890c6d154da8e69df474748601e81e9e88d7f7d3874f44f9d06cb113793cdf148056e8f0acd711e65f78e9a0386cddaa92584a144dd22f777771538157106b6352140e6c69b9cd9c0ae209c63ed94d70a5a49f56a0c33aa06ab7554148d6a48884563ae018a65425b21a9876546f23d3eccef4fd6b353c53d0de96f21cf78cb0bf03b049ac2ca2e16f0d77c5d4b698af8c0aebfd16df465709f24de642729ec45b96527b7b7c76c20fa3c42f32dafdc37af01", 0xc6, 0x42}, {&(0x7f0000000340)="471712c44ed372aab00159fdc8411aad20996cad4aa0b373af4bd29db6e85d913586360dd61decd94e63123d2820f0f7576e0fd8f6d72151465c4b223689240d0132bc4969a13d3b504438b26fbe706d5047837c8d4d4a7b1105e8988e13f5cab00be565b79a09d748097c9b7a71e5d8cdf5ecac8968500de3a04b14f8b02f3f5bdb93709544a58257f2babad4ea65e58a1858ac0c63d9f3f35d12f5cd3ec2a1f42ba9195ab510be3ab26686db287a526db58e246cee3f16e84f12ff848e41d338c95dc7929e94a16f101286f7bb45ec16b0", 0xd2, 0x8}, {&(0x7f0000000440)="a59fe43381b7a8f4b605fb386d2753d116179057545593e89fab5c528f0dc29bd3e968aa7e7c9af14feef0b717ffeae706168ff336b344ab1ca0a607133001da18a7f3276f82702e29109484975c7d7dd8c7213f22cc209fb563df468d599b4b17fdb143aea49dd413dd3643255e915941a12c1cfe1ece5555e9824254674d25e74bb0078c7db2b62b6d443469b0a2fb5cd85b58c8ec2375c649036a1bdacdb1327ecfe70cb195cc8817888d5b6ee77acf9c314d39baf575ef88ad774c6781327346e32eb50448fe26b9e13dd3342ece82c7f13c148722c0761592a7da3249332f01048da639b1e63ba7d62ada7d49", 0xef, 0x21c}, {&(0x7f0000000540)="a406ec163fd9", 0x6, 0x4}, {&(0x7f0000000580)="5b5d1d660f7be89299e38c7e5f92531e1b95898e10568163925f04c11e3ccda8692052e733a1b53d0f4d001644895305e2e1e48d2cbda667d59d3acc539cdda5d41323e8ac964217cbc3a546bee3ffebe0bc97b4095433572eeb723e38c163013147c9a1a899abb5115213831eac7ff098ca83f014e64583f43402a241765cd066e6681a3856b5ff184f7ee413f2213a9e4b22d9b8e5e8dc5feecefa8f43b65922a9acd41f2157f42831c470a6f0d7040804db610e5faeadb444c5f1d2bb7146bb283139f14fb587b8c66a25b6a19e23558f82a2472e874e4534b61a560532df382ea6dbcc2cb1b17b53afca7c75727e06a7d2e8", 0xf4, 0x1}], 0x8000, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) 16:57:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:57:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff85]}, 0x48) 16:57:07 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x6, &(0x7f0000000280)="0adc1f023c123f3188a070") setsockopt$inet_dccp_int(r0, 0x21, 0x3, &(0x7f0000000140)=0x2, 0x4) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, 0x0) [ 1356.847125] XFS (loop1): unknown mount option [seclabel]. 16:57:07 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c80000010000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000f9ffffff36000000010000000000000038004d41535155455241444500000000000000000000000000000000000000000100000004000000ffffffffac14140f06ff03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080130010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000ba47000001000000020000000200000028004155444954000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090efbde11f2d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800d00000000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1e0101c1c09ac3b5014e2400000000000000001f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e800200100000000000000000000000000000000000000000000000050006d756c7469706f727400000000000000000000000000000000000000000100014e204e204e204e244e214e224e204e204e244e244e234e234e204e224e23000001000100010001010101010000003800444e41540000000000000000000000000000000000000000000000000000010000000d000000e0000001ffffffff00670200000000000000000000000000"], 0x1) r0 = socket(0x11, 0x803, 0x300) r1 = socket$inet(0x2, 0x80003, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000600), 0x10) recvmmsg(r0, &(0x7f0000002e00), 0x386, 0x22, 0x0) [ 1357.113870] XFS (loop2): Invalid superblock magic number 16:57:10 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r1, 0xe) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x20, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 16:57:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4, 0x6, &(0x7f0000000680)=[{&(0x7f0000000200)="3d1d056340c3daea74534c9240b0f4bb229ce0d105", 0x15, 0x5a}, {&(0x7f0000000240)="3594ac1907b622dbb01b542874e119e3199ca18890c6d154da8e69df474748601e81e9e88d7f7d3874f44f9d06cb113793cdf148056e8f0acd711e65f78e9a0386cddaa92584a144dd22f777771538157106b6352140e6c69b9cd9c0ae209c63ed94d70a5a49f56a0c33aa06ab7554148d6a48884563ae018a65425b21a9876546f23d3eccef4fd6b353c53d0de96f21cf78cb0bf03b049ac2ca2e16f0d77c5d4b698af8c0aebfd16df465709f24de642729ec45b96527b7b7c76c20fa3c42f32dafdc37af01", 0xc6, 0x42}, {&(0x7f0000000340)="471712c44ed372aab00159fdc8411aad20996cad4aa0b373af4bd29db6e85d913586360dd61decd94e63123d2820f0f7576e0fd8f6d72151465c4b223689240d0132bc4969a13d3b504438b26fbe706d5047837c8d4d4a7b1105e8988e13f5cab00be565b79a09d748097c9b7a71e5d8cdf5ecac8968500de3a04b14f8b02f3f5bdb93709544a58257f2babad4ea65e58a1858ac0c63d9f3f35d12f5cd3ec2a1f42ba9195ab510be3ab26686db287a526db58e246cee3f16e84f12ff848e41d338c95dc7929e94a16f101286f7bb45ec16b0", 0xd2, 0x8}, {&(0x7f0000000440)="a59fe43381b7a8f4b605fb386d2753d116179057545593e89fab5c528f0dc29bd3e968aa7e7c9af14feef0b717ffeae706168ff336b344ab1ca0a607133001da18a7f3276f82702e29109484975c7d7dd8c7213f22cc209fb563df468d599b4b17fdb143aea49dd413dd3643255e915941a12c1cfe1ece5555e9824254674d25e74bb0078c7db2b62b6d443469b0a2fb5cd85b58c8ec2375c649036a1bdacdb1327ecfe70cb195cc8817888d5b6ee77acf9c314d39baf575ef88ad774c6781327346e32eb50448fe26b9e13dd3342ece82c7f13c148722c0761592a7da3249332f01048da639b1e63ba7d62ada7d49", 0xef, 0x21c}, {&(0x7f0000000540)="a406ec163fd9", 0x6, 0x4}, {&(0x7f0000000580)="5b5d1d660f7be89299e38c7e5f92531e1b95898e10568163925f04c11e3ccda8692052e733a1b53d0f4d001644895305e2e1e48d2cbda667d59d3acc539cdda5d41323e8ac964217cbc3a546bee3ffebe0bc97b4095433572eeb723e38c163013147c9a1a899abb5115213831eac7ff098ca83f014e64583f43402a241765cd066e6681a3856b5ff184f7ee413f2213a9e4b22d9b8e5e8dc5feecefa8f43b65922a9acd41f2157f42831c470a6f0d7040804db610e5faeadb444c5f1d2bb7146bb283139f14fb587b8c66a25b6a19e23558f82a2472e874e4534b61a560532df382ea6dbcc2cb1b17b53afca7c75727e06a7d2e8", 0xf4, 0x1}], 0x8000, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) 16:57:10 executing program 0 (fault-call:8 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:57:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:57:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x511000, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000900)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x5, 0x4) 16:57:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) [ 1359.519290] XFS (loop1): unknown mount option [seclabel]. 16:57:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:57:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:57:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4, 0x6, &(0x7f0000000680)=[{&(0x7f0000000200)="3d1d056340c3daea74534c9240b0f4bb229ce0d105", 0x15, 0x5a}, {&(0x7f0000000240)="3594ac1907b622dbb01b542874e119e3199ca18890c6d154da8e69df474748601e81e9e88d7f7d3874f44f9d06cb113793cdf148056e8f0acd711e65f78e9a0386cddaa92584a144dd22f777771538157106b6352140e6c69b9cd9c0ae209c63ed94d70a5a49f56a0c33aa06ab7554148d6a48884563ae018a65425b21a9876546f23d3eccef4fd6b353c53d0de96f21cf78cb0bf03b049ac2ca2e16f0d77c5d4b698af8c0aebfd16df465709f24de642729ec45b96527b7b7c76c20fa3c42f32dafdc37af01", 0xc6, 0x42}, {&(0x7f0000000340)="471712c44ed372aab00159fdc8411aad20996cad4aa0b373af4bd29db6e85d913586360dd61decd94e63123d2820f0f7576e0fd8f6d72151465c4b223689240d0132bc4969a13d3b504438b26fbe706d5047837c8d4d4a7b1105e8988e13f5cab00be565b79a09d748097c9b7a71e5d8cdf5ecac8968500de3a04b14f8b02f3f5bdb93709544a58257f2babad4ea65e58a1858ac0c63d9f3f35d12f5cd3ec2a1f42ba9195ab510be3ab26686db287a526db58e246cee3f16e84f12ff848e41d338c95dc7929e94a16f101286f7bb45ec16b0", 0xd2, 0x8}, {&(0x7f0000000440)="a59fe43381b7a8f4b605fb386d2753d116179057545593e89fab5c528f0dc29bd3e968aa7e7c9af14feef0b717ffeae706168ff336b344ab1ca0a607133001da18a7f3276f82702e29109484975c7d7dd8c7213f22cc209fb563df468d599b4b17fdb143aea49dd413dd3643255e915941a12c1cfe1ece5555e9824254674d25e74bb0078c7db2b62b6d443469b0a2fb5cd85b58c8ec2375c649036a1bdacdb1327ecfe70cb195cc8817888d5b6ee77acf9c314d39baf575ef88ad774c6781327346e32eb50448fe26b9e13dd3342ece82c7f13c148722c0761592a7da3249332f01048da639b1e63ba7d62ada7d49", 0xef, 0x21c}, {&(0x7f0000000540)="a406ec163fd9", 0x6, 0x4}, {&(0x7f0000000580)="5b5d1d660f7be89299e38c7e5f92531e1b95898e10568163925f04c11e3ccda8692052e733a1b53d0f4d001644895305e2e1e48d2cbda667d59d3acc539cdda5d41323e8ac964217cbc3a546bee3ffebe0bc97b4095433572eeb723e38c163013147c9a1a899abb5115213831eac7ff098ca83f014e64583f43402a241765cd066e6681a3856b5ff184f7ee413f2213a9e4b22d9b8e5e8dc5feecefa8f43b65922a9acd41f2157f42831c470a6f0d7040804db610e5faeadb444c5f1d2bb7146bb283139f14fb587b8c66a25b6a19e23558f82a2472e874e4534b61a560532df382ea6dbcc2cb1b17b53afca7c75727e06a7d2e8", 0xf4, 0x1}], 0x8000, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) [ 1359.641428] XFS (loop2): Invalid superblock magic number 16:57:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 16:57:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") r1 = dup(r0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000100)={r2, 0x5}, 0x8) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000900)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@ng={0x4, 0x2}, 0x2, 0x0) [ 1359.885163] XFS (loop1): unknown mount option [seclabel]. [ 1360.063508] XFS (loop2): Invalid superblock magic number 16:57:13 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) 16:57:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:57:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x2, 0x0) 16:57:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a0") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4, 0x6, &(0x7f0000000680)=[{&(0x7f0000000200)="3d1d056340c3daea74534c9240b0f4bb229ce0d105", 0x15, 0x5a}, {&(0x7f0000000240)="3594ac1907b622dbb01b542874e119e3199ca18890c6d154da8e69df474748601e81e9e88d7f7d3874f44f9d06cb113793cdf148056e8f0acd711e65f78e9a0386cddaa92584a144dd22f777771538157106b6352140e6c69b9cd9c0ae209c63ed94d70a5a49f56a0c33aa06ab7554148d6a48884563ae018a65425b21a9876546f23d3eccef4fd6b353c53d0de96f21cf78cb0bf03b049ac2ca2e16f0d77c5d4b698af8c0aebfd16df465709f24de642729ec45b96527b7b7c76c20fa3c42f32dafdc37af01", 0xc6, 0x42}, {&(0x7f0000000340)="471712c44ed372aab00159fdc8411aad20996cad4aa0b373af4bd29db6e85d913586360dd61decd94e63123d2820f0f7576e0fd8f6d72151465c4b223689240d0132bc4969a13d3b504438b26fbe706d5047837c8d4d4a7b1105e8988e13f5cab00be565b79a09d748097c9b7a71e5d8cdf5ecac8968500de3a04b14f8b02f3f5bdb93709544a58257f2babad4ea65e58a1858ac0c63d9f3f35d12f5cd3ec2a1f42ba9195ab510be3ab26686db287a526db58e246cee3f16e84f12ff848e41d338c95dc7929e94a16f101286f7bb45ec16b0", 0xd2, 0x8}, {&(0x7f0000000440)="a59fe43381b7a8f4b605fb386d2753d116179057545593e89fab5c528f0dc29bd3e968aa7e7c9af14feef0b717ffeae706168ff336b344ab1ca0a607133001da18a7f3276f82702e29109484975c7d7dd8c7213f22cc209fb563df468d599b4b17fdb143aea49dd413dd3643255e915941a12c1cfe1ece5555e9824254674d25e74bb0078c7db2b62b6d443469b0a2fb5cd85b58c8ec2375c649036a1bdacdb1327ecfe70cb195cc8817888d5b6ee77acf9c314d39baf575ef88ad774c6781327346e32eb50448fe26b9e13dd3342ece82c7f13c148722c0761592a7da3249332f01048da639b1e63ba7d62ada7d49", 0xef, 0x21c}, {&(0x7f0000000540)="a406ec163fd9", 0x6, 0x4}, {&(0x7f0000000580)="5b5d1d660f7be89299e38c7e5f92531e1b95898e10568163925f04c11e3ccda8692052e733a1b53d0f4d001644895305e2e1e48d2cbda667d59d3acc539cdda5d41323e8ac964217cbc3a546bee3ffebe0bc97b4095433572eeb723e38c163013147c9a1a899abb5115213831eac7ff098ca83f014e64583f43402a241765cd066e6681a3856b5ff184f7ee413f2213a9e4b22d9b8e5e8dc5feecefa8f43b65922a9acd41f2157f42831c470a6f0d7040804db610e5faeadb444c5f1d2bb7146bb283139f14fb587b8c66a25b6a19e23558f82a2472e874e4534b61a560532df382ea6dbcc2cb1b17b53afca7c75727e06a7d2e8", 0xf4, 0x1}], 0x8000, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) 16:57:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000900)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x80, r1, 0x35, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fff}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}]}, 0x80}, 0x1, 0x0, 0x0, 0x4}, 0x40) 16:57:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) [ 1362.547832] XFS (loop1): unknown mount option [seclabel]. 16:57:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a0") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4, 0x6, &(0x7f0000000680)=[{&(0x7f0000000200)="3d1d056340c3daea74534c9240b0f4bb229ce0d105", 0x15, 0x5a}, {&(0x7f0000000240)="3594ac1907b622dbb01b542874e119e3199ca18890c6d154da8e69df474748601e81e9e88d7f7d3874f44f9d06cb113793cdf148056e8f0acd711e65f78e9a0386cddaa92584a144dd22f777771538157106b6352140e6c69b9cd9c0ae209c63ed94d70a5a49f56a0c33aa06ab7554148d6a48884563ae018a65425b21a9876546f23d3eccef4fd6b353c53d0de96f21cf78cb0bf03b049ac2ca2e16f0d77c5d4b698af8c0aebfd16df465709f24de642729ec45b96527b7b7c76c20fa3c42f32dafdc37af01", 0xc6, 0x42}, {&(0x7f0000000340)="471712c44ed372aab00159fdc8411aad20996cad4aa0b373af4bd29db6e85d913586360dd61decd94e63123d2820f0f7576e0fd8f6d72151465c4b223689240d0132bc4969a13d3b504438b26fbe706d5047837c8d4d4a7b1105e8988e13f5cab00be565b79a09d748097c9b7a71e5d8cdf5ecac8968500de3a04b14f8b02f3f5bdb93709544a58257f2babad4ea65e58a1858ac0c63d9f3f35d12f5cd3ec2a1f42ba9195ab510be3ab26686db287a526db58e246cee3f16e84f12ff848e41d338c95dc7929e94a16f101286f7bb45ec16b0", 0xd2, 0x8}, {&(0x7f0000000440)="a59fe43381b7a8f4b605fb386d2753d116179057545593e89fab5c528f0dc29bd3e968aa7e7c9af14feef0b717ffeae706168ff336b344ab1ca0a607133001da18a7f3276f82702e29109484975c7d7dd8c7213f22cc209fb563df468d599b4b17fdb143aea49dd413dd3643255e915941a12c1cfe1ece5555e9824254674d25e74bb0078c7db2b62b6d443469b0a2fb5cd85b58c8ec2375c649036a1bdacdb1327ecfe70cb195cc8817888d5b6ee77acf9c314d39baf575ef88ad774c6781327346e32eb50448fe26b9e13dd3342ece82c7f13c148722c0761592a7da3249332f01048da639b1e63ba7d62ada7d49", 0xef, 0x21c}, {&(0x7f0000000540)="a406ec163fd9", 0x6, 0x4}, {&(0x7f0000000580)="5b5d1d660f7be89299e38c7e5f92531e1b95898e10568163925f04c11e3ccda8692052e733a1b53d0f4d001644895305e2e1e48d2cbda667d59d3acc539cdda5d41323e8ac964217cbc3a546bee3ffebe0bc97b4095433572eeb723e38c163013147c9a1a899abb5115213831eac7ff098ca83f014e64583f43402a241765cd066e6681a3856b5ff184f7ee413f2213a9e4b22d9b8e5e8dc5feecefa8f43b65922a9acd41f2157f42831c470a6f0d7040804db610e5faeadb444c5f1d2bb7146bb283139f14fb587b8c66a25b6a19e23558f82a2472e874e4534b61a560532df382ea6dbcc2cb1b17b53afca7c75727e06a7d2e8", 0xf4, 0x1}], 0x8000, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) [ 1362.680555] XFS (loop2): Invalid superblock magic number 16:57:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) 16:57:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:57:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) [ 1362.796133] XFS (loop1): unknown mount option [seclabel]. 16:57:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x5421, 0x0) 16:57:16 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000900)='./file0\x00', 0x0, 0xf2, 0x0, 0x0, 0x0) r2 = dup(r0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0x80045500, &(0x7f0000000000)) 16:57:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a0") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4, 0x6, &(0x7f0000000680)=[{&(0x7f0000000200)="3d1d056340c3daea74534c9240b0f4bb229ce0d105", 0x15, 0x5a}, {&(0x7f0000000240)="3594ac1907b622dbb01b542874e119e3199ca18890c6d154da8e69df474748601e81e9e88d7f7d3874f44f9d06cb113793cdf148056e8f0acd711e65f78e9a0386cddaa92584a144dd22f777771538157106b6352140e6c69b9cd9c0ae209c63ed94d70a5a49f56a0c33aa06ab7554148d6a48884563ae018a65425b21a9876546f23d3eccef4fd6b353c53d0de96f21cf78cb0bf03b049ac2ca2e16f0d77c5d4b698af8c0aebfd16df465709f24de642729ec45b96527b7b7c76c20fa3c42f32dafdc37af01", 0xc6, 0x42}, {&(0x7f0000000340)="471712c44ed372aab00159fdc8411aad20996cad4aa0b373af4bd29db6e85d913586360dd61decd94e63123d2820f0f7576e0fd8f6d72151465c4b223689240d0132bc4969a13d3b504438b26fbe706d5047837c8d4d4a7b1105e8988e13f5cab00be565b79a09d748097c9b7a71e5d8cdf5ecac8968500de3a04b14f8b02f3f5bdb93709544a58257f2babad4ea65e58a1858ac0c63d9f3f35d12f5cd3ec2a1f42ba9195ab510be3ab26686db287a526db58e246cee3f16e84f12ff848e41d338c95dc7929e94a16f101286f7bb45ec16b0", 0xd2, 0x8}, {&(0x7f0000000440)="a59fe43381b7a8f4b605fb386d2753d116179057545593e89fab5c528f0dc29bd3e968aa7e7c9af14feef0b717ffeae706168ff336b344ab1ca0a607133001da18a7f3276f82702e29109484975c7d7dd8c7213f22cc209fb563df468d599b4b17fdb143aea49dd413dd3643255e915941a12c1cfe1ece5555e9824254674d25e74bb0078c7db2b62b6d443469b0a2fb5cd85b58c8ec2375c649036a1bdacdb1327ecfe70cb195cc8817888d5b6ee77acf9c314d39baf575ef88ad774c6781327346e32eb50448fe26b9e13dd3342ece82c7f13c148722c0761592a7da3249332f01048da639b1e63ba7d62ada7d49", 0xef, 0x21c}, {&(0x7f0000000540)="a406ec163fd9", 0x6, 0x4}, {&(0x7f0000000580)="5b5d1d660f7be89299e38c7e5f92531e1b95898e10568163925f04c11e3ccda8692052e733a1b53d0f4d001644895305e2e1e48d2cbda667d59d3acc539cdda5d41323e8ac964217cbc3a546bee3ffebe0bc97b4095433572eeb723e38c163013147c9a1a899abb5115213831eac7ff098ca83f014e64583f43402a241765cd066e6681a3856b5ff184f7ee413f2213a9e4b22d9b8e5e8dc5feecefa8f43b65922a9acd41f2157f42831c470a6f0d7040804db610e5faeadb444c5f1d2bb7146bb283139f14fb587b8c66a25b6a19e23558f82a2472e874e4534b61a560532df382ea6dbcc2cb1b17b53afca7c75727e06a7d2e8", 0xf4, 0x1}], 0x8000, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) 16:57:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) 16:57:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 16:57:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x5450, 0x0) 16:57:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) 16:57:16 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x280, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000900)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1365.630684] XFS (loop1): unknown mount option [seclabel]. 16:57:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) 16:57:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x4, 0x6, &(0x7f0000000680)=[{&(0x7f0000000200)="3d1d056340c3daea74534c9240b0f4bb229ce0d105", 0x15, 0x5a}, {&(0x7f0000000240)="3594ac1907b622dbb01b542874e119e3199ca18890c6d154da8e69df474748601e81e9e88d7f7d3874f44f9d06cb113793cdf148056e8f0acd711e65f78e9a0386cddaa92584a144dd22f777771538157106b6352140e6c69b9cd9c0ae209c63ed94d70a5a49f56a0c33aa06ab7554148d6a48884563ae018a65425b21a9876546f23d3eccef4fd6b353c53d0de96f21cf78cb0bf03b049ac2ca2e16f0d77c5d4b698af8c0aebfd16df465709f24de642729ec45b96527b7b7c76c20fa3c42f32dafdc37af01", 0xc6, 0x42}, {&(0x7f0000000340)="471712c44ed372aab00159fdc8411aad20996cad4aa0b373af4bd29db6e85d913586360dd61decd94e63123d2820f0f7576e0fd8f6d72151465c4b223689240d0132bc4969a13d3b504438b26fbe706d5047837c8d4d4a7b1105e8988e13f5cab00be565b79a09d748097c9b7a71e5d8cdf5ecac8968500de3a04b14f8b02f3f5bdb93709544a58257f2babad4ea65e58a1858ac0c63d9f3f35d12f5cd3ec2a1f42ba9195ab510be3ab26686db287a526db58e246cee3f16e84f12ff848e41d338c95dc7929e94a16f101286f7bb45ec16b0", 0xd2, 0x8}, {&(0x7f0000000440)="a59fe43381b7a8f4b605fb386d2753d116179057545593e89fab5c528f0dc29bd3e968aa7e7c9af14feef0b717ffeae706168ff336b344ab1ca0a607133001da18a7f3276f82702e29109484975c7d7dd8c7213f22cc209fb563df468d599b4b17fdb143aea49dd413dd3643255e915941a12c1cfe1ece5555e9824254674d25e74bb0078c7db2b62b6d443469b0a2fb5cd85b58c8ec2375c649036a1bdacdb1327ecfe70cb195cc8817888d5b6ee77acf9c314d39baf575ef88ad774c6781327346e32eb50448fe26b9e13dd3342ece82c7f13c148722c0761592a7da3249332f01048da639b1e63ba7d62ada7d49", 0xef, 0x21c}, {&(0x7f0000000540)="a406ec163fd9", 0x6, 0x4}, {&(0x7f0000000580)="5b5d1d660f7be89299e38c7e5f92531e1b95898e10568163925f04c11e3ccda8692052e733a1b53d0f4d001644895305e2e1e48d2cbda667d59d3acc539cdda5d41323e8ac964217cbc3a546bee3ffebe0bc97b4095433572eeb723e38c163013147c9a1a899abb5115213831eac7ff098ca83f014e64583f43402a241765cd066e6681a3856b5ff184f7ee413f2213a9e4b22d9b8e5e8dc5feecefa8f43b65922a9acd41f2157f42831c470a6f0d7040804db610e5faeadb444c5f1d2bb7146bb283139f14fb587b8c66a25b6a19e23558f82a2472e874e4534b61a560532df382ea6dbcc2cb1b17b53afca7c75727e06a7d2e8", 0xf4, 0x1}], 0x8000, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) 16:57:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 16:57:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) [ 1365.990694] XFS (loop2): Invalid superblock magic number 16:57:19 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x5451, 0x0) 16:57:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1810000000000000]}, 0x48) 16:57:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 16:57:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x4, 0x6, &(0x7f0000000680)=[{&(0x7f0000000200)="3d1d056340c3daea74534c9240b0f4bb229ce0d105", 0x15, 0x5a}, {&(0x7f0000000240)="3594ac1907b622dbb01b542874e119e3199ca18890c6d154da8e69df474748601e81e9e88d7f7d3874f44f9d06cb113793cdf148056e8f0acd711e65f78e9a0386cddaa92584a144dd22f777771538157106b6352140e6c69b9cd9c0ae209c63ed94d70a5a49f56a0c33aa06ab7554148d6a48884563ae018a65425b21a9876546f23d3eccef4fd6b353c53d0de96f21cf78cb0bf03b049ac2ca2e16f0d77c5d4b698af8c0aebfd16df465709f24de642729ec45b96527b7b7c76c20fa3c42f32dafdc37af01", 0xc6, 0x42}, {&(0x7f0000000340)="471712c44ed372aab00159fdc8411aad20996cad4aa0b373af4bd29db6e85d913586360dd61decd94e63123d2820f0f7576e0fd8f6d72151465c4b223689240d0132bc4969a13d3b504438b26fbe706d5047837c8d4d4a7b1105e8988e13f5cab00be565b79a09d748097c9b7a71e5d8cdf5ecac8968500de3a04b14f8b02f3f5bdb93709544a58257f2babad4ea65e58a1858ac0c63d9f3f35d12f5cd3ec2a1f42ba9195ab510be3ab26686db287a526db58e246cee3f16e84f12ff848e41d338c95dc7929e94a16f101286f7bb45ec16b0", 0xd2, 0x8}, {&(0x7f0000000440)="a59fe43381b7a8f4b605fb386d2753d116179057545593e89fab5c528f0dc29bd3e968aa7e7c9af14feef0b717ffeae706168ff336b344ab1ca0a607133001da18a7f3276f82702e29109484975c7d7dd8c7213f22cc209fb563df468d599b4b17fdb143aea49dd413dd3643255e915941a12c1cfe1ece5555e9824254674d25e74bb0078c7db2b62b6d443469b0a2fb5cd85b58c8ec2375c649036a1bdacdb1327ecfe70cb195cc8817888d5b6ee77acf9c314d39baf575ef88ad774c6781327346e32eb50448fe26b9e13dd3342ece82c7f13c148722c0761592a7da3249332f01048da639b1e63ba7d62ada7d49", 0xef, 0x21c}, {&(0x7f0000000540)="a406ec163fd9", 0x6, 0x4}, {&(0x7f0000000580)="5b5d1d660f7be89299e38c7e5f92531e1b95898e10568163925f04c11e3ccda8692052e733a1b53d0f4d001644895305e2e1e48d2cbda667d59d3acc539cdda5d41323e8ac964217cbc3a546bee3ffebe0bc97b4095433572eeb723e38c163013147c9a1a899abb5115213831eac7ff098ca83f014e64583f43402a241765cd066e6681a3856b5ff184f7ee413f2213a9e4b22d9b8e5e8dc5feecefa8f43b65922a9acd41f2157f42831c470a6f0d7040804db610e5faeadb444c5f1d2bb7146bb283139f14fb587b8c66a25b6a19e23558f82a2472e874e4534b61a560532df382ea6dbcc2cb1b17b53afca7c75727e06a7d2e8", 0xf4, 0x1}], 0x8000, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) 16:57:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000900)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0x48) 16:57:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x4, 0x6, &(0x7f0000000680)=[{&(0x7f0000000200)="3d1d056340c3daea74534c9240b0f4bb229ce0d105", 0x15, 0x5a}, {&(0x7f0000000240)="3594ac1907b622dbb01b542874e119e3199ca18890c6d154da8e69df474748601e81e9e88d7f7d3874f44f9d06cb113793cdf148056e8f0acd711e65f78e9a0386cddaa92584a144dd22f777771538157106b6352140e6c69b9cd9c0ae209c63ed94d70a5a49f56a0c33aa06ab7554148d6a48884563ae018a65425b21a9876546f23d3eccef4fd6b353c53d0de96f21cf78cb0bf03b049ac2ca2e16f0d77c5d4b698af8c0aebfd16df465709f24de642729ec45b96527b7b7c76c20fa3c42f32dafdc37af01", 0xc6, 0x42}, {&(0x7f0000000340)="471712c44ed372aab00159fdc8411aad20996cad4aa0b373af4bd29db6e85d913586360dd61decd94e63123d2820f0f7576e0fd8f6d72151465c4b223689240d0132bc4969a13d3b504438b26fbe706d5047837c8d4d4a7b1105e8988e13f5cab00be565b79a09d748097c9b7a71e5d8cdf5ecac8968500de3a04b14f8b02f3f5bdb93709544a58257f2babad4ea65e58a1858ac0c63d9f3f35d12f5cd3ec2a1f42ba9195ab510be3ab26686db287a526db58e246cee3f16e84f12ff848e41d338c95dc7929e94a16f101286f7bb45ec16b0", 0xd2, 0x8}, {&(0x7f0000000440)="a59fe43381b7a8f4b605fb386d2753d116179057545593e89fab5c528f0dc29bd3e968aa7e7c9af14feef0b717ffeae706168ff336b344ab1ca0a607133001da18a7f3276f82702e29109484975c7d7dd8c7213f22cc209fb563df468d599b4b17fdb143aea49dd413dd3643255e915941a12c1cfe1ece5555e9824254674d25e74bb0078c7db2b62b6d443469b0a2fb5cd85b58c8ec2375c649036a1bdacdb1327ecfe70cb195cc8817888d5b6ee77acf9c314d39baf575ef88ad774c6781327346e32eb50448fe26b9e13dd3342ece82c7f13c148722c0761592a7da3249332f01048da639b1e63ba7d62ada7d49", 0xef, 0x21c}, {&(0x7f0000000540)="a406ec163fd9", 0x6, 0x4}, {&(0x7f0000000580)="5b5d1d660f7be89299e38c7e5f92531e1b95898e10568163925f04c11e3ccda8692052e733a1b53d0f4d001644895305e2e1e48d2cbda667d59d3acc539cdda5d41323e8ac964217cbc3a546bee3ffebe0bc97b4095433572eeb723e38c163013147c9a1a899abb5115213831eac7ff098ca83f014e64583f43402a241765cd066e6681a3856b5ff184f7ee413f2213a9e4b22d9b8e5e8dc5feecefa8f43b65922a9acd41f2157f42831c470a6f0d7040804db610e5faeadb444c5f1d2bb7146bb283139f14fb587b8c66a25b6a19e23558f82a2472e874e4534b61a560532df382ea6dbcc2cb1b17b53afca7c75727e06a7d2e8", 0xf4, 0x1}], 0x8000, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) [ 1368.792766] XFS (loop2): Invalid superblock magic number 16:57:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 16:57:19 executing program 3 (fault-call:6 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:57:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x5452, 0x0) 16:57:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000000911, &(0x7f0000000180)="0adc1f0500000000000000") r1 = gettid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) setpgid(r1, r1) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000900)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1369.234182] XFS (loop2): Invalid superblock magic number 16:57:22 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) 16:57:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', 0x0, 0x4, 0x6, &(0x7f0000000680)=[{&(0x7f0000000200)="3d1d056340c3daea74534c9240b0f4bb229ce0d105", 0x15, 0x5a}, {&(0x7f0000000240)="3594ac1907b622dbb01b542874e119e3199ca18890c6d154da8e69df474748601e81e9e88d7f7d3874f44f9d06cb113793cdf148056e8f0acd711e65f78e9a0386cddaa92584a144dd22f777771538157106b6352140e6c69b9cd9c0ae209c63ed94d70a5a49f56a0c33aa06ab7554148d6a48884563ae018a65425b21a9876546f23d3eccef4fd6b353c53d0de96f21cf78cb0bf03b049ac2ca2e16f0d77c5d4b698af8c0aebfd16df465709f24de642729ec45b96527b7b7c76c20fa3c42f32dafdc37af01", 0xc6, 0x42}, {&(0x7f0000000340)="471712c44ed372aab00159fdc8411aad20996cad4aa0b373af4bd29db6e85d913586360dd61decd94e63123d2820f0f7576e0fd8f6d72151465c4b223689240d0132bc4969a13d3b504438b26fbe706d5047837c8d4d4a7b1105e8988e13f5cab00be565b79a09d748097c9b7a71e5d8cdf5ecac8968500de3a04b14f8b02f3f5bdb93709544a58257f2babad4ea65e58a1858ac0c63d9f3f35d12f5cd3ec2a1f42ba9195ab510be3ab26686db287a526db58e246cee3f16e84f12ff848e41d338c95dc7929e94a16f101286f7bb45ec16b0", 0xd2, 0x8}, {&(0x7f0000000440)="a59fe43381b7a8f4b605fb386d2753d116179057545593e89fab5c528f0dc29bd3e968aa7e7c9af14feef0b717ffeae706168ff336b344ab1ca0a607133001da18a7f3276f82702e29109484975c7d7dd8c7213f22cc209fb563df468d599b4b17fdb143aea49dd413dd3643255e915941a12c1cfe1ece5555e9824254674d25e74bb0078c7db2b62b6d443469b0a2fb5cd85b58c8ec2375c649036a1bdacdb1327ecfe70cb195cc8817888d5b6ee77acf9c314d39baf575ef88ad774c6781327346e32eb50448fe26b9e13dd3342ece82c7f13c148722c0761592a7da3249332f01048da639b1e63ba7d62ada7d49", 0xef, 0x21c}, {&(0x7f0000000540)="a406ec163fd9", 0x6, 0x4}, {&(0x7f0000000580)="5b5d1d660f7be89299e38c7e5f92531e1b95898e10568163925f04c11e3ccda8692052e733a1b53d0f4d001644895305e2e1e48d2cbda667d59d3acc539cdda5d41323e8ac964217cbc3a546bee3ffebe0bc97b4095433572eeb723e38c163013147c9a1a899abb5115213831eac7ff098ca83f014e64583f43402a241765cd066e6681a3856b5ff184f7ee413f2213a9e4b22d9b8e5e8dc5feecefa8f43b65922a9acd41f2157f42831c470a6f0d7040804db610e5faeadb444c5f1d2bb7146bb283139f14fb587b8c66a25b6a19e23558f82a2472e874e4534b61a560532df382ea6dbcc2cb1b17b53afca7c75727e06a7d2e8", 0xf4, 0x1}], 0x8000, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) 16:57:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:57:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x5460, 0x0) 16:57:22 executing program 2 (fault-call:5 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) 16:57:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', 0x0, 0x4, 0x6, &(0x7f0000000680)=[{&(0x7f0000000200)="3d1d056340c3daea74534c9240b0f4bb229ce0d105", 0x15, 0x5a}, {&(0x7f0000000240)="3594ac1907b622dbb01b542874e119e3199ca18890c6d154da8e69df474748601e81e9e88d7f7d3874f44f9d06cb113793cdf148056e8f0acd711e65f78e9a0386cddaa92584a144dd22f777771538157106b6352140e6c69b9cd9c0ae209c63ed94d70a5a49f56a0c33aa06ab7554148d6a48884563ae018a65425b21a9876546f23d3eccef4fd6b353c53d0de96f21cf78cb0bf03b049ac2ca2e16f0d77c5d4b698af8c0aebfd16df465709f24de642729ec45b96527b7b7c76c20fa3c42f32dafdc37af01", 0xc6, 0x42}, {&(0x7f0000000340)="471712c44ed372aab00159fdc8411aad20996cad4aa0b373af4bd29db6e85d913586360dd61decd94e63123d2820f0f7576e0fd8f6d72151465c4b223689240d0132bc4969a13d3b504438b26fbe706d5047837c8d4d4a7b1105e8988e13f5cab00be565b79a09d748097c9b7a71e5d8cdf5ecac8968500de3a04b14f8b02f3f5bdb93709544a58257f2babad4ea65e58a1858ac0c63d9f3f35d12f5cd3ec2a1f42ba9195ab510be3ab26686db287a526db58e246cee3f16e84f12ff848e41d338c95dc7929e94a16f101286f7bb45ec16b0", 0xd2, 0x8}, {&(0x7f0000000440)="a59fe43381b7a8f4b605fb386d2753d116179057545593e89fab5c528f0dc29bd3e968aa7e7c9af14feef0b717ffeae706168ff336b344ab1ca0a607133001da18a7f3276f82702e29109484975c7d7dd8c7213f22cc209fb563df468d599b4b17fdb143aea49dd413dd3643255e915941a12c1cfe1ece5555e9824254674d25e74bb0078c7db2b62b6d443469b0a2fb5cd85b58c8ec2375c649036a1bdacdb1327ecfe70cb195cc8817888d5b6ee77acf9c314d39baf575ef88ad774c6781327346e32eb50448fe26b9e13dd3342ece82c7f13c148722c0761592a7da3249332f01048da639b1e63ba7d62ada7d49", 0xef, 0x21c}, {&(0x7f0000000540)="a406ec163fd9", 0x6, 0x4}, {&(0x7f0000000580)="5b5d1d660f7be89299e38c7e5f92531e1b95898e10568163925f04c11e3ccda8692052e733a1b53d0f4d001644895305e2e1e48d2cbda667d59d3acc539cdda5d41323e8ac964217cbc3a546bee3ffebe0bc97b4095433572eeb723e38c163013147c9a1a899abb5115213831eac7ff098ca83f014e64583f43402a241765cd066e6681a3856b5ff184f7ee413f2213a9e4b22d9b8e5e8dc5feecefa8f43b65922a9acd41f2157f42831c470a6f0d7040804db610e5faeadb444c5f1d2bb7146bb283139f14fb587b8c66a25b6a19e23558f82a2472e874e4534b61a560532df382ea6dbcc2cb1b17b53afca7c75727e06a7d2e8", 0xf4, 0x1}], 0x8000, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) 16:57:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x48) 16:57:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x40049409, 0x0) 16:57:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', 0x0, 0x4, 0x6, &(0x7f0000000680)=[{&(0x7f0000000200)="3d1d056340c3daea74534c9240b0f4bb229ce0d105", 0x15, 0x5a}, {&(0x7f0000000240)="3594ac1907b622dbb01b542874e119e3199ca18890c6d154da8e69df474748601e81e9e88d7f7d3874f44f9d06cb113793cdf148056e8f0acd711e65f78e9a0386cddaa92584a144dd22f777771538157106b6352140e6c69b9cd9c0ae209c63ed94d70a5a49f56a0c33aa06ab7554148d6a48884563ae018a65425b21a9876546f23d3eccef4fd6b353c53d0de96f21cf78cb0bf03b049ac2ca2e16f0d77c5d4b698af8c0aebfd16df465709f24de642729ec45b96527b7b7c76c20fa3c42f32dafdc37af01", 0xc6, 0x42}, {&(0x7f0000000340)="471712c44ed372aab00159fdc8411aad20996cad4aa0b373af4bd29db6e85d913586360dd61decd94e63123d2820f0f7576e0fd8f6d72151465c4b223689240d0132bc4969a13d3b504438b26fbe706d5047837c8d4d4a7b1105e8988e13f5cab00be565b79a09d748097c9b7a71e5d8cdf5ecac8968500de3a04b14f8b02f3f5bdb93709544a58257f2babad4ea65e58a1858ac0c63d9f3f35d12f5cd3ec2a1f42ba9195ab510be3ab26686db287a526db58e246cee3f16e84f12ff848e41d338c95dc7929e94a16f101286f7bb45ec16b0", 0xd2, 0x8}, {&(0x7f0000000440)="a59fe43381b7a8f4b605fb386d2753d116179057545593e89fab5c528f0dc29bd3e968aa7e7c9af14feef0b717ffeae706168ff336b344ab1ca0a607133001da18a7f3276f82702e29109484975c7d7dd8c7213f22cc209fb563df468d599b4b17fdb143aea49dd413dd3643255e915941a12c1cfe1ece5555e9824254674d25e74bb0078c7db2b62b6d443469b0a2fb5cd85b58c8ec2375c649036a1bdacdb1327ecfe70cb195cc8817888d5b6ee77acf9c314d39baf575ef88ad774c6781327346e32eb50448fe26b9e13dd3342ece82c7f13c148722c0761592a7da3249332f01048da639b1e63ba7d62ada7d49", 0xef, 0x21c}, {&(0x7f0000000540)="a406ec163fd9", 0x6, 0x4}, {&(0x7f0000000580)="5b5d1d660f7be89299e38c7e5f92531e1b95898e10568163925f04c11e3ccda8692052e733a1b53d0f4d001644895305e2e1e48d2cbda667d59d3acc539cdda5d41323e8ac964217cbc3a546bee3ffebe0bc97b4095433572eeb723e38c163013147c9a1a899abb5115213831eac7ff098ca83f014e64583f43402a241765cd066e6681a3856b5ff184f7ee413f2213a9e4b22d9b8e5e8dc5feecefa8f43b65922a9acd41f2157f42831c470a6f0d7040804db610e5faeadb444c5f1d2bb7146bb283139f14fb587b8c66a25b6a19e23558f82a2472e874e4534b61a560532df382ea6dbcc2cb1b17b53afca7c75727e06a7d2e8", 0xf4, 0x1}], 0x8000, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) 16:57:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x2, 0x0) 16:57:25 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}, 0x48) 16:57:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x4, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000680)=[{&(0x7f0000000200)="3d1d056340c3daea74534c9240b0f4bb229ce0d105", 0x15, 0x5a}, {&(0x7f0000000240)="3594ac1907b622dbb01b542874e119e3199ca18890c6d154da8e69df474748601e81e9e88d7f7d3874f44f9d06cb113793cdf148056e8f0acd711e65f78e9a0386cddaa92584a144dd22f777771538157106b6352140e6c69b9cd9c0ae209c63ed94d70a5a49f56a0c33aa06ab7554148d6a48884563ae018a65425b21a9876546f23d3eccef4fd6b353c53d0de96f21cf78cb0bf03b049ac2ca2e16f0d77c5d4b698af8c0aebfd16df465709f24de642729ec45b96527b7b7c76c20fa3c42f32dafdc37af01", 0xc6, 0x42}, {&(0x7f0000000340)="471712c44ed372aab00159fdc8411aad20996cad4aa0b373af4bd29db6e85d913586360dd61decd94e63123d2820f0f7576e0fd8f6d72151465c4b223689240d0132bc4969a13d3b504438b26fbe706d5047837c8d4d4a7b1105e8988e13f5cab00be565b79a09d748097c9b7a71e5d8cdf5ecac8968500de3a04b14f8b02f3f5bdb93709544a58257f2babad4ea65e58a1858ac0c63d9f3f35d12f5cd3ec2a1f42ba9195ab510be3ab26686db287a526db58e246cee3f16e84f12ff848e41d338c95dc7929e94a16f101286f7bb45ec16b0", 0xd2, 0x8}, {&(0x7f0000000440)="a59fe43381b7a8f4b605fb386d2753d116179057545593e89fab5c528f0dc29bd3e968aa7e7c9af14feef0b717ffeae706168ff336b344ab1ca0a607133001da18a7f3276f82702e29109484975c7d7dd8c7213f22cc209fb563df468d599b4b17fdb143aea49dd413dd3643255e915941a12c1cfe1ece5555e9824254674d25e74bb0078c7db2b62b6d443469b0a2fb5cd85b58c8ec2375c649036a1bdacdb1327ecfe70cb195cc8817888d5b6ee77acf9c314d39baf575ef88ad774c6781327346e32eb50448fe26b9e13dd3342ece82c7f13c148722c0761592a7da3249332f01048da639b1e63ba7d62ada7d49", 0xef, 0x21c}, {&(0x7f0000000540)="a406ec163fd9", 0x6, 0x4}, {&(0x7f0000000580)="5b5d1d660f7be89299e38c7e5f92531e1b95898e10568163925f04c11e3ccda8692052e733a1b53d0f4d001644895305e2e1e48d2cbda667d59d3acc539cdda5d41323e8ac964217cbc3a546bee3ffebe0bc97b4095433572eeb723e38c163013147c9a1a899abb5115213831eac7ff098ca83f014e64583f43402a241765cd066e6681a3856b5ff184f7ee413f2213a9e4b22d9b8e5e8dc5feecefa8f43b65922a9acd41f2157f42831c470a6f0d7040804db610e5faeadb444c5f1d2bb7146bb283139f14fb587b8c66a25b6a19e23558f82a2472e874e4534b61a560532df382ea6dbcc2cb1b17b53afca7c75727e06a7d2e8", 0xf4, 0x1}], 0x8000, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) 16:57:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x4004ae8b, 0x0) 16:57:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x48) [ 1374.803813] XFS (loop1): unknown mount option [seclabel]. 16:57:25 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) 16:57:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}, 0x48) 16:57:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x5421, 0x0) 16:57:25 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 1375.138616] XFS (loop1): unknown mount option [seclabel]. 16:57:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0xff03, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)={[{@wsync='wsync'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@euid_gt={'euid>'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, '\x12userwlan0@'}}, {@euid_eq={'euid'}}]}) 16:57:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x4004ae99, 0x0) 16:57:26 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x48) 16:57:26 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000]}, 0x48) [ 1375.318535] XFS (loop1): unknown mount option [seclabel]. 16:57:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x40000, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:26 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa00000000000000]}, 0x48) 16:57:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x5450, 0x0) 16:57:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x4020940d, 0x0) 16:57:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0xeffdffff, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1375.677347] XFS (loop1): Invalid superblock magic number 16:57:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 16:57:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x5451, 0x0) 16:57:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x4048ae9b, 0x0) 16:57:28 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0xff030000, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:29 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) [ 1378.445240] XFS (loop1): Invalid superblock magic number 16:57:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x5452, 0x0) 16:57:29 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 16:57:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0xfffffdef, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x4090ae82, 0x0) 16:57:29 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) [ 1378.885827] XFS (loop1): Invalid superblock magic number 16:57:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x5460, 0x0) 16:57:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0xffffff7f, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x5460, 0x0) 16:57:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x4138ae84, 0x0) 16:57:32 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) 16:57:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x4000000000000, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:32 executing program 1 (fault-call:2 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x40049409, 0x0) [ 1381.376133] FAULT_INJECTION: forcing a failure. [ 1381.376133] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.423312] CPU: 1 PID: 7179 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1381.430548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1381.439909] Call Trace: [ 1381.442529] dump_stack+0x172/0x1f0 [ 1381.446183] should_fail.cold+0xa/0x1b [ 1381.450090] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1381.455209] ? lock_downgrade+0x810/0x810 [ 1381.459375] ? ___might_sleep+0x163/0x280 [ 1381.463537] __should_failslab+0x121/0x190 [ 1381.467786] should_failslab+0x9/0x14 [ 1381.471599] __kmalloc+0x2dc/0x740 [ 1381.475154] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1381.480699] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1381.480717] ? strnlen_user+0x1f0/0x280 [ 1381.480735] ? __x64_sys_memfd_create+0x13c/0x470 [ 1381.480758] __x64_sys_memfd_create+0x13c/0x470 [ 1381.499747] ? memfd_fcntl+0x1550/0x1550 [ 1381.503816] ? do_syscall_64+0x26/0x610 [ 1381.507804] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1381.512397] ? trace_hardirqs_on+0x67/0x230 [ 1381.516759] do_syscall_64+0x103/0x610 [ 1381.520662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1381.525856] RIP: 0033:0x457e29 [ 1381.529056] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1381.529065] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1381.529081] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1381.529090] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 16:57:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) [ 1381.529099] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1381.529111] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe22d94c6d4 [ 1381.584823] R13: 00000000004c67ae R14: 00000000004dbcc8 R15: 0000000000000004 16:57:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x4004ae8b, 0x0) 16:57:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x41a0ae8d, 0x0) 16:57:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0xeffdffff00000000, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:32 executing program 1 (fault-call:2 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) [ 1382.077582] FAULT_INJECTION: forcing a failure. [ 1382.077582] name failslab, interval 1, probability 0, space 0, times 0 [ 1382.089846] CPU: 0 PID: 7210 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1382.097085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1382.106449] Call Trace: [ 1382.106513] dump_stack+0x172/0x1f0 [ 1382.106547] should_fail.cold+0xa/0x1b [ 1382.106579] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1382.106597] ? lock_downgrade+0x810/0x810 [ 1382.106651] ? ___might_sleep+0x163/0x280 [ 1382.130106] __should_failslab+0x121/0x190 [ 1382.134347] should_failslab+0x9/0x14 [ 1382.138152] kmem_cache_alloc+0x2be/0x710 [ 1382.142301] ? __alloc_fd+0x430/0x530 [ 1382.146109] ? shmem_destroy_callback+0xc0/0xc0 [ 1382.150779] shmem_alloc_inode+0x1c/0x50 [ 1382.154846] alloc_inode+0x66/0x190 [ 1382.158956] new_inode_pseudo+0x19/0xf0 [ 1382.162944] new_inode+0x1f/0x40 [ 1382.166312] shmem_get_inode+0x84/0x780 [ 1382.170321] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1382.175175] shmem_file_setup+0x66/0x90 [ 1382.179159] __x64_sys_memfd_create+0x2a2/0x470 [ 1382.183836] ? memfd_fcntl+0x1550/0x1550 [ 1382.187925] ? do_syscall_64+0x26/0x610 [ 1382.191909] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1382.196508] ? trace_hardirqs_on+0x67/0x230 [ 1382.200835] do_syscall_64+0x103/0x610 [ 1382.204732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1382.209928] RIP: 0033:0x457e29 16:57:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0xff03000000000000, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1382.213129] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1382.232052] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1382.239758] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1382.247024] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1382.254301] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1382.261567] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe22d94c6d4 [ 1382.268835] R13: 00000000004c67ae R14: 00000000004dbcc8 R15: 0000000000000004 16:57:35 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) 16:57:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x8004ae98, 0x0) 16:57:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x4004ae99, 0x0) 16:57:35 executing program 1 (fault-call:2 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0xffffff7f00000000, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1384.439512] FAULT_INJECTION: forcing a failure. [ 1384.439512] name failslab, interval 1, probability 0, space 0, times 0 [ 1384.486260] CPU: 1 PID: 7225 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1384.493521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1384.493528] Call Trace: [ 1384.493557] dump_stack+0x172/0x1f0 [ 1384.493580] should_fail.cold+0xa/0x1b [ 1384.493599] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1384.493618] ? lock_downgrade+0x810/0x810 [ 1384.493637] ? ___might_sleep+0x163/0x280 [ 1384.493657] __should_failslab+0x121/0x190 [ 1384.493679] should_failslab+0x9/0x14 [ 1384.493699] kmem_cache_alloc+0x2be/0x710 [ 1384.538655] ? current_time+0x6b/0x140 [ 1384.542560] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1384.547674] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1384.552258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1384.557798] ? timespec64_trunc+0xf0/0x180 [ 1384.562041] __d_alloc+0x2e/0x8c0 [ 1384.565503] d_alloc_pseudo+0x1e/0x30 [ 1384.569308] alloc_file_pseudo+0xe2/0x280 [ 1384.573467] ? alloc_file+0x4d0/0x4d0 [ 1384.577291] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1384.582843] ? kasan_check_write+0x14/0x20 [ 1384.587090] __shmem_file_setup.part.0+0x108/0x2b0 [ 1384.592029] shmem_file_setup+0x66/0x90 [ 1384.596031] __x64_sys_memfd_create+0x2a2/0x470 [ 1384.600707] ? memfd_fcntl+0x1550/0x1550 [ 1384.604773] ? do_syscall_64+0x26/0x610 [ 1384.608762] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1384.613345] ? trace_hardirqs_on+0x67/0x230 [ 1384.617673] do_syscall_64+0x103/0x610 [ 1384.621569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1384.626774] RIP: 0033:0x457e29 [ 1384.629969] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1384.648870] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1384.656579] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1384.663845] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1384.671110] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1384.678374] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe22d94c6d4 16:57:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 1384.685639] R13: 00000000004c67ae R14: 00000000004dbcc8 R15: 0000000000000004 16:57:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x4020940d, 0x0) 16:57:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) 16:57:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x200009ee, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:35 executing program 1 (fault-call:2 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x48) [ 1385.074053] FAULT_INJECTION: forcing a failure. [ 1385.074053] name failslab, interval 1, probability 0, space 0, times 0 [ 1385.107652] CPU: 0 PID: 7256 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1385.114871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1385.114878] Call Trace: [ 1385.114907] dump_stack+0x172/0x1f0 [ 1385.114953] should_fail.cold+0xa/0x1b [ 1385.114976] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1385.114995] ? lock_downgrade+0x810/0x810 [ 1385.115018] ? ___might_sleep+0x163/0x280 [ 1385.134464] __should_failslab+0x121/0x190 [ 1385.134485] should_failslab+0x9/0x14 [ 1385.134501] kmem_cache_alloc+0x2be/0x710 [ 1385.134525] __alloc_file+0x27/0x300 [ 1385.143763] alloc_empty_file+0x72/0x170 [ 1385.143795] alloc_file+0x5e/0x4d0 [ 1385.143815] alloc_file_pseudo+0x189/0x280 [ 1385.143832] ? alloc_file+0x4d0/0x4d0 [ 1385.143853] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1385.143871] ? kasan_check_write+0x14/0x20 [ 1385.143892] __shmem_file_setup.part.0+0x108/0x2b0 [ 1385.143924] shmem_file_setup+0x66/0x90 [ 1385.185734] __x64_sys_memfd_create+0x2a2/0x470 [ 1385.185753] ? memfd_fcntl+0x1550/0x1550 [ 1385.185770] ? do_syscall_64+0x26/0x610 [ 1385.185786] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1385.185803] ? trace_hardirqs_on+0x67/0x230 [ 1385.185820] do_syscall_64+0x103/0x610 [ 1385.224379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1385.229567] RIP: 0033:0x457e29 [ 1385.232758] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1385.251666] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1385.251681] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1385.251691] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1385.251700] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1385.251709] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe22d94c6d4 [ 1385.251718] R13: 00000000004c67ae R14: 00000000004dbcc8 R15: 0000000000000004 16:57:38 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x48) 16:57:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x4048ae9b, 0x0) 16:57:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:38 executing program 1 (fault-call:2 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x8090ae81, 0x0) 16:57:38 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 1387.521266] FAULT_INJECTION: forcing a failure. [ 1387.521266] name failslab, interval 1, probability 0, space 0, times 0 [ 1387.582981] CPU: 1 PID: 7273 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1387.590214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1387.599565] Call Trace: [ 1387.599596] dump_stack+0x172/0x1f0 [ 1387.599620] should_fail.cold+0xa/0x1b [ 1387.599643] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1387.614832] ? lock_downgrade+0x810/0x810 [ 1387.619002] ? ___might_sleep+0x163/0x280 [ 1387.623159] __should_failslab+0x121/0x190 [ 1387.627407] should_failslab+0x9/0x14 [ 1387.631243] kmem_cache_alloc_trace+0x2d1/0x760 [ 1387.635971] ? ___might_sleep+0x163/0x280 [ 1387.640193] ? __might_sleep+0x95/0x190 [ 1387.644184] apparmor_file_alloc_security+0x112/0x940 [ 1387.649910] security_file_alloc+0x69/0xb0 [ 1387.654173] __alloc_file+0xac/0x300 [ 1387.657924] alloc_empty_file+0x72/0x170 [ 1387.662001] alloc_file+0x5e/0x4d0 [ 1387.665561] alloc_file_pseudo+0x189/0x280 [ 1387.669806] ? alloc_file+0x4d0/0x4d0 [ 1387.669829] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1387.669849] ? kasan_check_write+0x14/0x20 [ 1387.669883] __shmem_file_setup.part.0+0x108/0x2b0 [ 1387.688353] shmem_file_setup+0x66/0x90 [ 1387.692344] __x64_sys_memfd_create+0x2a2/0x470 [ 1387.697022] ? memfd_fcntl+0x1550/0x1550 [ 1387.701097] ? do_syscall_64+0x26/0x610 [ 1387.705084] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1387.705100] ? trace_hardirqs_on+0x67/0x230 [ 1387.705119] do_syscall_64+0x103/0x610 [ 1387.714042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1387.714055] RIP: 0033:0x457e29 [ 1387.714071] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1387.714079] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1387.714097] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1387.723149] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1387.723158] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1387.723167] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe22d94c6d4 16:57:38 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:38 executing program 1 (fault-call:2 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x48) [ 1387.723177] R13: 00000000004c67ae R14: 00000000004dbcc8 R15: 0000000000000004 16:57:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:38 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x8138ae83, 0x0) [ 1387.954110] FAULT_INJECTION: forcing a failure. [ 1387.954110] name failslab, interval 1, probability 0, space 0, times 0 [ 1387.991577] CPU: 0 PID: 7299 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 16:57:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1387.998851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1388.008204] Call Trace: [ 1388.008234] dump_stack+0x172/0x1f0 [ 1388.008259] should_fail.cold+0xa/0x1b [ 1388.008280] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1388.008299] ? lock_downgrade+0x810/0x810 [ 1388.008324] ? ___might_sleep+0x163/0x280 [ 1388.023511] __should_failslab+0x121/0x190 [ 1388.023532] should_failslab+0x9/0x14 [ 1388.023549] kmem_cache_alloc+0x2be/0x710 [ 1388.039873] ? notify_change+0x6d5/0xfb0 [ 1388.039890] ? do_sys_ftruncate+0x41e/0x550 [ 1388.039911] getname_flags+0xd6/0x5b0 [ 1388.048125] getname+0x1a/0x20 [ 1388.059883] do_sys_open+0x2c9/0x5d0 [ 1388.063640] ? filp_open+0x80/0x80 [ 1388.067192] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1388.071993] ? do_syscall_64+0x26/0x610 [ 1388.075984] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1388.081355] ? do_syscall_64+0x26/0x610 [ 1388.085342] __x64_sys_open+0x7e/0xc0 [ 1388.089153] do_syscall_64+0x103/0x610 [ 1388.093047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1388.098242] RIP: 0033:0x411f11 [ 1388.101443] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1388.120349] RSP: 002b:00007fe22d94ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1388.128070] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 1388.135350] RDX: 00007fe22d94bafa RSI: 0000000000000002 RDI: 00007fe22d94baf0 [ 1388.142641] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1388.150347] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1388.157618] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:57:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x4090ae82, 0x0) 16:57:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:39 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x48) 16:57:39 executing program 1 (fault-call:2 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x48) 16:57:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x81a0ae8c, 0x0) 16:57:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:39 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x48) [ 1388.489111] FAULT_INJECTION: forcing a failure. [ 1388.489111] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.610050] CPU: 0 PID: 7334 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1388.617282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1388.626639] Call Trace: [ 1388.629253] dump_stack+0x172/0x1f0 [ 1388.632898] should_fail.cold+0xa/0x1b [ 1388.636814] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1388.641947] ? lock_downgrade+0x810/0x810 [ 1388.646110] ? ___might_sleep+0x163/0x280 [ 1388.650274] __should_failslab+0x121/0x190 [ 1388.654529] should_failslab+0x9/0x14 [ 1388.658342] kmem_cache_alloc+0x2be/0x710 [ 1388.662498] ? __save_stack_trace+0x8a/0xf0 [ 1388.666840] __alloc_file+0x27/0x300 [ 1388.670564] alloc_empty_file+0x72/0x170 [ 1388.674630] path_openat+0xef/0x4690 [ 1388.678351] ? __lock_acquire+0x53b/0x4700 [ 1388.682586] ? getname+0x1a/0x20 [ 1388.685957] ? do_sys_open+0x2c9/0x5d0 [ 1388.689845] ? __x64_sys_open+0x7e/0xc0 [ 1388.693825] ? do_syscall_64+0x103/0x610 [ 1388.697889] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1388.703273] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1388.707955] ? __lock_is_held+0xb6/0x140 [ 1388.712022] ? find_held_lock+0x35/0x130 [ 1388.716091] ? find_held_lock+0x35/0x130 [ 1388.720152] ? __alloc_fd+0x430/0x530 [ 1388.723965] do_filp_open+0x1a1/0x280 [ 1388.727773] ? may_open_dev+0x100/0x100 [ 1388.731754] ? lock_downgrade+0x810/0x810 [ 1388.735911] ? kasan_check_read+0x11/0x20 [ 1388.740075] ? do_raw_spin_unlock+0x57/0x270 [ 1388.744487] ? _raw_spin_unlock+0x2d/0x50 [ 1388.749112] ? __alloc_fd+0x430/0x530 [ 1388.752941] do_sys_open+0x3fe/0x5d0 [ 1388.756665] ? filp_open+0x80/0x80 [ 1388.760233] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1388.764991] ? do_syscall_64+0x26/0x610 [ 1388.768974] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1388.774336] ? do_syscall_64+0x26/0x610 [ 1388.778315] __x64_sys_open+0x7e/0xc0 [ 1388.782117] do_syscall_64+0x103/0x610 [ 1388.786011] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1388.791198] RIP: 0033:0x411f11 16:57:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x4138ae84, 0x0) 16:57:39 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(0x0, 0xe) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 1388.794394] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1388.813292] RSP: 002b:00007fe22d94ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1388.821000] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 1388.828284] RDX: 00007fe22d94bafa RSI: 0000000000000002 RDI: 00007fe22d94baf0 [ 1388.835553] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1388.842834] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1388.850101] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:57:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x48) 16:57:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:39 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(0x0, 0xe) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 16:57:39 executing program 1 (fault-call:2 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x41a0ae8d, 0x0) [ 1389.258822] FAULT_INJECTION: forcing a failure. [ 1389.258822] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.272282] CPU: 1 PID: 7380 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1389.279490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1389.288844] Call Trace: [ 1389.291904] dump_stack+0x172/0x1f0 [ 1389.295594] should_fail.cold+0xa/0x1b [ 1389.299503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1389.304621] ? lock_downgrade+0x810/0x810 [ 1389.308789] ? ___might_sleep+0x163/0x280 [ 1389.312955] __should_failslab+0x121/0x190 [ 1389.317230] should_failslab+0x9/0x14 [ 1389.321039] kmem_cache_alloc+0x2be/0x710 [ 1389.325201] ? __save_stack_trace+0x8a/0xf0 [ 1389.329552] __alloc_file+0x27/0x300 [ 1389.333310] alloc_empty_file+0x72/0x170 [ 1389.337386] path_openat+0xef/0x4690 [ 1389.341113] ? __lock_acquire+0x53b/0x4700 [ 1389.345371] ? getname+0x1a/0x20 [ 1389.348746] ? do_sys_open+0x2c9/0x5d0 [ 1389.352649] ? __x64_sys_open+0x7e/0xc0 [ 1389.356637] ? do_syscall_64+0x103/0x610 [ 1389.360709] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1389.366097] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1389.370776] ? __lock_is_held+0xb6/0x140 [ 1389.374860] ? __alloc_fd+0x430/0x530 [ 1389.378675] do_filp_open+0x1a1/0x280 [ 1389.382490] ? may_open_dev+0x100/0x100 [ 1389.386481] ? lock_downgrade+0x810/0x810 [ 1389.390648] ? kasan_check_read+0x11/0x20 [ 1389.394813] ? do_raw_spin_unlock+0x57/0x270 [ 1389.399229] ? _raw_spin_unlock+0x2d/0x50 [ 1389.403393] ? __alloc_fd+0x430/0x530 [ 1389.407240] do_sys_open+0x3fe/0x5d0 [ 1389.410959] ? filp_open+0x80/0x80 [ 1389.414505] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1389.419265] ? do_syscall_64+0x26/0x610 [ 1389.423241] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1389.428604] ? do_syscall_64+0x26/0x610 [ 1389.432582] __x64_sys_open+0x7e/0xc0 [ 1389.436387] do_syscall_64+0x103/0x610 [ 1389.440277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1389.445472] RIP: 0033:0x411f11 [ 1389.448663] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1389.467559] RSP: 002b:00007fe22d94ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1389.475267] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 1389.482536] RDX: 00007fe22d94bafa RSI: 0000000000000002 RDI: 00007fe22d94baf0 [ 1389.489817] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1389.497104] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 16:57:40 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(0x0, 0xe) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 16:57:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa]}, 0x48) 16:57:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xc0045878, 0x0) [ 1389.504389] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:57:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) 16:57:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:40 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) 16:57:40 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x8004ae98, 0x0) 16:57:40 executing program 1 (fault-call:2 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xc0045878, 0x0) 16:57:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) 16:57:40 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="0272c0c2b32412d4a3aea2568093b57b0a5d0798d246f4eddaa3fd9506a48f90e08eea88") r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 16:57:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1390.075485] FAULT_INJECTION: forcing a failure. [ 1390.075485] name failslab, interval 1, probability 0, space 0, times 0 [ 1390.143612] CPU: 1 PID: 7429 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1390.150846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1390.160197] Call Trace: [ 1390.162836] dump_stack+0x172/0x1f0 [ 1390.166488] should_fail.cold+0xa/0x1b [ 1390.170397] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1390.175543] ? lock_downgrade+0x810/0x810 [ 1390.179706] ? ___might_sleep+0x163/0x280 [ 1390.183866] __should_failslab+0x121/0x190 [ 1390.188117] should_failslab+0x9/0x14 16:57:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) [ 1390.191929] kmem_cache_alloc_trace+0x2d1/0x760 [ 1390.196602] ? ___might_sleep+0x163/0x280 [ 1390.200763] ? __might_sleep+0x95/0x190 [ 1390.204768] apparmor_file_alloc_security+0x112/0x940 [ 1390.209986] security_file_alloc+0x69/0xb0 [ 1390.214251] __alloc_file+0xac/0x300 [ 1390.217979] alloc_empty_file+0x72/0x170 [ 1390.218004] path_openat+0xef/0x4690 [ 1390.225771] ? __lock_acquire+0x53b/0x4700 [ 1390.230014] ? getname+0x1a/0x20 [ 1390.233386] ? do_sys_open+0x2c9/0x5d0 [ 1390.237322] ? __x64_sys_open+0x7e/0xc0 16:57:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) [ 1390.241305] ? do_syscall_64+0x103/0x610 [ 1390.245406] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1390.250785] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1390.255488] ? __lock_is_held+0xb6/0x140 [ 1390.259581] ? __alloc_fd+0x430/0x530 [ 1390.263390] do_filp_open+0x1a1/0x280 [ 1390.267198] ? may_open_dev+0x100/0x100 [ 1390.271198] ? lock_downgrade+0x810/0x810 [ 1390.275356] ? kasan_check_read+0x11/0x20 [ 1390.275372] ? do_raw_spin_unlock+0x57/0x270 [ 1390.275388] ? _raw_spin_unlock+0x2d/0x50 [ 1390.288098] ? __alloc_fd+0x430/0x530 [ 1390.292461] do_sys_open+0x3fe/0x5d0 [ 1390.296185] ? filp_open+0x80/0x80 [ 1390.299741] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1390.304501] ? do_syscall_64+0x26/0x610 [ 1390.308487] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1390.313857] ? do_syscall_64+0x26/0x610 [ 1390.317838] __x64_sys_open+0x7e/0xc0 [ 1390.321665] do_syscall_64+0x103/0x610 [ 1390.325555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1390.330741] RIP: 0033:0x411f11 [ 1390.333940] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1390.352843] RSP: 002b:00007fe22d94ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1390.360551] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 1390.367911] RDX: 00007fe22d94bafa RSI: 0000000000000002 RDI: 00007fe22d94baf0 [ 1390.375186] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1390.382452] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 16:57:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1018]}, 0x48) 16:57:41 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1390.389713] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:57:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x8090ae81, 0x0) 16:57:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xc0189436, 0x0) 16:57:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:41 executing program 1 (fault-call:2 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1810]}, 0x48) 16:57:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 16:57:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x8138ae83, 0x0) 16:57:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xc018ae85, 0x0) 16:57:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 16:57:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1391.041006] FAULT_INJECTION: forcing a failure. [ 1391.041006] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.087876] CPU: 1 PID: 7475 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1391.095112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.104500] Call Trace: [ 1391.104546] dump_stack+0x172/0x1f0 [ 1391.104576] should_fail.cold+0xa/0x1b [ 1391.110783] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1391.119746] ? lock_downgrade+0x810/0x810 [ 1391.123912] ? ___might_sleep+0x163/0x280 [ 1391.128096] __should_failslab+0x121/0x190 [ 1391.128115] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1391.128133] should_failslab+0x9/0x14 [ 1391.137107] kmem_cache_alloc_trace+0x2d1/0x760 [ 1391.145565] ? lockdep_init_map+0x10c/0x5b0 [ 1391.145582] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1391.145599] __kthread_create_on_node+0xf2/0x460 [ 1391.159795] ? lock_acquire+0x16f/0x3f0 [ 1391.163775] ? kthread_parkme+0xb0/0xb0 [ 1391.167775] ? mutex_trylock+0x1e0/0x1e0 [ 1391.171842] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1391.176603] kthread_create_on_node+0xbb/0xf0 [ 1391.181101] ? __kthread_create_on_node+0x460/0x460 [ 1391.186139] ? lockdep_init_map+0x10c/0x5b0 [ 1391.190462] ? lockdep_init_map+0x10c/0x5b0 [ 1391.194794] lo_ioctl+0xafb/0x20d0 [ 1391.198337] ? lo_rw_aio+0x1530/0x1530 [ 1391.202245] blkdev_ioctl+0xee8/0x1c40 [ 1391.206133] ? blkpg_ioctl+0xa90/0xa90 [ 1391.210023] ? find_held_lock+0x35/0x130 [ 1391.214087] ? debug_check_no_obj_freed+0x200/0x464 [ 1391.219117] ? kasan_check_read+0x11/0x20 [ 1391.223264] ? __fget+0x340/0x540 [ 1391.226720] ? find_held_lock+0x35/0x130 [ 1391.230779] ? __fget+0x340/0x540 [ 1391.234241] block_ioctl+0xee/0x130 [ 1391.237866] ? blkdev_fallocate+0x410/0x410 [ 1391.242196] do_vfs_ioctl+0xd6e/0x1390 [ 1391.246088] ? ioctl_preallocate+0x210/0x210 [ 1391.250500] ? __fget+0x367/0x540 [ 1391.253957] ? iterate_fd+0x360/0x360 [ 1391.257762] ? do_sys_open+0x31d/0x5d0 [ 1391.261665] ? security_file_ioctl+0x93/0xc0 [ 1391.266078] ksys_ioctl+0xab/0xd0 [ 1391.269537] __x64_sys_ioctl+0x73/0xb0 [ 1391.273430] do_syscall_64+0x103/0x610 [ 1391.277334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1391.282524] RIP: 0033:0x457c97 [ 1391.285717] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1391.305083] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1391.312792] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1391.320061] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1391.327329] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 16:57:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x48) [ 1391.334612] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1391.341880] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:57:44 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:57:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x81a0ae8c, 0x0) 16:57:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x4, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xc020660b, 0x0) 16:57:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x48) 16:57:44 executing program 1 (fault-call:2 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1393.532936] FAULT_INJECTION: forcing a failure. [ 1393.532936] name failslab, interval 1, probability 0, space 0, times 0 [ 1393.544288] CPU: 0 PID: 7499 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1393.551483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1393.560839] Call Trace: [ 1393.563448] dump_stack+0x172/0x1f0 [ 1393.567096] should_fail.cold+0xa/0x1b [ 1393.570994] ? kernel_text_address+0x73/0xf0 [ 1393.575413] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1393.580554] ? unwind_get_return_address+0x61/0xa0 [ 1393.585518] ? __save_stack_trace+0x8a/0xf0 [ 1393.589859] __should_failslab+0x121/0x190 [ 1393.594111] should_failslab+0x9/0x14 [ 1393.597933] kmem_cache_alloc+0x47/0x710 [ 1393.602014] ? save_stack+0xa9/0xd0 [ 1393.605664] ? save_stack+0x45/0xd0 [ 1393.609364] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1393.614475] ? kasan_slab_alloc+0xf/0x20 [ 1393.614499] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 1393.614519] idr_get_free+0x425/0x8d0 [ 1393.614549] idr_alloc_u32+0x19e/0x330 [ 1393.614570] ? __fprop_inc_percpu_max+0x230/0x230 [ 1393.636776] ? __lock_is_held+0xb6/0x140 [ 1393.640837] ? check_preemption_disabled+0x48/0x290 [ 1393.645859] idr_alloc_cyclic+0x132/0x270 [ 1393.650016] ? idr_alloc+0x150/0x150 [ 1393.653765] __kernfs_new_node+0x171/0x690 [ 1393.658003] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1393.662774] ? __lock_acquire+0x53b/0x4700 [ 1393.667009] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1393.671508] ? __schedule+0x1387/0x1cc0 [ 1393.675498] kernfs_new_node+0x99/0x130 [ 1393.679475] kernfs_create_dir_ns+0x52/0x160 [ 1393.683908] internal_create_group+0x7f8/0xc40 [ 1393.688517] ? bd_set_size+0x89/0xb0 [ 1393.692242] ? remove_files.isra.0+0x190/0x190 [ 1393.696853] sysfs_create_group+0x20/0x30 [ 1393.701009] lo_ioctl+0xf8f/0x20d0 [ 1393.704553] ? lo_rw_aio+0x1530/0x1530 [ 1393.708443] blkdev_ioctl+0xee8/0x1c40 [ 1393.712334] ? blkpg_ioctl+0xa90/0xa90 [ 1393.716224] ? find_held_lock+0x35/0x130 [ 1393.720287] ? debug_check_no_obj_freed+0x200/0x464 [ 1393.725311] ? kasan_check_read+0x11/0x20 [ 1393.729460] ? __fget+0x340/0x540 [ 1393.732953] ? find_held_lock+0x35/0x130 [ 1393.737014] ? __fget+0x340/0x540 [ 1393.740954] block_ioctl+0xee/0x130 [ 1393.744583] ? blkdev_fallocate+0x410/0x410 [ 1393.748947] do_vfs_ioctl+0xd6e/0x1390 [ 1393.752839] ? ioctl_preallocate+0x210/0x210 [ 1393.757251] ? __fget+0x367/0x540 [ 1393.760708] ? iterate_fd+0x360/0x360 [ 1393.764511] ? do_sys_open+0x31d/0x5d0 [ 1393.768408] ? security_file_ioctl+0x93/0xc0 [ 1393.772818] ksys_ioctl+0xab/0xd0 [ 1393.776275] __x64_sys_ioctl+0x73/0xb0 [ 1393.780166] do_syscall_64+0x103/0x610 [ 1393.784061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1393.789261] RIP: 0033:0x457c97 [ 1393.792455] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1393.811353] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1393.819073] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1393.826351] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 16:57:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x48) [ 1393.833646] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1393.840908] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1393.848187] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:57:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0xff03, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xc0045878, 0x0) 16:57:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x48) 16:57:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x2) 16:57:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x40000, &(0x7f0000000e40)}], 0x500, 0x0) [ 1394.162424] XFS (loop1): Invalid superblock magic number 16:57:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0xeffdffff, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:47 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:57:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}, 0x48) 16:57:47 executing program 1 (fault-call:2 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xc0045878, 0x0) 16:57:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x3) [ 1396.615631] FAULT_INJECTION: forcing a failure. [ 1396.615631] name failslab, interval 1, probability 0, space 0, times 0 [ 1396.627093] CPU: 0 PID: 7559 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1396.634987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1396.644348] Call Trace: [ 1396.646968] dump_stack+0x172/0x1f0 [ 1396.650604] should_fail.cold+0xa/0x1b [ 1396.654496] ? kernel_text_address+0x73/0xf0 [ 1396.658907] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1396.664035] ? unwind_get_return_address+0x61/0xa0 [ 1396.668967] ? __save_stack_trace+0x8a/0xf0 [ 1396.673312] __should_failslab+0x121/0x190 [ 1396.677552] should_failslab+0x9/0x14 [ 1396.681353] kmem_cache_alloc+0x47/0x710 [ 1396.685414] ? save_stack+0xa9/0xd0 [ 1396.689040] ? save_stack+0x45/0xd0 [ 1396.692664] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1396.697770] ? kasan_slab_alloc+0xf/0x20 [ 1396.701835] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 1396.707476] idr_get_free+0x425/0x8d0 [ 1396.711294] idr_alloc_u32+0x19e/0x330 [ 1396.715194] ? __fprop_inc_percpu_max+0x230/0x230 [ 1396.720046] ? __lock_is_held+0xb6/0x140 [ 1396.724107] ? check_preemption_disabled+0x48/0x290 [ 1396.729140] idr_alloc_cyclic+0x132/0x270 [ 1396.733295] ? idr_alloc+0x150/0x150 [ 1396.737104] __kernfs_new_node+0x171/0x690 [ 1396.741348] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1396.746111] ? __lock_acquire+0x53b/0x4700 [ 1396.750367] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1396.754871] ? __schedule+0x1387/0x1cc0 [ 1396.758865] kernfs_new_node+0x99/0x130 [ 1396.762856] kernfs_create_dir_ns+0x52/0x160 [ 1396.767274] internal_create_group+0x7f8/0xc40 [ 1396.771855] ? bd_set_size+0x89/0xb0 [ 1396.775583] ? remove_files.isra.0+0x190/0x190 [ 1396.780198] sysfs_create_group+0x20/0x30 [ 1396.784367] lo_ioctl+0xf8f/0x20d0 [ 1396.787936] ? lo_rw_aio+0x1530/0x1530 [ 1396.791837] blkdev_ioctl+0xee8/0x1c40 [ 1396.795729] ? blkpg_ioctl+0xa90/0xa90 [ 1396.799618] ? find_held_lock+0x35/0x130 [ 1396.803685] ? debug_check_no_obj_freed+0x200/0x464 [ 1396.808720] ? kasan_check_read+0x11/0x20 [ 1396.812869] ? __fget+0x340/0x540 [ 1396.816321] ? find_held_lock+0x35/0x130 [ 1396.820382] ? __fget+0x340/0x540 [ 1396.823839] block_ioctl+0xee/0x130 [ 1396.827481] ? blkdev_fallocate+0x410/0x410 [ 1396.831805] do_vfs_ioctl+0xd6e/0x1390 [ 1396.835797] ? ioctl_preallocate+0x210/0x210 [ 1396.840203] ? __fget+0x367/0x540 [ 1396.843677] ? iterate_fd+0x360/0x360 [ 1396.847483] ? do_sys_open+0x31d/0x5d0 [ 1396.851382] ? security_file_ioctl+0x93/0xc0 [ 1396.855795] ksys_ioctl+0xab/0xd0 [ 1396.859250] __x64_sys_ioctl+0x73/0xb0 [ 1396.863159] do_syscall_64+0x103/0x610 [ 1396.867057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1396.872245] RIP: 0033:0x457c97 [ 1396.875457] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1396.894359] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1396.902080] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1396.909344] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 16:57:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}, 0x48) [ 1396.916608] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1396.923872] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1396.931140] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:57:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0xff030000, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x48) 16:57:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0xfffffdef, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa00]}, 0x48) 16:57:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x4) [ 1397.147177] XFS (loop1): Invalid superblock magic number 16:57:48 executing program 1 (fault-call:2 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1397.371681] FAULT_INJECTION: forcing a failure. [ 1397.371681] name failslab, interval 1, probability 0, space 0, times 0 [ 1397.383056] CPU: 0 PID: 7603 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1397.390266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1397.399622] Call Trace: [ 1397.399652] dump_stack+0x172/0x1f0 [ 1397.399679] should_fail.cold+0xa/0x1b [ 1397.405877] ? kernel_text_address+0x73/0xf0 [ 1397.414168] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1397.419279] ? __lock_is_held+0xb6/0x140 [ 1397.423343] ? check_preemption_disabled+0x48/0x290 [ 1397.428382] __should_failslab+0x121/0x190 [ 1397.432622] should_failslab+0x9/0x14 [ 1397.436427] kmem_cache_alloc+0x47/0x710 [ 1397.440501] ? save_stack+0xa9/0xd0 [ 1397.444124] ? save_stack+0x45/0xd0 [ 1397.447734] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1397.452840] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 1397.458484] idr_get_free+0x425/0x8d0 [ 1397.458513] idr_alloc_u32+0x19e/0x330 [ 1397.458533] ? __fprop_inc_percpu_max+0x230/0x230 [ 1397.458553] ? __lock_is_held+0xb6/0x140 [ 1397.458568] ? check_preemption_disabled+0x48/0x290 [ 1397.458588] idr_alloc_cyclic+0x132/0x270 [ 1397.458606] ? idr_alloc+0x150/0x150 [ 1397.458629] __kernfs_new_node+0x171/0x690 [ 1397.458645] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1397.458661] ? __lock_acquire+0x53b/0x4700 [ 1397.458675] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1397.458692] ? __schedule+0x1387/0x1cc0 [ 1397.509686] kernfs_new_node+0x99/0x130 [ 1397.513651] kernfs_create_dir_ns+0x52/0x160 [ 1397.518046] internal_create_group+0x7f8/0xc40 [ 1397.522612] ? bd_set_size+0x89/0xb0 [ 1397.526315] ? remove_files.isra.0+0x190/0x190 [ 1397.530888] sysfs_create_group+0x20/0x30 [ 1397.535024] lo_ioctl+0xf8f/0x20d0 [ 1397.538565] ? lo_rw_aio+0x1530/0x1530 [ 1397.542464] blkdev_ioctl+0xee8/0x1c40 [ 1397.546345] ? blkpg_ioctl+0xa90/0xa90 [ 1397.550215] ? find_held_lock+0x35/0x130 [ 1397.554262] ? debug_check_no_obj_freed+0x200/0x464 [ 1397.559280] ? kasan_check_read+0x11/0x20 [ 1397.563417] ? __fget+0x340/0x540 [ 1397.566854] ? find_held_lock+0x35/0x130 [ 1397.570898] ? __fget+0x340/0x540 [ 1397.574348] block_ioctl+0xee/0x130 [ 1397.577965] ? blkdev_fallocate+0x410/0x410 [ 1397.582273] do_vfs_ioctl+0xd6e/0x1390 [ 1397.586147] ? ioctl_preallocate+0x210/0x210 [ 1397.590556] ? __fget+0x367/0x540 [ 1397.593996] ? iterate_fd+0x360/0x360 [ 1397.597797] ? do_sys_open+0x31d/0x5d0 [ 1397.601674] ? security_file_ioctl+0x93/0xc0 [ 1397.606084] ksys_ioctl+0xab/0xd0 [ 1397.609524] __x64_sys_ioctl+0x73/0xb0 [ 1397.613398] do_syscall_64+0x103/0x610 [ 1397.617274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1397.622444] RIP: 0033:0x457c97 [ 1397.625622] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1397.644520] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1397.652223] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1397.659477] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1397.666728] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1397.673993] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1397.681244] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 [ 1397.741233] XFS (loop1): Invalid superblock magic number 16:57:50 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:57:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) 16:57:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0xffffff7f, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xc0189436, 0x0) 16:57:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x5) 16:57:50 executing program 1 (fault-call:2 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1399.662751] FAULT_INJECTION: forcing a failure. [ 1399.662751] name failslab, interval 1, probability 0, space 0, times 0 [ 1399.683238] CPU: 0 PID: 7628 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1399.690466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1399.699862] Call Trace: [ 1399.702469] dump_stack+0x172/0x1f0 [ 1399.706113] should_fail.cold+0xa/0x1b [ 1399.710046] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1399.715172] ? lock_downgrade+0x810/0x810 [ 1399.719332] ? ___might_sleep+0x163/0x280 [ 1399.723498] __should_failslab+0x121/0x190 [ 1399.727749] should_failslab+0x9/0x14 [ 1399.727766] kmem_cache_alloc+0x2be/0x710 [ 1399.727782] ? find_held_lock+0x35/0x130 [ 1399.735768] ? kernfs_activate+0x192/0x1f0 [ 1399.735788] __kernfs_new_node+0xef/0x690 [ 1399.735820] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1399.735834] ? lock_downgrade+0x810/0x810 [ 1399.735858] ? kasan_check_write+0x14/0x20 [ 1399.735878] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1399.766262] ? wait_for_completion+0x440/0x440 [ 1399.770835] kernfs_new_node+0x99/0x130 [ 1399.774811] __kernfs_create_file+0x51/0x340 [ 1399.779209] sysfs_add_file_mode_ns+0x222/0x560 [ 1399.783867] internal_create_group+0x35b/0xc40 [ 1399.788442] ? bd_set_size+0x89/0xb0 [ 1399.792178] ? remove_files.isra.0+0x190/0x190 [ 1399.792204] sysfs_create_group+0x20/0x30 [ 1399.800930] lo_ioctl+0xf8f/0x20d0 [ 1399.804496] ? lo_rw_aio+0x1530/0x1530 [ 1399.808397] blkdev_ioctl+0xee8/0x1c40 [ 1399.812290] ? blkpg_ioctl+0xa90/0xa90 [ 1399.816195] ? find_held_lock+0x35/0x130 [ 1399.820246] ? debug_check_no_obj_freed+0x200/0x464 [ 1399.825254] ? kasan_check_read+0x11/0x20 [ 1399.829403] ? __fget+0x340/0x540 [ 1399.832856] ? find_held_lock+0x35/0x130 [ 1399.836909] ? __fget+0x340/0x540 [ 1399.840366] block_ioctl+0xee/0x130 [ 1399.843980] ? blkdev_fallocate+0x410/0x410 [ 1399.848293] do_vfs_ioctl+0xd6e/0x1390 [ 1399.852168] ? ioctl_preallocate+0x210/0x210 [ 1399.856561] ? __fget+0x367/0x540 [ 1399.860004] ? iterate_fd+0x360/0x360 [ 1399.863850] ? do_sys_open+0x31d/0x5d0 [ 1399.867814] ? security_file_ioctl+0x93/0xc0 [ 1399.872226] ksys_ioctl+0xab/0xd0 [ 1399.875670] __x64_sys_ioctl+0x73/0xb0 [ 1399.879545] do_syscall_64+0x103/0x610 [ 1399.883426] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1399.888610] RIP: 0033:0x457c97 [ 1399.891801] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:57:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x4000000000000, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) [ 1399.910688] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1399.918412] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1399.925664] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1399.932916] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1399.940182] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1399.947433] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:57:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x9) 16:57:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 16:57:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xc018ae85, 0x0) 16:57:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0xeffdffff00000000, &(0x7f0000000e40)}], 0x500, 0x0) [ 1400.131400] XFS (loop1): Invalid superblock magic number 16:57:53 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) 16:57:53 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:57:53 executing program 1 (fault-call:2 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xc020660b, 0x0) 16:57:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0xff03000000000000, &(0x7f0000000e40)}], 0x500, 0x0) 16:57:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xc) [ 1402.709896] FAULT_INJECTION: forcing a failure. [ 1402.709896] name failslab, interval 1, probability 0, space 0, times 0 [ 1402.746849] CPU: 1 PID: 7689 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 16:57:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0xffffff7f00000000, &(0x7f0000000e40)}], 0x500, 0x0) [ 1402.754114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1402.763470] Call Trace: [ 1402.766078] dump_stack+0x172/0x1f0 [ 1402.769741] should_fail.cold+0xa/0x1b [ 1402.773685] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1402.778812] ? lock_downgrade+0x810/0x810 [ 1402.782988] ? ___might_sleep+0x163/0x280 [ 1402.787152] __should_failslab+0x121/0x190 [ 1402.791401] should_failslab+0x9/0x14 [ 1402.795223] kmem_cache_alloc+0x2be/0x710 [ 1402.799387] ? mark_held_locks+0xb1/0x100 [ 1402.803545] __kernfs_new_node+0xef/0x690 16:57:53 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) [ 1402.807702] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1402.812297] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1402.817072] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1402.821849] ? retint_kernel+0x2d/0x2d [ 1402.821875] kernfs_new_node+0x99/0x130 [ 1402.821898] __kernfs_create_file+0x51/0x340 [ 1402.829764] sysfs_add_file_mode_ns+0x222/0x560 [ 1402.838827] internal_create_group+0x35b/0xc40 [ 1402.843454] ? bd_set_size+0x89/0xb0 [ 1402.847200] ? remove_files.isra.0+0x190/0x190 [ 1402.851816] sysfs_create_group+0x20/0x30 [ 1402.855989] lo_ioctl+0xf8f/0x20d0 [ 1402.859991] ? lo_rw_aio+0x1530/0x1530 [ 1402.863882] blkdev_ioctl+0xee8/0x1c40 [ 1402.867757] ? blkpg_ioctl+0xa90/0xa90 [ 1402.871630] ? find_held_lock+0x35/0x130 [ 1402.875726] ? debug_check_no_obj_freed+0x200/0x464 [ 1402.875747] ? kasan_check_read+0x11/0x20 [ 1402.875763] ? __fget+0x340/0x540 [ 1402.884929] ? find_held_lock+0x35/0x130 [ 1402.884944] ? __fget+0x340/0x540 [ 1402.884963] block_ioctl+0xee/0x130 [ 1402.884976] ? blkdev_fallocate+0x410/0x410 [ 1402.884994] do_vfs_ioctl+0xd6e/0x1390 [ 1402.885013] ? ioctl_preallocate+0x210/0x210 [ 1402.885031] ? __fget+0x367/0x540 [ 1402.915627] ? iterate_fd+0x360/0x360 [ 1402.919429] ? do_sys_open+0x31d/0x5d0 [ 1402.923329] ? security_file_ioctl+0x93/0xc0 [ 1402.927727] ksys_ioctl+0xab/0xd0 [ 1402.931171] __x64_sys_ioctl+0x73/0xb0 [ 1402.935053] do_syscall_64+0x103/0x610 [ 1402.938963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1402.944150] RIP: 0033:0x457c97 [ 1402.947350] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1402.966249] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1402.973950] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1402.981218] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1402.988480] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1402.995745] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1403.003043] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:57:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x11) [ 1403.112133] XFS (loop1): Invalid superblock magic number 16:57:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x4}], 0x500, 0x0) 16:57:53 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) 16:57:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x2) 16:57:54 executing program 1 (fault-call:2 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1403.399473] FAULT_INJECTION: forcing a failure. [ 1403.399473] name failslab, interval 1, probability 0, space 0, times 0 [ 1403.472090] CPU: 1 PID: 7732 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1403.479320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1403.488689] Call Trace: [ 1403.491308] dump_stack+0x172/0x1f0 [ 1403.494972] should_fail.cold+0xa/0x1b [ 1403.498880] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1403.504009] ? lock_downgrade+0x810/0x810 [ 1403.508175] ? ___might_sleep+0x163/0x280 [ 1403.512341] __should_failslab+0x121/0x190 [ 1403.516579] should_failslab+0x9/0x14 [ 1403.520372] kmem_cache_alloc+0x2be/0x710 [ 1403.524507] ? lock_downgrade+0x810/0x810 [ 1403.528641] ? kasan_check_read+0x11/0x20 [ 1403.532779] __kernfs_new_node+0xef/0x690 [ 1403.536916] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1403.541694] ? wait_for_completion+0x440/0x440 [ 1403.546268] ? mutex_unlock+0xd/0x10 [ 1403.549970] ? kernfs_activate+0x192/0x1f0 [ 1403.554203] kernfs_new_node+0x99/0x130 [ 1403.558184] __kernfs_create_file+0x51/0x340 [ 1403.562586] sysfs_add_file_mode_ns+0x222/0x560 [ 1403.567246] internal_create_group+0x35b/0xc40 [ 1403.571817] ? bd_set_size+0x89/0xb0 [ 1403.575542] ? remove_files.isra.0+0x190/0x190 [ 1403.580131] sysfs_create_group+0x20/0x30 [ 1403.584272] lo_ioctl+0xf8f/0x20d0 [ 1403.587817] ? lo_rw_aio+0x1530/0x1530 [ 1403.591699] blkdev_ioctl+0xee8/0x1c40 [ 1403.595580] ? blkpg_ioctl+0xa90/0xa90 [ 1403.599460] ? find_held_lock+0x35/0x130 [ 1403.603511] ? debug_check_no_obj_freed+0x200/0x464 [ 1403.608518] ? kasan_check_read+0x11/0x20 [ 1403.612652] ? __fget+0x340/0x540 [ 1403.616110] ? find_held_lock+0x35/0x130 [ 1403.620157] ? __fget+0x340/0x540 [ 1403.623600] block_ioctl+0xee/0x130 [ 1403.627218] ? blkdev_fallocate+0x410/0x410 [ 1403.631540] do_vfs_ioctl+0xd6e/0x1390 [ 1403.635418] ? ioctl_preallocate+0x210/0x210 [ 1403.639820] ? __fget+0x367/0x540 [ 1403.643262] ? iterate_fd+0x360/0x360 [ 1403.647050] ? do_sys_open+0x31d/0x5d0 [ 1403.650953] ? security_file_ioctl+0x93/0xc0 [ 1403.655377] ksys_ioctl+0xab/0xd0 [ 1403.658845] __x64_sys_ioctl+0x73/0xb0 [ 1403.662729] do_syscall_64+0x103/0x610 [ 1403.666621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1403.671821] RIP: 0033:0x457c97 [ 1403.675002] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1403.693891] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1403.701603] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1403.708859] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1403.716114] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1403.723366] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1403.730620] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 [ 1403.834026] XFS (loop1): Invalid superblock magic number 16:57:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x18) 16:57:56 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) 16:57:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x3) 16:57:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0xff03}], 0x500, 0x0) 16:57:56 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:57:56 executing program 1 (fault-call:2 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:56 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) [ 1405.754404] FAULT_INJECTION: forcing a failure. [ 1405.754404] name failslab, interval 1, probability 0, space 0, times 0 [ 1405.800964] CPU: 0 PID: 7756 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1405.808177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1405.817534] Call Trace: [ 1405.820139] dump_stack+0x172/0x1f0 [ 1405.823794] should_fail.cold+0xa/0x1b [ 1405.827697] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1405.827720] ? lock_downgrade+0x810/0x810 [ 1405.836970] ? ___might_sleep+0x163/0x280 [ 1405.836990] __should_failslab+0x121/0x190 [ 1405.837010] should_failslab+0x9/0x14 [ 1405.837027] kmem_cache_alloc+0x2be/0x710 [ 1405.853319] ? lock_downgrade+0x810/0x810 [ 1405.857468] ? kasan_check_read+0x11/0x20 [ 1405.861655] __kernfs_new_node+0xef/0x690 [ 1405.865824] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1405.870584] ? wait_for_completion+0x440/0x440 [ 1405.875176] ? mutex_unlock+0xd/0x10 [ 1405.878903] ? kernfs_activate+0x192/0x1f0 [ 1405.883147] kernfs_new_node+0x99/0x130 [ 1405.887126] __kernfs_create_file+0x51/0x340 [ 1405.891542] sysfs_add_file_mode_ns+0x222/0x560 [ 1405.896223] internal_create_group+0x35b/0xc40 [ 1405.900808] ? bd_set_size+0x89/0xb0 [ 1405.904535] ? remove_files.isra.0+0x190/0x190 [ 1405.909146] sysfs_create_group+0x20/0x30 [ 1405.913301] lo_ioctl+0xf8f/0x20d0 [ 1405.916848] ? lo_rw_aio+0x1530/0x1530 [ 1405.920743] blkdev_ioctl+0xee8/0x1c40 [ 1405.924632] ? blkpg_ioctl+0xa90/0xa90 [ 1405.928526] ? find_held_lock+0x35/0x130 [ 1405.932592] ? debug_check_no_obj_freed+0x200/0x464 [ 1405.937612] ? kasan_check_read+0x11/0x20 [ 1405.941784] ? __fget+0x340/0x540 [ 1405.945242] ? find_held_lock+0x35/0x130 [ 1405.949304] ? __fget+0x340/0x540 [ 1405.952761] block_ioctl+0xee/0x130 [ 1405.956385] ? blkdev_fallocate+0x410/0x410 [ 1405.960707] do_vfs_ioctl+0xd6e/0x1390 [ 1405.964602] ? ioctl_preallocate+0x210/0x210 [ 1405.969019] ? __fget+0x367/0x540 [ 1405.972494] ? iterate_fd+0x360/0x360 [ 1405.976297] ? do_sys_open+0x31d/0x5d0 [ 1405.980196] ? security_file_ioctl+0x93/0xc0 [ 1405.984611] ksys_ioctl+0xab/0xd0 [ 1405.988071] __x64_sys_ioctl+0x73/0xb0 [ 1405.991970] do_syscall_64+0x103/0x610 [ 1405.996212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1406.001402] RIP: 0033:0x457c97 [ 1406.004595] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1406.023537] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1406.031262] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1406.038553] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 16:57:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x40000}], 0x500, 0x0) [ 1406.045817] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1406.053087] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1406.060371] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:57:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x29) 16:57:56 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) 16:57:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0xeffdffff}], 0x500, 0x0) [ 1406.253675] XFS (loop1): Invalid superblock magic number 16:57:57 executing program 1 (fault-call:2 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1406.419758] FAULT_INJECTION: forcing a failure. [ 1406.419758] name failslab, interval 1, probability 0, space 0, times 0 [ 1406.437177] CPU: 0 PID: 7833 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1406.444382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1406.453738] Call Trace: [ 1406.456343] dump_stack+0x172/0x1f0 [ 1406.459992] should_fail.cold+0xa/0x1b [ 1406.463887] ? fault_create_debugfs_attr+0x1e0/0x1e0 16:57:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x300) [ 1406.469012] ? lock_downgrade+0x810/0x810 [ 1406.473170] ? ___might_sleep+0x163/0x280 [ 1406.477333] __should_failslab+0x121/0x190 [ 1406.481580] should_failslab+0x9/0x14 [ 1406.485394] kmem_cache_alloc+0x2be/0x710 [ 1406.489542] ? lock_downgrade+0x810/0x810 [ 1406.493679] ? kasan_check_read+0x11/0x20 [ 1406.497834] __kernfs_new_node+0xef/0x690 [ 1406.501983] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1406.506742] ? wait_for_completion+0x440/0x440 [ 1406.511315] ? mutex_unlock+0xd/0x10 [ 1406.515018] ? kernfs_activate+0x192/0x1f0 [ 1406.519253] kernfs_new_node+0x99/0x130 [ 1406.523217] __kernfs_create_file+0x51/0x340 [ 1406.527620] sysfs_add_file_mode_ns+0x222/0x560 [ 1406.532282] internal_create_group+0x35b/0xc40 [ 1406.536850] ? bd_set_size+0x89/0xb0 [ 1406.540554] ? remove_files.isra.0+0x190/0x190 [ 1406.545154] sysfs_create_group+0x20/0x30 [ 1406.549304] lo_ioctl+0xf8f/0x20d0 [ 1406.552834] ? lo_rw_aio+0x1530/0x1530 [ 1406.556712] blkdev_ioctl+0xee8/0x1c40 [ 1406.560587] ? blkpg_ioctl+0xa90/0xa90 [ 1406.564466] ? find_held_lock+0x35/0x130 [ 1406.568546] ? debug_check_no_obj_freed+0x200/0x464 [ 1406.573566] ? kasan_check_read+0x11/0x20 [ 1406.577700] ? __fget+0x340/0x540 [ 1406.581140] ? find_held_lock+0x35/0x130 [ 1406.585189] ? __fget+0x340/0x540 [ 1406.588643] block_ioctl+0xee/0x130 [ 1406.592268] ? blkdev_fallocate+0x410/0x410 [ 1406.596586] do_vfs_ioctl+0xd6e/0x1390 [ 1406.600466] ? ioctl_preallocate+0x210/0x210 [ 1406.604878] ? __fget+0x367/0x540 [ 1406.608319] ? iterate_fd+0x360/0x360 [ 1406.612107] ? do_sys_open+0x31d/0x5d0 [ 1406.615986] ? security_file_ioctl+0x93/0xc0 [ 1406.620382] ksys_ioctl+0xab/0xd0 [ 1406.623822] __x64_sys_ioctl+0x73/0xb0 [ 1406.627709] do_syscall_64+0x103/0x610 [ 1406.631588] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1406.636777] RIP: 0033:0x457c97 [ 1406.639973] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1406.658863] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 16:57:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0xff030000}], 0x500, 0x0) 16:57:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x4) 16:57:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) [ 1406.666572] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1406.673826] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1406.681080] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1406.688334] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1406.695587] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 [ 1406.879525] XFS (loop1): Invalid superblock magic number 16:57:59 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:57:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x48) 16:57:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0xfffffdef}], 0x500, 0x0) 16:57:59 executing program 1 (fault-call:2 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:57:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x3e8) 16:57:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x5) 16:57:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18100000]}, 0x48) [ 1408.827042] FAULT_INJECTION: forcing a failure. [ 1408.827042] name failslab, interval 1, probability 0, space 0, times 0 [ 1408.863522] CPU: 1 PID: 7875 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1408.870744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1408.880095] Call Trace: [ 1408.882696] dump_stack+0x172/0x1f0 [ 1408.886369] should_fail.cold+0xa/0x1b [ 1408.890272] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1408.895384] ? lock_downgrade+0x810/0x810 [ 1408.899538] ? ___might_sleep+0x163/0x280 [ 1408.903692] __should_failslab+0x121/0x190 [ 1408.907938] should_failslab+0x9/0x14 [ 1408.911764] kmem_cache_alloc+0x2be/0x710 [ 1408.915914] ? lock_downgrade+0x810/0x810 [ 1408.920073] ? kasan_check_read+0x11/0x20 [ 1408.924227] __kernfs_new_node+0xef/0x690 [ 1408.928377] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1408.933142] ? wait_for_completion+0x440/0x440 [ 1408.937753] ? mutex_unlock+0xd/0x10 [ 1408.941471] ? kernfs_activate+0x192/0x1f0 [ 1408.945709] kernfs_new_node+0x99/0x130 [ 1408.949688] __kernfs_create_file+0x51/0x340 [ 1408.954102] sysfs_add_file_mode_ns+0x222/0x560 [ 1408.958786] internal_create_group+0x35b/0xc40 [ 1408.963368] ? bd_set_size+0x89/0xb0 [ 1408.967089] ? remove_files.isra.0+0x190/0x190 [ 1408.971691] sysfs_create_group+0x20/0x30 [ 1408.975843] lo_ioctl+0xf8f/0x20d0 [ 1408.979387] ? lo_rw_aio+0x1530/0x1530 [ 1408.983279] blkdev_ioctl+0xee8/0x1c40 [ 1408.987172] ? blkpg_ioctl+0xa90/0xa90 [ 1408.991060] ? find_held_lock+0x35/0x130 [ 1408.995124] ? debug_check_no_obj_freed+0x200/0x464 [ 1409.000145] ? kasan_check_read+0x11/0x20 [ 1409.004294] ? __fget+0x340/0x540 [ 1409.007752] ? find_held_lock+0x35/0x130 [ 1409.011812] ? __fget+0x340/0x540 [ 1409.015270] block_ioctl+0xee/0x130 [ 1409.018898] ? blkdev_fallocate+0x410/0x410 [ 1409.023232] do_vfs_ioctl+0xd6e/0x1390 [ 1409.027123] ? ioctl_preallocate+0x210/0x210 [ 1409.031531] ? __fget+0x367/0x540 [ 1409.034989] ? iterate_fd+0x360/0x360 [ 1409.038795] ? do_sys_open+0x31d/0x5d0 [ 1409.042694] ? security_file_ioctl+0x93/0xc0 [ 1409.047106] ksys_ioctl+0xab/0xd0 [ 1409.050564] __x64_sys_ioctl+0x73/0xb0 [ 1409.054461] do_syscall_64+0x103/0x610 [ 1409.058355] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1409.063544] RIP: 0033:0x457c97 [ 1409.066738] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1409.085637] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1409.093360] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1409.100639] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1409.107909] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1409.115188] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 16:57:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0xffffff7f}], 0x500, 0x0) [ 1409.122458] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x9) 16:58:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}, 0x48) 16:58:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x4000000000000}], 0x500, 0x0) 16:58:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x500) [ 1409.471886] XFS (loop1): Invalid superblock magic number 16:58:02 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 16:58:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0xeffdffff00000000}], 0x500, 0x0) 16:58:02 executing program 1 (fault-call:2 fault-nth:19): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0xc) 16:58:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x900) 16:58:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x48) 16:58:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0xff03000000000000}], 0x500, 0x0) [ 1411.966264] FAULT_INJECTION: forcing a failure. [ 1411.966264] name failslab, interval 1, probability 0, space 0, times 0 [ 1411.977847] CPU: 1 PID: 7939 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1411.985050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1411.994399] Call Trace: [ 1411.994430] dump_stack+0x172/0x1f0 [ 1411.994470] should_fail.cold+0xa/0x1b [ 1411.994491] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1412.000697] ? lock_downgrade+0x810/0x810 [ 1412.000717] ? ___might_sleep+0x163/0x280 [ 1412.000735] __should_failslab+0x121/0x190 [ 1412.000754] should_failslab+0x9/0x14 [ 1412.009729] kmem_cache_alloc_trace+0x2d1/0x760 [ 1412.009756] kobject_uevent_env+0x2fb/0x1030 [ 1412.009779] kobject_uevent+0x20/0x26 [ 1412.022284] lo_ioctl+0x100b/0x20d0 [ 1412.022306] ? lo_rw_aio+0x1530/0x1530 [ 1412.022329] blkdev_ioctl+0xee8/0x1c40 [ 1412.030782] ? blkpg_ioctl+0xa90/0xa90 [ 1412.030798] ? find_held_lock+0x35/0x130 [ 1412.030817] ? debug_check_no_obj_freed+0x200/0x464 [ 1412.030841] ? kasan_check_read+0x11/0x20 [ 1412.039029] ? __fget+0x340/0x540 [ 1412.039046] ? find_held_lock+0x35/0x130 [ 1412.039060] ? __fget+0x340/0x540 [ 1412.039077] block_ioctl+0xee/0x130 [ 1412.046565] ? blkdev_fallocate+0x410/0x410 [ 1412.046584] do_vfs_ioctl+0xd6e/0x1390 [ 1412.046603] ? ioctl_preallocate+0x210/0x210 [ 1412.046619] ? __fget+0x367/0x540 [ 1412.046638] ? iterate_fd+0x360/0x360 [ 1412.046655] ? do_sys_open+0x31d/0x5d0 [ 1412.054415] ? security_file_ioctl+0x93/0xc0 [ 1412.054434] ksys_ioctl+0xab/0xd0 16:58:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0xffffff7f00000000}], 0x500, 0x0) [ 1412.054457] __x64_sys_ioctl+0x73/0xb0 [ 1412.118026] do_syscall_64+0x103/0x610 [ 1412.121955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1412.127148] RIP: 0033:0x457c97 [ 1412.130345] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1412.150295] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1412.158003] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 16:58:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x48) [ 1412.165264] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1412.172557] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1412.179813] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1412.187066] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000]}, 0x48) 16:58:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x11) [ 1412.354575] XFS (loop1): Invalid superblock magic number 16:58:05 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xc00) 16:58:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}, 0x48) 16:58:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0x4}], 0x500, 0x0) 16:58:05 executing program 1 (fault-call:2 fault-nth:20): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x18) [ 1414.952573] FAULT_INJECTION: forcing a failure. [ 1414.952573] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1414.964478] CPU: 1 PID: 7981 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1414.971695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1414.981059] Call Trace: [ 1414.983662] dump_stack+0x172/0x1f0 [ 1414.987321] should_fail.cold+0xa/0x1b [ 1414.991216] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1414.996350] should_fail_alloc_page+0x50/0x60 [ 1415.000847] __alloc_pages_nodemask+0x1a1/0x710 [ 1415.005519] ? tick_nohz_tick_stopped+0x1a/0x90 [ 1415.010196] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1415.015229] cache_grow_begin+0x9c/0x8c0 [ 1415.019292] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1415.024830] ? check_preemption_disabled+0x48/0x290 [ 1415.029860] kmem_cache_alloc_trace+0x67f/0x760 [ 1415.034553] kobject_uevent_env+0x2fb/0x1030 [ 1415.038975] kobject_uevent+0x20/0x26 [ 1415.042792] lo_ioctl+0x100b/0x20d0 [ 1415.046451] ? lo_rw_aio+0x1530/0x1530 [ 1415.050355] blkdev_ioctl+0xee8/0x1c40 [ 1415.054248] ? blkpg_ioctl+0xa90/0xa90 [ 1415.058140] ? find_held_lock+0x35/0x130 [ 1415.062207] ? debug_check_no_obj_freed+0x200/0x464 [ 1415.067231] ? kasan_check_read+0x11/0x20 [ 1415.071382] ? __fget+0x340/0x540 [ 1415.074838] ? find_held_lock+0x35/0x130 [ 1415.078898] ? __fget+0x340/0x540 [ 1415.082363] block_ioctl+0xee/0x130 [ 1415.085990] ? blkdev_fallocate+0x410/0x410 [ 1415.090314] do_vfs_ioctl+0xd6e/0x1390 [ 1415.094224] ? ioctl_preallocate+0x210/0x210 [ 1415.098634] ? __fget+0x367/0x540 [ 1415.102092] ? iterate_fd+0x360/0x360 [ 1415.105897] ? do_sys_open+0x31d/0x5d0 [ 1415.109815] ? security_file_ioctl+0x93/0xc0 [ 1415.114226] ksys_ioctl+0xab/0xd0 [ 1415.117685] __x64_sys_ioctl+0x73/0xb0 [ 1415.121593] do_syscall_64+0x103/0x610 [ 1415.125483] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1415.130670] RIP: 0033:0x457c97 [ 1415.133864] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1415.152764] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1415.160704] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1415.167974] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1415.175241] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1415.182506] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1415.189770] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000]}, 0x48) 16:58:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0xff03}], 0x500, 0x0) 16:58:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x29) 16:58:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}, 0x48) [ 1415.410809] XFS (loop1): Invalid superblock magic number 16:58:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}, 0x48) 16:58:06 executing program 1 (fault-call:2 fault-nth:21): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1415.670726] FAULT_INJECTION: forcing a failure. [ 1415.670726] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1415.682600] CPU: 1 PID: 8024 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1415.689801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1415.699158] Call Trace: [ 1415.701761] dump_stack+0x172/0x1f0 [ 1415.705411] should_fail.cold+0xa/0x1b [ 1415.709314] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1415.714440] should_fail_alloc_page+0x50/0x60 [ 1415.718958] __alloc_pages_nodemask+0x1a1/0x710 [ 1415.723637] ? tick_nohz_tick_stopped+0x1a/0x90 [ 1415.728315] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1415.733356] cache_grow_begin+0x9c/0x8c0 [ 1415.737432] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1415.742988] ? check_preemption_disabled+0x48/0x290 [ 1415.748023] kmem_cache_alloc_trace+0x67f/0x760 [ 1415.752711] kobject_uevent_env+0x2fb/0x1030 [ 1415.757136] kobject_uevent+0x20/0x26 [ 1415.760955] lo_ioctl+0x100b/0x20d0 [ 1415.764596] ? lo_rw_aio+0x1530/0x1530 [ 1415.768501] blkdev_ioctl+0xee8/0x1c40 [ 1415.772399] ? blkpg_ioctl+0xa90/0xa90 [ 1415.776293] ? find_held_lock+0x35/0x130 [ 1415.780362] ? debug_check_no_obj_freed+0x200/0x464 [ 1415.785389] ? kasan_check_read+0x11/0x20 [ 1415.789550] ? __fget+0x340/0x540 [ 1415.793010] ? find_held_lock+0x35/0x130 [ 1415.797075] ? __fget+0x340/0x540 [ 1415.800529] block_ioctl+0xee/0x130 [ 1415.804156] ? blkdev_fallocate+0x410/0x410 [ 1415.808484] do_vfs_ioctl+0xd6e/0x1390 [ 1415.812374] ? ioctl_preallocate+0x210/0x210 [ 1415.816802] ? __fget+0x367/0x540 [ 1415.820258] ? iterate_fd+0x360/0x360 [ 1415.824094] ? do_sys_open+0x31d/0x5d0 [ 1415.828007] ? security_file_ioctl+0x93/0xc0 [ 1415.832423] ksys_ioctl+0xab/0xd0 [ 1415.835884] __x64_sys_ioctl+0x73/0xb0 [ 1415.839776] do_syscall_64+0x103/0x610 [ 1415.843685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1415.848872] RIP: 0033:0x457c97 [ 1415.852066] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1415.870966] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1415.878673] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1415.885941] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1415.893211] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1415.900479] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1415.907747] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 [ 1416.026962] XFS (loop1): Invalid superblock magic number 16:58:08 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1100) 16:58:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff]}, 0x48) 16:58:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0x40000}], 0x500, 0x0) 16:58:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x300) 16:58:08 executing program 1 (fault-call:2 fault-nth:22): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1418.261915] FAULT_INJECTION: forcing a failure. [ 1418.261915] name failslab, interval 1, probability 0, space 0, times 0 [ 1418.280389] CPU: 0 PID: 8046 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1418.287587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1418.297100] Call Trace: [ 1418.299698] dump_stack+0x172/0x1f0 [ 1418.303351] should_fail.cold+0xa/0x1b [ 1418.307273] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1418.312376] ? lock_downgrade+0x810/0x810 [ 1418.316530] ? ___might_sleep+0x163/0x280 [ 1418.320702] __should_failslab+0x121/0x190 [ 1418.324959] should_failslab+0x9/0x14 [ 1418.328780] kmem_cache_alloc_node_trace+0x270/0x720 [ 1418.333901] ? __alloc_skb+0xd5/0x5e0 [ 1418.337715] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1418.343173] __kmalloc_node_track_caller+0x3d/0x70 [ 1418.348106] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1418.352793] __alloc_skb+0x10b/0x5e0 [ 1418.356528] ? skb_scrub_packet+0x440/0x440 [ 1418.360856] ? kasan_check_read+0x11/0x20 [ 1418.365014] alloc_uevent_skb+0x83/0x1e2 [ 1418.369078] kobject_uevent_env+0xa63/0x1030 [ 1418.373525] kobject_uevent+0x20/0x26 [ 1418.377331] lo_ioctl+0x100b/0x20d0 [ 1418.380980] ? lo_rw_aio+0x1530/0x1530 [ 1418.384877] blkdev_ioctl+0xee8/0x1c40 [ 1418.388775] ? blkpg_ioctl+0xa90/0xa90 [ 1418.392664] ? find_held_lock+0x35/0x130 [ 1418.396733] ? debug_check_no_obj_freed+0x200/0x464 [ 1418.401761] ? kasan_check_read+0x11/0x20 [ 1418.405909] ? __fget+0x340/0x540 [ 1418.409428] ? find_held_lock+0x35/0x130 [ 1418.413493] ? __fget+0x340/0x540 [ 1418.416965] block_ioctl+0xee/0x130 [ 1418.420603] ? blkdev_fallocate+0x410/0x410 [ 1418.424934] do_vfs_ioctl+0xd6e/0x1390 [ 1418.428832] ? ioctl_preallocate+0x210/0x210 [ 1418.433245] ? __fget+0x367/0x540 [ 1418.436706] ? iterate_fd+0x360/0x360 [ 1418.440512] ? do_sys_open+0x31d/0x5d0 [ 1418.444424] ? security_file_ioctl+0x93/0xc0 [ 1418.448835] ksys_ioctl+0xab/0xd0 [ 1418.452292] __x64_sys_ioctl+0x73/0xb0 [ 1418.456203] do_syscall_64+0x103/0x610 [ 1418.460101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1418.465291] RIP: 0033:0x457c97 [ 1418.468486] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1418.487388] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1418.495101] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1418.502370] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 16:58:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa000000]}, 0x48) [ 1418.509635] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1418.516901] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1418.524173] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x3e8) 16:58:09 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0xeffdffff}], 0x500, 0x0) 16:58:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) 16:58:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1800) [ 1418.720898] XFS (loop1): Invalid superblock magic number 16:58:09 executing program 1 (fault-call:2 fault-nth:23): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff85]}, 0x48) 16:58:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x500) [ 1419.004032] FAULT_INJECTION: forcing a failure. [ 1419.004032] name failslab, interval 1, probability 0, space 0, times 0 [ 1419.063332] CPU: 1 PID: 8095 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1419.070569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1419.079933] Call Trace: [ 1419.082547] dump_stack+0x172/0x1f0 [ 1419.086218] should_fail.cold+0xa/0x1b [ 1419.090152] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1419.095273] ? lock_downgrade+0x810/0x810 [ 1419.099436] ? ___might_sleep+0x163/0x280 [ 1419.103605] __should_failslab+0x121/0x190 [ 1419.107854] should_failslab+0x9/0x14 [ 1419.111698] kmem_cache_alloc_node_trace+0x270/0x720 [ 1419.116815] ? __alloc_skb+0xd5/0x5e0 [ 1419.120630] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1419.126095] __kmalloc_node_track_caller+0x3d/0x70 [ 1419.131039] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1419.135741] __alloc_skb+0x10b/0x5e0 [ 1419.139469] ? skb_scrub_packet+0x440/0x440 [ 1419.143805] ? kasan_check_read+0x11/0x20 [ 1419.147995] alloc_uevent_skb+0x83/0x1e2 [ 1419.152067] kobject_uevent_env+0xa63/0x1030 [ 1419.156492] kobject_uevent+0x20/0x26 16:58:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) [ 1419.160542] lo_ioctl+0x100b/0x20d0 [ 1419.164187] ? lo_rw_aio+0x1530/0x1530 [ 1419.168090] blkdev_ioctl+0xee8/0x1c40 [ 1419.172008] ? blkpg_ioctl+0xa90/0xa90 [ 1419.175896] ? find_held_lock+0x35/0x130 [ 1419.179982] ? debug_check_no_obj_freed+0x200/0x464 [ 1419.185021] ? kasan_check_read+0x11/0x20 [ 1419.189158] ? __fget+0x340/0x540 [ 1419.192597] ? find_held_lock+0x35/0x130 [ 1419.196643] ? __fget+0x340/0x540 [ 1419.200108] block_ioctl+0xee/0x130 [ 1419.203742] ? blkdev_fallocate+0x410/0x410 [ 1419.208056] do_vfs_ioctl+0xd6e/0x1390 [ 1419.211941] ? ioctl_preallocate+0x210/0x210 [ 1419.216348] ? __fget+0x367/0x540 [ 1419.219814] ? iterate_fd+0x360/0x360 [ 1419.223616] ? do_sys_open+0x31d/0x5d0 [ 1419.227507] ? security_file_ioctl+0x93/0xc0 [ 1419.231916] ksys_ioctl+0xab/0xd0 [ 1419.235371] __x64_sys_ioctl+0x73/0xb0 [ 1419.239247] do_syscall_64+0x103/0x610 [ 1419.243170] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1419.248354] RIP: 0033:0x457c97 [ 1419.251531] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1419.270420] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1419.278123] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1419.285376] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1419.292788] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1419.300058] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1419.307322] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0xff030000}], 0x500, 0x0) 16:58:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 16:58:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x2900) [ 1419.451156] XFS (loop1): Invalid superblock magic number 16:58:10 executing program 1 (fault-call:2 fault-nth:24): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1419.616519] FAULT_INJECTION: forcing a failure. [ 1419.616519] name failslab, interval 1, probability 0, space 0, times 0 [ 1419.669369] CPU: 1 PID: 8132 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1419.676621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1419.685980] Call Trace: [ 1419.686009] dump_stack+0x172/0x1f0 [ 1419.686034] should_fail.cold+0xa/0x1b [ 1419.692228] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1419.692246] ? lock_downgrade+0x810/0x810 [ 1419.692267] ? ___might_sleep+0x163/0x280 [ 1419.709509] __should_failslab+0x121/0x190 [ 1419.713759] should_failslab+0x9/0x14 [ 1419.713777] kmem_cache_alloc+0x2be/0x710 [ 1419.713796] ? __d_lookup+0x433/0x760 [ 1419.725527] ? lookup_dcache+0x23/0x140 [ 1419.729506] ? d_lookup+0xf9/0x260 [ 1419.729526] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1419.729548] __d_alloc+0x2e/0x8c0 [ 1419.737657] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1419.737677] d_alloc+0x4d/0x2b0 [ 1419.737701] __lookup_hash+0xcd/0x190 [ 1419.746161] filename_create+0x1a7/0x4f0 [ 1419.746182] ? kern_path_mountpoint+0x40/0x40 [ 1419.746199] ? strncpy_from_user+0x2a8/0x380 [ 1419.746217] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1419.746233] ? getname_flags+0x277/0x5b0 [ 1419.775789] do_mkdirat+0xb5/0x2a0 [ 1419.779336] ? __ia32_sys_mknod+0xb0/0xb0 [ 1419.783487] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1419.788250] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1419.793613] ? do_syscall_64+0x26/0x610 [ 1419.797590] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1419.802179] __x64_sys_mkdir+0x5c/0x80 [ 1419.806073] do_syscall_64+0x103/0x610 [ 1419.809967] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1419.815155] RIP: 0033:0x457247 [ 1419.818351] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1419.837268] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1419.844974] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1419.852242] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1419.859505] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1419.866773] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1419.874042] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:12 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 16:58:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0xfffffdef}], 0x500, 0x0) 16:58:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x900) 16:58:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x3f00) 16:58:12 executing program 1 (fault-call:2 fault-nth:25): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1421.842386] FAULT_INJECTION: forcing a failure. [ 1421.842386] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1421.854314] CPU: 1 PID: 8152 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1421.861498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1421.870845] Call Trace: [ 1421.873452] dump_stack+0x172/0x1f0 [ 1421.877090] should_fail.cold+0xa/0x1b [ 1421.880986] ? lo_ioctl+0x188/0x20d0 [ 1421.884707] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1421.889821] should_fail_alloc_page+0x50/0x60 [ 1421.894321] __alloc_pages_nodemask+0x1a1/0x710 [ 1421.898994] ? debug_check_no_obj_freed+0x200/0x464 [ 1421.904014] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1421.909030] ? find_held_lock+0x35/0x130 [ 1421.913107] cache_grow_begin+0x9c/0x8c0 [ 1421.917172] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1421.922713] ? check_preemption_disabled+0x48/0x290 [ 1421.927735] kmem_cache_alloc+0x645/0x710 [ 1421.931882] ? __fget+0x367/0x540 [ 1421.935348] getname_flags+0xd6/0x5b0 [ 1421.939157] do_mkdirat+0xa0/0x2a0 [ 1421.942704] ? __ia32_sys_mknod+0xb0/0xb0 [ 1421.946886] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1421.951644] ? do_syscall_64+0x26/0x610 [ 1421.955624] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1421.960987] ? do_syscall_64+0x26/0x610 [ 1421.964966] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1421.969557] __x64_sys_mkdir+0x5c/0x80 [ 1421.973473] do_syscall_64+0x103/0x610 [ 1421.977370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1421.982558] RIP: 0033:0x457247 [ 1421.985755] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1422.004655] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1422.012378] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1422.019646] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1422.026915] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1422.034197] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 16:58:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) [ 1422.041465] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0xffffff7f}], 0x500, 0x0) 16:58:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) 16:58:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0xc00) 16:58:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x4000) 16:58:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) [ 1422.303627] XFS (loop1): Invalid superblock magic number 16:58:15 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:15 executing program 1 (fault-call:2 fault-nth:26): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) 16:58:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x1100) 16:58:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xe803) 16:58:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0x4000000000000}], 0x500, 0x0) 16:58:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) [ 1425.166421] FAULT_INJECTION: forcing a failure. [ 1425.166421] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1425.178271] CPU: 1 PID: 8205 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1425.178281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1425.178288] Call Trace: [ 1425.178317] dump_stack+0x172/0x1f0 [ 1425.178340] should_fail.cold+0xa/0x1b [ 1425.178358] ? lo_ioctl+0x188/0x20d0 [ 1425.178378] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1425.178406] should_fail_alloc_page+0x50/0x60 [ 1425.178426] __alloc_pages_nodemask+0x1a1/0x710 [ 1425.201158] ? debug_check_no_obj_freed+0x200/0x464 [ 1425.201180] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1425.201197] ? find_held_lock+0x35/0x130 [ 1425.233227] cache_grow_begin+0x9c/0x8c0 [ 1425.233246] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1425.233263] ? check_preemption_disabled+0x48/0x290 [ 1425.233282] kmem_cache_alloc+0x645/0x710 [ 1425.233298] ? __fget+0x367/0x540 [ 1425.241423] getname_flags+0xd6/0x5b0 [ 1425.263338] do_mkdirat+0xa0/0x2a0 [ 1425.266896] ? __ia32_sys_mknod+0xb0/0xb0 [ 1425.271062] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1425.275826] ? do_syscall_64+0x26/0x610 [ 1425.279834] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1425.285209] ? do_syscall_64+0x26/0x610 [ 1425.289195] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1425.294319] __x64_sys_mkdir+0x5c/0x80 [ 1425.298217] do_syscall_64+0x103/0x610 [ 1425.302115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1425.307311] RIP: 0033:0x457247 [ 1425.310509] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1425.310519] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1425.310534] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1425.310548] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1425.337173] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1425.337183] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 16:58:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0xeffdffff00000000}], 0x500, 0x0) [ 1425.337192] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x1800) 16:58:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) 16:58:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x47700) [ 1425.501711] XFS (loop1): Invalid superblock magic number 16:58:16 executing program 1 (fault-call:2 fault-nth:27): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1425.739081] FAULT_INJECTION: forcing a failure. [ 1425.739081] name failslab, interval 1, probability 0, space 0, times 0 [ 1425.805989] CPU: 1 PID: 8250 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1425.813216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1425.822575] Call Trace: [ 1425.825183] dump_stack+0x172/0x1f0 [ 1425.828823] should_fail.cold+0xa/0x1b [ 1425.832742] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1425.837869] ? ___might_sleep+0x163/0x280 [ 1425.842035] __should_failslab+0x121/0x190 [ 1425.846285] should_failslab+0x9/0x14 [ 1425.850098] kmem_cache_alloc+0x2be/0x710 [ 1425.854245] ? unwind_get_return_address+0x61/0xa0 [ 1425.859163] ? __save_stack_trace+0x8a/0xf0 [ 1425.863495] ? ratelimit_state_init+0xb0/0xb0 [ 1425.868017] ext4_alloc_inode+0x1f/0x640 [ 1425.872073] ? ratelimit_state_init+0xb0/0xb0 [ 1425.876556] alloc_inode+0x66/0x190 [ 1425.880202] new_inode_pseudo+0x19/0xf0 [ 1425.884191] new_inode+0x1f/0x40 [ 1425.887547] __ext4_new_inode+0x3cb/0x52c0 [ 1425.891767] ? putname+0xef/0x130 [ 1425.895208] ? do_syscall_64+0x103/0x610 [ 1425.899258] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1425.904637] ? d_splice_alias+0x6c1/0xcc0 [ 1425.908785] ? find_held_lock+0x35/0x130 [ 1425.912835] ? debug_check_no_obj_freed+0x200/0x464 [ 1425.917853] ? ext4_free_inode+0x1470/0x1470 [ 1425.922249] ? lock_downgrade+0x810/0x810 [ 1425.926382] ? dquot_get_next_dqblk+0x180/0x180 [ 1425.931042] ? __lock_is_held+0xb6/0x140 [ 1425.935099] ? check_preemption_disabled+0x48/0x290 [ 1425.940116] ext4_mkdir+0x3d5/0xdf0 [ 1425.943736] ? ext4_init_dot_dotdot+0x520/0x520 [ 1425.948393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1425.953917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1425.959458] ? security_inode_permission+0xd5/0x110 [ 1425.964484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1425.970009] ? security_inode_mkdir+0xee/0x120 [ 1425.974581] vfs_mkdir+0x433/0x690 [ 1425.978113] do_mkdirat+0x234/0x2a0 [ 1425.981745] ? __ia32_sys_mknod+0xb0/0xb0 [ 1425.985880] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1425.990640] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1425.995987] ? do_syscall_64+0x26/0x610 [ 1425.999961] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1426.004535] __x64_sys_mkdir+0x5c/0x80 [ 1426.008410] do_syscall_64+0x103/0x610 [ 1426.012287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1426.017480] RIP: 0033:0x457247 [ 1426.020663] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1426.039566] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1426.047257] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1426.054526] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1426.061778] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1426.069048] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1426.076301] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:18 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) 16:58:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0xff03000000000000}], 0x500, 0x0) 16:58:18 executing program 1 (fault-call:2 fault-nth:28): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x2900) 16:58:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x770400) [ 1428.245321] FAULT_INJECTION: forcing a failure. [ 1428.245321] name failslab, interval 1, probability 0, space 0, times 0 [ 1428.302663] CPU: 0 PID: 8271 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1428.309890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1428.319258] Call Trace: [ 1428.321870] dump_stack+0x172/0x1f0 [ 1428.325521] should_fail.cold+0xa/0x1b [ 1428.329426] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1428.334549] ? ___might_sleep+0x163/0x280 [ 1428.338707] __should_failslab+0x121/0x190 [ 1428.342995] should_failslab+0x9/0x14 [ 1428.346807] kmem_cache_alloc+0x2be/0x710 [ 1428.350976] ? unwind_get_return_address+0x61/0xa0 [ 1428.355982] ? __save_stack_trace+0x8a/0xf0 [ 1428.360317] ? ratelimit_state_init+0xb0/0xb0 [ 1428.364837] ext4_alloc_inode+0x1f/0x640 [ 1428.368912] ? ratelimit_state_init+0xb0/0xb0 [ 1428.373520] alloc_inode+0x66/0x190 [ 1428.373536] new_inode_pseudo+0x19/0xf0 [ 1428.373551] new_inode+0x1f/0x40 [ 1428.384504] __ext4_new_inode+0x3cb/0x52c0 [ 1428.388789] ? putname+0xef/0x130 [ 1428.388809] ? do_syscall_64+0x103/0x610 [ 1428.388828] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1428.402198] ? d_splice_alias+0x6c1/0xcc0 [ 1428.406362] ? find_held_lock+0x35/0x130 [ 1428.410448] ? debug_check_no_obj_freed+0x200/0x464 [ 1428.415491] ? ext4_free_inode+0x1470/0x1470 [ 1428.419914] ? lock_downgrade+0x810/0x810 [ 1428.424092] ? dquot_get_next_dqblk+0x180/0x180 [ 1428.428789] ? __lock_is_held+0xb6/0x140 [ 1428.432854] ? check_preemption_disabled+0x48/0x290 [ 1428.432891] ext4_mkdir+0x3d5/0xdf0 [ 1428.432941] ? ext4_init_dot_dotdot+0x520/0x520 [ 1428.441599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1428.441613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1428.441631] ? security_inode_permission+0xd5/0x110 [ 1428.441647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1428.467911] ? security_inode_mkdir+0xee/0x120 [ 1428.472525] vfs_mkdir+0x433/0x690 [ 1428.476083] do_mkdirat+0x234/0x2a0 [ 1428.479720] ? __ia32_sys_mknod+0xb0/0xb0 [ 1428.483883] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1428.488654] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1428.494034] ? do_syscall_64+0x26/0x610 [ 1428.498016] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1428.502607] __x64_sys_mkdir+0x5c/0x80 [ 1428.506502] do_syscall_64+0x103/0x610 [ 1428.510404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1428.515603] RIP: 0033:0x457247 [ 1428.518811] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1428.537719] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1428.545436] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 16:58:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0xffffff7f00000000}], 0x500, 0x0) 16:58:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0x0}], 0x500, 0x0) 16:58:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0x0}], 0x500, 0x0) 16:58:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0x0}], 0x500, 0x0) 16:58:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0x0}], 0x500, 0x0) 16:58:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) [ 1428.552708] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1428.559979] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1428.567248] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1428.574516] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:21 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x3f00) 16:58:21 executing program 1 (fault-call:2 fault-nth:29): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1810000000000000]}, 0x48) 16:58:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x80ffff) 16:58:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0x0}], 0x500, 0x0) [ 1431.313446] FAULT_INJECTION: forcing a failure. [ 1431.313446] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1431.325291] CPU: 1 PID: 8317 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1431.332481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1431.341837] Call Trace: [ 1431.344446] dump_stack+0x172/0x1f0 [ 1431.348099] should_fail.cold+0xa/0x1b [ 1431.352004] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1431.357118] ? mark_held_locks+0x100/0x100 [ 1431.361367] should_fail_alloc_page+0x50/0x60 [ 1431.365870] __alloc_pages_nodemask+0x1a1/0x710 [ 1431.370545] ? find_held_lock+0x35/0x130 [ 1431.374616] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1431.379673] cache_grow_begin+0x9c/0x8c0 [ 1431.383744] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1431.389288] ? check_preemption_disabled+0x48/0x290 [ 1431.394317] kmem_cache_alloc+0x645/0x710 [ 1431.398488] ? unwind_get_return_address+0x61/0xa0 [ 1431.403431] ? __save_stack_trace+0x8a/0xf0 [ 1431.407786] ? ratelimit_state_init+0xb0/0xb0 [ 1431.412290] ext4_alloc_inode+0x1f/0x640 [ 1431.416376] ? ratelimit_state_init+0xb0/0xb0 [ 1431.420882] alloc_inode+0x66/0x190 [ 1431.424517] new_inode_pseudo+0x19/0xf0 [ 1431.428512] new_inode+0x1f/0x40 [ 1431.431888] __ext4_new_inode+0x3cb/0x52c0 [ 1431.436130] ? putname+0xef/0x130 [ 1431.439599] ? do_syscall_64+0x103/0x610 [ 1431.443669] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1431.449047] ? d_splice_alias+0x6c1/0xcc0 [ 1431.453220] ? find_held_lock+0x35/0x130 [ 1431.457318] ? debug_check_no_obj_freed+0x200/0x464 16:58:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0x48) 16:58:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0x0}], 0x500, 0x0) [ 1431.462346] ? ext4_free_inode+0x1470/0x1470 [ 1431.466767] ? lock_downgrade+0x810/0x810 [ 1431.470922] ? dquot_get_next_dqblk+0x180/0x180 [ 1431.475616] ? __lock_is_held+0xb6/0x140 [ 1431.479688] ? check_preemption_disabled+0x48/0x290 [ 1431.484715] ext4_mkdir+0x3d5/0xdf0 [ 1431.488366] ? ext4_init_dot_dotdot+0x520/0x520 [ 1431.493045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1431.498600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1431.504146] ? security_inode_permission+0xd5/0x110 [ 1431.509167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1431.509182] ? security_inode_mkdir+0xee/0x120 [ 1431.509201] vfs_mkdir+0x433/0x690 [ 1431.522840] do_mkdirat+0x234/0x2a0 [ 1431.526489] ? __ia32_sys_mknod+0xb0/0xb0 [ 1431.530645] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1431.535412] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1431.540788] ? do_syscall_64+0x26/0x610 [ 1431.544774] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1431.549376] __x64_sys_mkdir+0x5c/0x80 [ 1431.553276] do_syscall_64+0x103/0x610 [ 1431.557178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1431.562375] RIP: 0033:0x457247 [ 1431.565579] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1431.584485] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1431.592197] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1431.599478] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1431.606753] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 16:58:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) [ 1431.614026] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1431.621303] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 [ 1431.710628] XFS (loop1): Invalid superblock magic number 16:58:22 executing program 1 (fault-call:2 fault-nth:30): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) 16:58:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x4000) [ 1432.001799] FAULT_INJECTION: forcing a failure. [ 1432.001799] name failslab, interval 1, probability 0, space 0, times 0 [ 1432.033431] CPU: 1 PID: 8351 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1432.040713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1432.050070] Call Trace: [ 1432.052707] dump_stack+0x172/0x1f0 [ 1432.056347] should_fail.cold+0xa/0x1b [ 1432.056367] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1432.056388] ? ___might_sleep+0x163/0x280 [ 1432.069534] __should_failslab+0x121/0x190 [ 1432.073783] should_failslab+0x9/0x14 [ 1432.077599] kmem_cache_alloc+0x2be/0x710 [ 1432.081753] ? rcu_read_lock_sched_held+0x110/0x130 [ 1432.086775] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1432.092319] ? __mark_inode_dirty+0x241/0x1290 [ 1432.096913] ext4_mb_new_blocks+0x5a8/0x3c70 [ 1432.101335] ? ext4_find_extent+0x76e/0x9d0 [ 1432.105670] ext4_ext_map_blocks+0x3094/0x4e50 [ 1432.110264] ? ext4_ext_release+0x10/0x10 [ 1432.114468] ? __lock_is_held+0xb6/0x140 [ 1432.118572] ext4_map_blocks+0x8ec/0x1a20 [ 1432.122730] ? ext4_issue_zeroout+0x170/0x170 [ 1432.127238] ? kasan_check_write+0x14/0x20 [ 1432.131477] ? __brelse+0x95/0xb0 [ 1432.134950] ext4_getblk+0xc4/0x510 [ 1432.138596] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1432.142973] ? ext4_free_inode+0x1470/0x1470 [ 1432.147406] ext4_bread+0x8f/0x230 [ 1432.150981] ? ext4_getblk+0x510/0x510 [ 1432.154881] ext4_append+0x155/0x370 [ 1432.158591] ext4_mkdir+0x61b/0xdf0 [ 1432.162221] ? ext4_init_dot_dotdot+0x520/0x520 [ 1432.166893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1432.172427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1432.177979] ? security_inode_permission+0xd5/0x110 [ 1432.183014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1432.188549] ? security_inode_mkdir+0xee/0x120 [ 1432.193141] vfs_mkdir+0x433/0x690 [ 1432.196690] do_mkdirat+0x234/0x2a0 [ 1432.200321] ? __ia32_sys_mknod+0xb0/0xb0 [ 1432.204473] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1432.209231] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1432.214597] ? do_syscall_64+0x26/0x610 [ 1432.218588] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1432.223191] __x64_sys_mkdir+0x5c/0x80 [ 1432.227083] do_syscall_64+0x103/0x610 [ 1432.230978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1432.236166] RIP: 0033:0x457247 [ 1432.239362] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1432.258262] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1432.265972] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1432.273238] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1432.280503] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1432.287772] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1432.295554] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:25 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1000000) 16:58:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0x0}], 0x500, 0x0) 16:58:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) 16:58:25 executing program 1 (fault-call:2 fault-nth:31): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0xe803) [ 1434.384185] FAULT_INJECTION: forcing a failure. [ 1434.384185] name failslab, interval 1, probability 0, space 0, times 0 [ 1434.396060] CPU: 0 PID: 8372 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1434.403269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1434.412623] Call Trace: [ 1434.415231] dump_stack+0x172/0x1f0 [ 1434.418876] should_fail.cold+0xa/0x1b [ 1434.422774] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1434.427891] ? save_stack+0xa9/0xd0 [ 1434.431525] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1434.436466] __should_failslab+0x121/0x190 [ 1434.440758] should_failslab+0x9/0x14 [ 1434.444562] kmem_cache_alloc+0x47/0x710 [ 1434.448631] ? ext4_es_scan+0x6f0/0x6f0 [ 1434.452625] ? do_raw_write_lock+0x124/0x290 [ 1434.457064] __es_insert_extent+0x2cc/0xf20 [ 1434.461447] ext4_es_insert_extent+0x2b7/0xa40 [ 1434.466091] ? ext4_es_scan_clu+0x50/0x50 [ 1434.470261] ? rcu_read_lock_sched_held+0x110/0x130 [ 1434.475281] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1434.480829] ? ext4_es_find_extent_range+0xff/0x600 [ 1434.485856] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1434.490707] ? ext4_rereserve_cluster+0x240/0x240 [ 1434.495558] ? ext4_find_extent+0x76e/0x9d0 [ 1434.499889] ? ext4_find_extent+0x6a6/0x9d0 [ 1434.499915] ext4_ext_map_blocks+0x216a/0x4e50 [ 1434.509700] ? ext4_ext_release+0x10/0x10 [ 1434.513862] ? __lock_is_held+0xb6/0x140 [ 1434.517960] ? lock_acquire+0x16f/0x3f0 [ 1434.521963] ? ext4_map_blocks+0x424/0x1a20 [ 1434.526306] ext4_map_blocks+0xecb/0x1a20 [ 1434.526331] ? ext4_issue_zeroout+0x170/0x170 [ 1434.534982] ? kasan_check_write+0x14/0x20 [ 1434.539233] ? __brelse+0x95/0xb0 [ 1434.542718] ext4_getblk+0xc4/0x510 [ 1434.546376] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1434.550712] ? ext4_free_inode+0x1470/0x1470 [ 1434.555140] ext4_bread+0x8f/0x230 [ 1434.555159] ? ext4_getblk+0x510/0x510 [ 1434.555183] ext4_append+0x155/0x370 [ 1434.555203] ext4_mkdir+0x61b/0xdf0 [ 1434.566331] ? ext4_init_dot_dotdot+0x520/0x520 [ 1434.566351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1434.574623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1434.574642] ? security_inode_permission+0xd5/0x110 [ 1434.574659] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1434.574675] ? security_inode_mkdir+0xee/0x120 [ 1434.596258] vfs_mkdir+0x433/0x690 [ 1434.596282] do_mkdirat+0x234/0x2a0 [ 1434.596302] ? __ia32_sys_mknod+0xb0/0xb0 [ 1434.596322] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1434.616954] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1434.622326] ? do_syscall_64+0x26/0x610 [ 1434.626310] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1434.626334] __x64_sys_mkdir+0x5c/0x80 16:58:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x48) 16:58:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}, 0x48) [ 1434.626351] do_syscall_64+0x103/0x610 [ 1434.638703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1434.643905] RIP: 0033:0x457247 [ 1434.647123] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1434.666047] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1434.666063] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 16:58:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x48) [ 1434.666072] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1434.666081] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1434.666090] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1434.666098] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0x0}], 0x500, 0x0) 16:58:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x2000000) 16:58:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x47700) [ 1434.799596] XFS (loop1): Invalid superblock magic number 16:58:28 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}, 0x48) 16:58:28 executing program 1 (fault-call:2 fault-nth:32): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x3000000) 16:58:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0x0}], 0x500, 0x0) 16:58:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x231860) [ 1437.401579] FAULT_INJECTION: forcing a failure. [ 1437.401579] name failslab, interval 1, probability 0, space 0, times 0 [ 1437.467225] CPU: 1 PID: 8425 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1437.474463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1437.483818] Call Trace: [ 1437.486424] dump_stack+0x172/0x1f0 [ 1437.490074] should_fail.cold+0xa/0x1b [ 1437.493979] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1437.499097] ? ___might_sleep+0x163/0x280 [ 1437.503254] __should_failslab+0x121/0x190 [ 1437.507502] should_failslab+0x9/0x14 [ 1437.511310] kmem_cache_alloc+0x2be/0x710 [ 1437.515472] ? rcu_read_lock_sched_held+0x110/0x130 [ 1437.520495] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1437.526042] ? __mark_inode_dirty+0x241/0x1290 [ 1437.530635] ext4_mb_new_blocks+0x5a8/0x3c70 [ 1437.535054] ? ext4_find_extent+0x76e/0x9d0 [ 1437.539390] ext4_ext_map_blocks+0x3094/0x4e50 [ 1437.543988] ? ext4_ext_release+0x10/0x10 [ 1437.548145] ? __lock_is_held+0xb6/0x140 [ 1437.552241] ext4_map_blocks+0x8ec/0x1a20 [ 1437.556407] ? ext4_issue_zeroout+0x170/0x170 [ 1437.560919] ? kasan_check_write+0x14/0x20 [ 1437.565173] ? __brelse+0x95/0xb0 [ 1437.568657] ext4_getblk+0xc4/0x510 [ 1437.572298] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1437.576637] ? ext4_free_inode+0x1470/0x1470 [ 1437.581058] ext4_bread+0x8f/0x230 [ 1437.584610] ? ext4_getblk+0x510/0x510 [ 1437.588515] ext4_append+0x155/0x370 [ 1437.592247] ext4_mkdir+0x61b/0xdf0 [ 1437.595891] ? ext4_init_dot_dotdot+0x520/0x520 [ 1437.600563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1437.606111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1437.611688] ? security_inode_permission+0xd5/0x110 [ 1437.616716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1437.622264] ? security_inode_mkdir+0xee/0x120 [ 1437.626864] vfs_mkdir+0x433/0x690 [ 1437.630420] do_mkdirat+0x234/0x2a0 [ 1437.634067] ? __ia32_sys_mknod+0xb0/0xb0 [ 1437.638241] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1437.643009] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1437.648386] ? do_syscall_64+0x26/0x610 [ 1437.652370] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1437.656977] __x64_sys_mkdir+0x5c/0x80 [ 1437.660904] do_syscall_64+0x103/0x610 16:58:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x48) [ 1437.664814] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1437.670011] RIP: 0033:0x457247 [ 1437.673211] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1437.692145] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1437.699857] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1437.707131] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200001c0 16:58:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0x0}], 0x500, 0x0) [ 1437.714401] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1437.721673] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1437.728954] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000]}, 0x48) 16:58:28 executing program 1 (fault-call:2 fault-nth:33): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x4000000) 16:58:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x770400) [ 1438.117114] FAULT_INJECTION: forcing a failure. [ 1438.117114] name failslab, interval 1, probability 0, space 0, times 0 [ 1438.181353] CPU: 1 PID: 8459 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1438.188582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1438.197952] Call Trace: [ 1438.200560] dump_stack+0x172/0x1f0 [ 1438.200585] should_fail.cold+0xa/0x1b [ 1438.200605] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1438.208107] ? lock_downgrade+0x810/0x810 [ 1438.217336] ? ___might_sleep+0x163/0x280 [ 1438.217356] __should_failslab+0x121/0x190 [ 1438.217375] should_failslab+0x9/0x14 [ 1438.229529] __kmalloc_track_caller+0x2d8/0x740 [ 1438.229545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1438.229559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1438.229577] ? check_preemption_disabled+0x48/0x290 [ 1438.245290] ? strndup_user+0x77/0xd0 [ 1438.245309] memdup_user+0x26/0xb0 [ 1438.245326] strndup_user+0x77/0xd0 [ 1438.245345] ksys_mount+0x3c/0x150 [ 1438.245367] __x64_sys_mount+0xbe/0x150 [ 1438.257699] do_syscall_64+0x103/0x610 [ 1438.257721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1438.257735] RIP: 0033:0x45a89a [ 1438.281081] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1438.300515] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1438.308224] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1438.315489] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1438.322753] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1438.330015] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1438.337285] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:31 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa00000000000000]}, 0x48) 16:58:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0x0}], 0x500, 0x0) 16:58:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x80ffff) 16:58:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x5000000) 16:58:31 executing program 1 (fault-call:2 fault-nth:34): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1440.524666] FAULT_INJECTION: forcing a failure. [ 1440.524666] name failslab, interval 1, probability 0, space 0, times 0 [ 1440.536256] CPU: 0 PID: 8482 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1440.543444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1440.552792] Call Trace: [ 1440.555392] dump_stack+0x172/0x1f0 [ 1440.559029] should_fail.cold+0xa/0x1b [ 1440.562923] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1440.568039] ? __sigqueue_alloc+0x173/0x4d0 [ 1440.572363] ? find_held_lock+0x35/0x130 [ 1440.576431] __should_failslab+0x121/0x190 [ 1440.580690] should_failslab+0x9/0x14 [ 1440.584496] kmem_cache_alloc+0x47/0x710 [ 1440.588562] ? kasan_check_read+0x11/0x20 [ 1440.592716] __sigqueue_alloc+0x268/0x4d0 [ 1440.596871] __send_signal+0xda3/0x1590 [ 1440.600872] send_signal+0x49/0xd0 [ 1440.604415] force_sig_info+0x251/0x310 [ 1440.608400] force_sig_fault+0xbb/0xf0 [ 1440.612289] ? force_sigsegv+0x120/0x120 [ 1440.616364] ? trace_hardirqs_on+0x67/0x230 [ 1440.620695] __bad_area_nosemaphore+0x332/0x420 [ 1440.625372] bad_area+0x69/0x80 [ 1440.628657] __do_page_fault+0x971/0xd60 [ 1440.632732] do_page_fault+0x71/0x581 [ 1440.636536] ? page_fault+0x8/0x30 [ 1440.640094] page_fault+0x1e/0x30 [ 1440.643560] RIP: 0033:0x451adf [ 1440.646757] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 1440.665658] RSP: 002b:00007fe22d94ba88 EFLAGS: 00010283 16:58:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) [ 1440.671018] RAX: 00007fe22d94bb30 RBX: 0000000000000010 RCX: 0000000000000000 [ 1440.678286] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fe22d94bb30 [ 1440.685553] RBP: 0000000000000000 R08: 00000000000000e0 R09: 000000000000000a [ 1440.692822] R10: 0000000000000075 R11: 00000000004e0f40 R12: 0000000000000005 [ 1440.700087] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 16:58:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 16:58:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x4, 0x0) 16:58:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x9000000) 16:58:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) [ 1441.037178] XFS (loop1): Invalid superblock magic number 16:58:34 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x1000000) 16:58:34 executing program 1 (fault-call:2 fault-nth:35): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0xff03, 0x0) 16:58:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) 16:58:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xc000000) [ 1443.552463] FAULT_INJECTION: forcing a failure. [ 1443.552463] name failslab, interval 1, probability 0, space 0, times 0 16:58:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) [ 1443.663269] CPU: 0 PID: 8525 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1443.670505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1443.670511] Call Trace: [ 1443.670540] dump_stack+0x172/0x1f0 [ 1443.670564] should_fail.cold+0xa/0x1b [ 1443.670585] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1443.690026] ? lock_downgrade+0x810/0x810 [ 1443.690046] ? ___might_sleep+0x163/0x280 [ 1443.690065] __should_failslab+0x121/0x190 [ 1443.690084] should_failslab+0x9/0x14 16:58:34 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1443.711496] __kmalloc_track_caller+0x2d8/0x740 [ 1443.716184] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1443.721737] ? strndup_user+0x77/0xd0 [ 1443.725557] memdup_user+0x26/0xb0 [ 1443.729104] strndup_user+0x77/0xd0 [ 1443.732754] ksys_mount+0x7b/0x150 [ 1443.736311] __x64_sys_mount+0xbe/0x150 [ 1443.736333] do_syscall_64+0x103/0x610 [ 1443.736352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1443.744225] RIP: 0033:0x45a89a [ 1443.744242] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1443.744251] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1443.744266] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1443.744275] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1443.744284] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1443.744293] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 16:58:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x4) [ 1443.744301] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 16:58:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x11000000) 16:58:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) 16:58:34 executing program 1 (fault-call:2 fault-nth:36): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x2000000) 16:58:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0xff03) 16:58:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 1444.229112] FAULT_INJECTION: forcing a failure. [ 1444.229112] name failslab, interval 1, probability 0, space 0, times 0 [ 1444.292494] CPU: 1 PID: 8578 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1444.299711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1444.299717] Call Trace: [ 1444.299746] dump_stack+0x172/0x1f0 [ 1444.299772] should_fail.cold+0xa/0x1b [ 1444.319189] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1444.324304] ? lock_downgrade+0x810/0x810 [ 1444.328473] ? ___might_sleep+0x163/0x280 [ 1444.332632] __should_failslab+0x121/0x190 [ 1444.332653] should_failslab+0x9/0x14 [ 1444.332669] kmem_cache_alloc_trace+0x2d1/0x760 [ 1444.332688] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1444.340714] ? _copy_from_user+0xdd/0x150 [ 1444.340737] copy_mount_options+0x5c/0x440 [ 1444.340752] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1444.340772] ksys_mount+0xa7/0x150 [ 1444.350996] __x64_sys_mount+0xbe/0x150 [ 1444.351018] do_syscall_64+0x103/0x610 [ 1444.351039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1444.351053] RIP: 0033:0x45a89a 16:58:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x40000) [ 1444.384682] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1444.403584] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1444.403600] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1444.403609] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1444.403619] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1444.403630] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 16:58:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) [ 1444.440380] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:35 executing program 1 (fault-call:2 fault-nth:37): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1444.706240] FAULT_INJECTION: forcing a failure. [ 1444.706240] name failslab, interval 1, probability 0, space 0, times 0 [ 1444.726216] CPU: 0 PID: 8599 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1444.733418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1444.742772] Call Trace: [ 1444.745375] dump_stack+0x172/0x1f0 [ 1444.749034] should_fail.cold+0xa/0x1b [ 1444.752977] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1444.758124] ? lock_downgrade+0x810/0x810 [ 1444.762298] ? ___might_sleep+0x163/0x280 [ 1444.766458] __should_failslab+0x121/0x190 [ 1444.770706] should_failslab+0x9/0x14 [ 1444.774519] kmem_cache_alloc+0x2be/0x710 [ 1444.778677] ? kmem_cache_alloc_trace+0x5a4/0x760 [ 1444.783540] getname_flags+0xd6/0x5b0 [ 1444.787388] user_path_at_empty+0x2f/0x50 [ 1444.791553] do_mount+0x15e/0x2d30 [ 1444.795098] ? copy_mount_options+0x5c/0x440 [ 1444.799510] ? copy_mount_string+0x40/0x40 [ 1444.803783] ? kmem_cache_alloc_trace+0x354/0x760 [ 1444.808628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1444.814163] ? copy_mount_options+0x30e/0x440 [ 1444.818670] ksys_mount+0xdb/0x150 [ 1444.822202] __x64_sys_mount+0xbe/0x150 [ 1444.826190] do_syscall_64+0x103/0x610 [ 1444.830088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1444.835283] RIP: 0033:0x45a89a [ 1444.838472] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1444.857358] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1444.865071] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1444.872379] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1444.879642] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1444.886915] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1444.894199] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:37 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x48) 16:58:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x3000000) 16:58:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x18000000) 16:58:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0xeffdffff) 16:58:37 executing program 1 (fault-call:2 fault-nth:38): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0xff030000) [ 1446.880114] FAULT_INJECTION: forcing a failure. [ 1446.880114] name failslab, interval 1, probability 0, space 0, times 0 [ 1446.943248] CPU: 0 PID: 8615 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1446.950512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1446.959873] Call Trace: [ 1446.962540] dump_stack+0x172/0x1f0 [ 1446.966189] should_fail.cold+0xa/0x1b [ 1446.970091] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1446.975202] ? lock_downgrade+0x810/0x810 [ 1446.979362] ? ___might_sleep+0x163/0x280 [ 1446.983522] __should_failslab+0x121/0x190 [ 1446.987768] should_failslab+0x9/0x14 [ 1446.991570] kmem_cache_alloc+0x2be/0x710 [ 1446.995729] ? find_held_lock+0x35/0x130 [ 1446.999809] getname_kernel+0x53/0x370 [ 1447.003704] kern_path+0x20/0x40 [ 1447.007082] lookup_bdev.part.0+0x7b/0x1b0 [ 1447.011324] ? blkdev_open+0x290/0x290 [ 1447.015222] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1447.020681] ? rcu_read_lock_sched_held+0x110/0x130 [ 1447.020697] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1447.020715] blkdev_get_by_path+0x81/0x130 [ 1447.035488] mount_bdev+0x5d/0x3c0 [ 1447.035505] ? xfs_test_remount_options+0x90/0x90 [ 1447.035521] xfs_fs_mount+0x35/0x40 [ 1447.047516] mount_fs+0x106/0x3ff [ 1447.050983] ? emergency_thaw_all+0x1a0/0x1a0 [ 1447.051001] ? __init_waitqueue_head+0x36/0x90 [ 1447.051025] vfs_kern_mount.part.0+0x6f/0x410 [ 1447.064579] do_mount+0x581/0x2d30 [ 1447.068132] ? copy_mount_options+0x41/0x440 [ 1447.072551] ? copy_mount_string+0x40/0x40 [ 1447.076793] ? kmem_cache_alloc_trace+0x354/0x760 [ 1447.076816] ? _copy_from_user+0xdd/0x150 [ 1447.076835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 16:58:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0xfffffdef) 16:58:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x48) [ 1447.085805] ? copy_mount_options+0x30e/0x440 [ 1447.085827] ksys_mount+0xdb/0x150 [ 1447.085846] __x64_sys_mount+0xbe/0x150 [ 1447.085866] do_syscall_64+0x103/0x610 [ 1447.107282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1447.112473] RIP: 0033:0x45a89a [ 1447.115672] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1447.134575] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1447.134590] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1447.134600] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1447.134609] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1447.134618] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1447.134627] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x48) 16:58:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x29000000) 16:58:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0xffffff7f) 16:58:40 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x4000000) 16:58:40 executing program 1 (fault-call:2 fault-nth:39): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x48) 16:58:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x4000000000000) 16:58:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x3f000000) [ 1449.965513] FAULT_INJECTION: forcing a failure. [ 1449.965513] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1449.977359] CPU: 0 PID: 8658 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1449.984542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1449.993893] Call Trace: [ 1449.996495] dump_stack+0x172/0x1f0 [ 1450.000131] should_fail.cold+0xa/0x1b [ 1450.004024] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1450.009142] should_fail_alloc_page+0x50/0x60 [ 1450.013640] __alloc_pages_nodemask+0x1a1/0x710 [ 1450.018318] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1450.023331] ? find_held_lock+0x35/0x130 [ 1450.027411] cache_grow_begin+0x9c/0x8c0 [ 1450.031473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1450.037022] ? check_preemption_disabled+0x48/0x290 [ 1450.042047] kmem_cache_alloc+0x645/0x710 [ 1450.046206] getname_flags+0xd6/0x5b0 [ 1450.050023] user_path_at_empty+0x2f/0x50 [ 1450.054175] do_mount+0x15e/0x2d30 [ 1450.057719] ? copy_mount_options+0x5c/0x440 [ 1450.062133] ? copy_mount_string+0x40/0x40 [ 1450.066373] ? kmem_cache_alloc_trace+0x354/0x760 [ 1450.071218] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1450.076868] ? _copy_from_user+0xdd/0x150 [ 1450.081023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1450.086565] ? copy_mount_options+0x30e/0x440 [ 1450.091077] ksys_mount+0xdb/0x150 [ 1450.094626] __x64_sys_mount+0xbe/0x150 [ 1450.098607] do_syscall_64+0x103/0x610 [ 1450.102503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1450.107694] RIP: 0033:0x45a89a [ 1450.110887] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1450.129786] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1450.137494] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1450.144759] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1450.152022] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 16:58:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x48) [ 1450.159764] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1450.167031] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0xeffdffff00000000) 16:58:41 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x48) [ 1450.393214] XFS (loop1): Invalid superblock magic number 16:58:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x5000000) 16:58:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0xff03000000000000) 16:58:41 executing program 1 (fault-call:2 fault-nth:40): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x48) 16:58:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x40000000) [ 1450.668897] FAULT_INJECTION: forcing a failure. [ 1450.668897] name failslab, interval 1, probability 0, space 0, times 0 [ 1450.721800] CPU: 1 PID: 8712 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1450.729026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1450.738382] Call Trace: [ 1450.740994] dump_stack+0x172/0x1f0 [ 1450.744682] should_fail.cold+0xa/0x1b [ 1450.748639] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1450.753767] ? lock_downgrade+0x810/0x810 [ 1450.757929] ? ___might_sleep+0x163/0x280 [ 1450.762100] __should_failslab+0x121/0x190 [ 1450.766366] should_failslab+0x9/0x14 [ 1450.770188] __kmalloc_track_caller+0x2d8/0x740 [ 1450.774869] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1450.780331] ? alloc_vfsmnt+0x28/0x780 [ 1450.784229] ? kstrdup_const+0x66/0x80 [ 1450.788127] kstrdup+0x3a/0x70 [ 1450.791331] kstrdup_const+0x66/0x80 [ 1450.795056] alloc_vfsmnt+0xba/0x780 [ 1450.795076] vfs_kern_mount.part.0+0x2a/0x410 [ 1450.795097] do_mount+0x581/0x2d30 [ 1450.795113] ? copy_mount_options+0x41/0x440 [ 1450.795133] ? copy_mount_string+0x40/0x40 [ 1450.795149] ? kmem_cache_alloc_trace+0x354/0x760 16:58:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa]}, 0x48) [ 1450.795172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1450.811310] ? copy_mount_options+0x30e/0x440 [ 1450.811346] ksys_mount+0xdb/0x150 [ 1450.811378] __x64_sys_mount+0xbe/0x150 [ 1450.830447] do_syscall_64+0x103/0x610 [ 1450.837954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1450.837967] RIP: 0033:0x45a89a [ 1450.837984] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 16:58:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x9000000) 16:58:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0xffffff7f00000000) [ 1450.837995] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1450.876835] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1450.884108] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1450.891379] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1450.891388] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1450.891397] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:41 executing program 1 (fault-call:2 fault-nth:41): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) [ 1451.124920] FAULT_INJECTION: forcing a failure. [ 1451.124920] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1451.136793] CPU: 1 PID: 8742 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1451.143980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1451.153330] Call Trace: [ 1451.155931] dump_stack+0x172/0x1f0 [ 1451.159754] should_fail.cold+0xa/0x1b [ 1451.163651] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1451.168764] should_fail_alloc_page+0x50/0x60 [ 1451.173261] __alloc_pages_nodemask+0x1a1/0x710 [ 1451.177940] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1451.183003] ? find_held_lock+0x35/0x130 [ 1451.187084] cache_grow_begin+0x9c/0x8c0 [ 1451.191161] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1451.196718] ? check_preemption_disabled+0x48/0x290 [ 1451.201740] kmem_cache_alloc+0x645/0x710 [ 1451.205904] ? find_held_lock+0x35/0x130 [ 1451.209973] ? cache_grow_end+0xa4/0x190 [ 1451.214044] getname_flags+0xd6/0x5b0 [ 1451.217850] user_path_at_empty+0x2f/0x50 [ 1451.222018] do_mount+0x15e/0x2d30 [ 1451.225590] ? copy_mount_options+0x5c/0x440 [ 1451.230008] ? copy_mount_string+0x40/0x40 [ 1451.234251] ? kmem_cache_alloc_trace+0x354/0x760 [ 1451.239118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1451.244672] ? copy_mount_options+0x30e/0x440 [ 1451.249174] ksys_mount+0xdb/0x150 [ 1451.252718] __x64_sys_mount+0xbe/0x150 [ 1451.256700] do_syscall_64+0x103/0x610 [ 1451.260593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1451.265793] RIP: 0033:0x45a89a [ 1451.269003] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1451.287905] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1451.296068] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1451.303335] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1451.310609] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1451.317918] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1451.325190] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 [ 1451.447041] XFS (loop1): Invalid superblock magic number 16:58:44 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:58:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) 16:58:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xe8030000) 16:58:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0xc000000) 16:58:44 executing program 1 (fault-call:2 fault-nth:42): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1453.480880] FAULT_INJECTION: forcing a failure. [ 1453.480880] name failslab, interval 1, probability 0, space 0, times 0 [ 1453.520604] CPU: 1 PID: 8764 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1453.527852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1453.537213] Call Trace: [ 1453.539818] dump_stack+0x172/0x1f0 [ 1453.543467] should_fail.cold+0xa/0x1b [ 1453.547365] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1453.552493] ? lock_downgrade+0x810/0x810 [ 1453.556685] ? ___might_sleep+0x163/0x280 [ 1453.560852] __should_failslab+0x121/0x190 [ 1453.565104] should_failslab+0x9/0x14 [ 1453.568956] __kmalloc_track_caller+0x2d8/0x740 [ 1453.573657] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1453.579119] ? alloc_vfsmnt+0x28/0x780 [ 1453.583019] ? kstrdup_const+0x66/0x80 [ 1453.586919] kstrdup+0x3a/0x70 [ 1453.590127] kstrdup_const+0x66/0x80 [ 1453.593841] alloc_vfsmnt+0xba/0x780 [ 1453.597563] vfs_kern_mount.part.0+0x2a/0x410 [ 1453.602069] do_mount+0x581/0x2d30 [ 1453.605613] ? copy_mount_options+0x41/0x440 [ 1453.610028] ? copy_mount_string+0x40/0x40 [ 1453.614265] ? kmem_cache_alloc_trace+0x354/0x760 [ 1453.619116] ? _copy_from_user+0xdd/0x150 [ 1453.623269] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1453.628805] ? copy_mount_options+0x30e/0x440 [ 1453.633305] ksys_mount+0xdb/0x150 [ 1453.636849] __x64_sys_mount+0xbe/0x150 [ 1453.640832] do_syscall_64+0x103/0x610 [ 1453.644733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1453.649918] RIP: 0033:0x45a89a [ 1453.653124] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1453.672032] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1453.679744] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a 16:58:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) 16:58:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80000, 0x0) bind$x25(r1, &(0x7f0000000040)={0x9, @remote={[], 0x3}}, 0x12) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1453.687016] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1453.694285] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1453.701569] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1453.708835] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) 16:58:44 executing program 1 (fault-call:2 fault-nth:43): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) [ 1453.954705] FAULT_INJECTION: forcing a failure. [ 1453.954705] name failslab, interval 1, probability 0, space 0, times 0 16:58:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xfdfdffff) [ 1454.049426] CPU: 1 PID: 8790 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1454.056672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1454.066037] Call Trace: [ 1454.068653] dump_stack+0x172/0x1f0 [ 1454.072302] should_fail.cold+0xa/0x1b [ 1454.076206] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1454.081326] ? lock_downgrade+0x810/0x810 [ 1454.085488] ? ___might_sleep+0x163/0x280 [ 1454.089649] __should_failslab+0x121/0x190 [ 1454.093897] should_failslab+0x9/0x14 [ 1454.097713] __kmalloc+0x2dc/0x740 [ 1454.101263] ? lockdep_init_map+0x10c/0x5b0 [ 1454.105599] ? prealloc_shrinker+0xdf/0x340 [ 1454.105617] prealloc_shrinker+0xdf/0x340 [ 1454.105637] sget_userns+0x7ef/0xd30 [ 1454.105651] ? kill_litter_super+0x60/0x60 [ 1454.105670] ? ns_test_super+0x50/0x50 [ 1454.114131] ? ns_test_super+0x50/0x50 [ 1454.114146] ? kill_litter_super+0x60/0x60 [ 1454.114160] sget+0x10c/0x150 [ 1454.114180] mount_bdev+0xff/0x3c0 [ 1454.140739] ? xfs_test_remount_options+0x90/0x90 [ 1454.145599] xfs_fs_mount+0x35/0x40 [ 1454.149235] mount_fs+0x106/0x3ff [ 1454.152698] ? emergency_thaw_all+0x1a0/0x1a0 [ 1454.157195] ? __init_waitqueue_head+0x36/0x90 [ 1454.161787] vfs_kern_mount.part.0+0x6f/0x410 [ 1454.166292] do_mount+0x581/0x2d30 [ 1454.169840] ? copy_mount_string+0x40/0x40 [ 1454.174082] ? copy_mount_options+0x234/0x440 [ 1454.178578] ? copy_mount_options+0x23a/0x440 [ 1454.183081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.188621] ? copy_mount_options+0x30e/0x440 [ 1454.193127] ksys_mount+0xdb/0x150 [ 1454.196672] __x64_sys_mount+0xbe/0x150 [ 1454.200654] do_syscall_64+0x103/0x610 [ 1454.204550] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1454.209740] RIP: 0033:0x45a89a [ 1454.212931] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1454.231853] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1454.239590] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1454.246865] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1454.254139] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1454.261405] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1454.268673] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:47 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x11000000) 16:58:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1018]}, 0x48) 16:58:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) ioctl$KDENABIO(r0, 0x4b36) r1 = accept4(r0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x8}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="2111dbf31500", 0x6) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) uselib(&(0x7f0000000040)='./file0/file0/file0\x00') 16:58:47 executing program 1 (fault-call:2 fault-nth:44): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xffff8000) 16:58:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1810]}, 0x48) [ 1456.590955] FAULT_INJECTION: forcing a failure. [ 1456.590955] name failslab, interval 1, probability 0, space 0, times 0 [ 1456.682035] CPU: 0 PID: 8819 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1456.689256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1456.698625] Call Trace: [ 1456.701239] dump_stack+0x172/0x1f0 [ 1456.701267] should_fail.cold+0xa/0x1b [ 1456.708765] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1456.708783] ? lock_downgrade+0x810/0x810 [ 1456.708802] ? ___might_sleep+0x163/0x280 [ 1456.722183] __should_failslab+0x121/0x190 [ 1456.726448] should_failslab+0x9/0x14 [ 1456.730281] kmem_cache_alloc_trace+0x2d1/0x760 [ 1456.734996] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1456.740116] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1456.740136] __list_lru_init+0x3d3/0x6e0 [ 1456.740158] sget_userns+0x81e/0xd30 [ 1456.752845] ? kill_litter_super+0x60/0x60 [ 1456.757090] ? ns_test_super+0x50/0x50 [ 1456.757107] ? ns_test_super+0x50/0x50 [ 1456.757122] ? kill_litter_super+0x60/0x60 [ 1456.757138] sget+0x10c/0x150 [ 1456.757159] mount_bdev+0xff/0x3c0 [ 1456.764927] ? xfs_test_remount_options+0x90/0x90 [ 1456.764964] xfs_fs_mount+0x35/0x40 [ 1456.764982] mount_fs+0x106/0x3ff [ 1456.784297] ? emergency_thaw_all+0x1a0/0x1a0 [ 1456.784316] ? __init_waitqueue_head+0x36/0x90 [ 1456.784339] vfs_kern_mount.part.0+0x6f/0x410 [ 1456.801357] do_mount+0x581/0x2d30 [ 1456.804951] ? copy_mount_string+0x40/0x40 [ 1456.809221] ? copy_mount_options+0x242/0x440 [ 1456.813727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1456.819268] ? copy_mount_options+0x30e/0x440 [ 1456.823774] ksys_mount+0xdb/0x150 [ 1456.827319] __x64_sys_mount+0xbe/0x150 [ 1456.831327] do_syscall_64+0x103/0x610 [ 1456.835223] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1456.840420] RIP: 0033:0x45a89a [ 1456.843608] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1456.862507] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1456.870216] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a 16:58:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xfffffdfd) [ 1456.877484] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1456.884753] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1456.892022] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1456.899291] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 16:58:47 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(0x0) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x18000000) 16:58:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 16:58:47 executing program 1 (fault-call:2 fault-nth:45): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000)={0x5, 0x8000, 0x800, 0x0, 0x8}, 0x14) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$CAPI_MANUFACTURER_CMD(r2, 0xc0104320, &(0x7f0000000180)={0x8a, &(0x7f0000000080)="2b0b3927fc7f4f4c108037e96b7debf2a98157ad14ccd4a4f1e0bdbefd9dbea508a794f51ac67f9b196653b4f0efc9bac203e7bc70301dccaeba38b51be5ad07e8697d71781d030babce446dbb065c2d83a3fcf9a0b4b77fbc07a6aae1bf208d04ce2e9ced55720857db0e72e05d7895c28c6d94a03766a0548fdd43eaa306de34880dde8688b64f9bdce12584a04190549ff34fd0ace707a1fe9cc731b364ef71791890ae14acc1dce3fc687140a51cb82f7fb9c66da1e7f796e8514a1b11127252a5a2c11a427300fe7416abc9cb472900d5f428e2c3f99afb5ebfd0149a90aa71a401550ce36bcd04f26633b35599b28514008dfe6b"}) 16:58:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x48) 16:58:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x8000000000) [ 1457.357701] FAULT_INJECTION: forcing a failure. [ 1457.357701] name failslab, interval 1, probability 0, space 0, times 0 [ 1457.417932] CPU: 1 PID: 8853 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1457.425176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1457.434537] Call Trace: [ 1457.437136] dump_stack+0x172/0x1f0 [ 1457.440779] should_fail.cold+0xa/0x1b [ 1457.444689] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1457.449807] ? lock_downgrade+0x810/0x810 [ 1457.453972] ? ___might_sleep+0x163/0x280 [ 1457.458128] __should_failslab+0x121/0x190 [ 1457.462378] should_failslab+0x9/0x14 [ 1457.466186] kmem_cache_alloc_trace+0x2d1/0x760 [ 1457.470861] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1457.475980] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1457.480919] __list_lru_init+0x3d3/0x6e0 [ 1457.484998] sget_userns+0x81e/0xd30 [ 1457.488718] ? kill_litter_super+0x60/0x60 [ 1457.492964] ? ns_test_super+0x50/0x50 [ 1457.496872] ? ns_test_super+0x50/0x50 [ 1457.500761] ? kill_litter_super+0x60/0x60 [ 1457.505000] sget+0x10c/0x150 [ 1457.508114] mount_bdev+0xff/0x3c0 [ 1457.511655] ? xfs_test_remount_options+0x90/0x90 [ 1457.516500] xfs_fs_mount+0x35/0x40 [ 1457.520137] mount_fs+0x106/0x3ff [ 1457.523621] ? emergency_thaw_all+0x1a0/0x1a0 [ 1457.528122] ? __init_waitqueue_head+0x36/0x90 [ 1457.532714] vfs_kern_mount.part.0+0x6f/0x410 [ 1457.537218] do_mount+0x581/0x2d30 [ 1457.540761] ? copy_mount_options+0x41/0x440 [ 1457.545178] ? copy_mount_string+0x40/0x40 [ 1457.549416] ? kmem_cache_alloc_trace+0x354/0x760 [ 1457.554264] ? _copy_from_user+0xdd/0x150 [ 1457.558419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1457.563968] ? copy_mount_options+0x30e/0x440 [ 1457.568487] ksys_mount+0xdb/0x150 [ 1457.572033] __x64_sys_mount+0xbe/0x150 [ 1457.576047] do_syscall_64+0x103/0x610 [ 1457.579950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1457.585138] RIP: 0033:0x45a89a [ 1457.588330] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1457.607233] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1457.614956] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1457.622225] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1457.629491] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1457.636772] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1457.644040] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x48) 16:58:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x29000000) 16:58:48 executing program 1 (fault-call:2 fault-nth:46): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) signalfd4(r0, &(0x7f0000000000)={0x19}, 0x8, 0x80000) 16:58:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x48) [ 1457.926524] FAULT_INJECTION: forcing a failure. [ 1457.926524] name failslab, interval 1, probability 0, space 0, times 0 [ 1457.998284] CPU: 0 PID: 8878 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1458.005520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1458.014878] Call Trace: [ 1458.017496] dump_stack+0x172/0x1f0 [ 1458.021157] should_fail.cold+0xa/0x1b [ 1458.025063] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1458.030177] ? lock_downgrade+0x810/0x810 [ 1458.034339] ? ___might_sleep+0x163/0x280 [ 1458.038502] __should_failslab+0x121/0x190 [ 1458.042750] should_failslab+0x9/0x14 [ 1458.046565] kmem_cache_alloc_trace+0x2d1/0x760 [ 1458.051250] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1458.056374] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1458.061311] __list_lru_init+0x3d3/0x6e0 [ 1458.065385] sget_userns+0x81e/0xd30 [ 1458.065402] ? kill_litter_super+0x60/0x60 [ 1458.065422] ? ns_test_super+0x50/0x50 [ 1458.065438] ? ns_test_super+0x50/0x50 [ 1458.065452] ? kill_litter_super+0x60/0x60 [ 1458.065467] sget+0x10c/0x150 [ 1458.065485] mount_bdev+0xff/0x3c0 [ 1458.092021] ? xfs_test_remount_options+0x90/0x90 [ 1458.096873] xfs_fs_mount+0x35/0x40 [ 1458.096896] mount_fs+0x106/0x3ff [ 1458.096916] ? emergency_thaw_all+0x1a0/0x1a0 [ 1458.096949] ? __init_waitqueue_head+0x36/0x90 [ 1458.108514] vfs_kern_mount.part.0+0x6f/0x410 [ 1458.108537] do_mount+0x581/0x2d30 [ 1458.108554] ? copy_mount_options+0x41/0x440 [ 1458.108573] ? copy_mount_string+0x40/0x40 [ 1458.129764] ? kmem_cache_alloc_trace+0x354/0x760 [ 1458.134620] ? _copy_from_user+0xdd/0x150 [ 1458.138778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1458.144317] ? copy_mount_options+0x30e/0x440 [ 1458.148825] ksys_mount+0xdb/0x150 [ 1458.152378] __x64_sys_mount+0xbe/0x150 [ 1458.156360] do_syscall_64+0x103/0x610 [ 1458.160736] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1458.165949] RIP: 0033:0x45a89a [ 1458.169146] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1458.188092] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1458.195801] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1458.203072] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1458.210342] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1458.217605] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1458.224871] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:50 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(0x0) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x77040000000000) 16:58:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x48) 16:58:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x3f000000) 16:58:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$caif_stream(0x25, 0x1, 0x800000000000004) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:58:50 executing program 1 (fault-call:2 fault-nth:47): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1460.127456] FAULT_INJECTION: forcing a failure. [ 1460.127456] name failslab, interval 1, probability 0, space 0, times 0 [ 1460.207587] CPU: 1 PID: 8902 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1460.214827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1460.224180] Call Trace: [ 1460.226786] dump_stack+0x172/0x1f0 [ 1460.230427] should_fail.cold+0xa/0x1b [ 1460.234349] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1460.239482] ? lock_downgrade+0x810/0x810 [ 1460.243642] ? ___might_sleep+0x163/0x280 [ 1460.247807] __should_failslab+0x121/0x190 [ 1460.252056] should_failslab+0x9/0x14 [ 1460.255866] kmem_cache_alloc_trace+0x2d1/0x760 [ 1460.260545] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1460.265663] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1460.270610] __list_lru_init+0x3d3/0x6e0 [ 1460.274685] sget_userns+0x81e/0xd30 [ 1460.278397] ? kill_litter_super+0x60/0x60 [ 1460.282646] ? ns_test_super+0x50/0x50 [ 1460.286534] ? ns_test_super+0x50/0x50 [ 1460.290437] ? kill_litter_super+0x60/0x60 [ 1460.295181] sget+0x10c/0x150 [ 1460.298293] mount_bdev+0xff/0x3c0 [ 1460.301833] ? xfs_test_remount_options+0x90/0x90 [ 1460.306675] xfs_fs_mount+0x35/0x40 [ 1460.310307] mount_fs+0x106/0x3ff [ 1460.313768] ? emergency_thaw_all+0x1a0/0x1a0 [ 1460.318269] ? __init_waitqueue_head+0x36/0x90 [ 1460.322860] vfs_kern_mount.part.0+0x6f/0x410 [ 1460.327362] do_mount+0x581/0x2d30 [ 1460.330907] ? copy_mount_options+0x41/0x440 [ 1460.335329] ? copy_mount_string+0x40/0x40 [ 1460.339565] ? kmem_cache_alloc_trace+0x354/0x760 [ 1460.344432] ? _copy_from_user+0xdd/0x150 [ 1460.348606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1460.354146] ? copy_mount_options+0x30e/0x440 [ 1460.358647] ksys_mount+0xdb/0x150 [ 1460.362192] __x64_sys_mount+0xbe/0x150 [ 1460.366179] do_syscall_64+0x103/0x610 [ 1460.370073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1460.375260] RIP: 0033:0x45a89a [ 1460.378483] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1460.397393] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 16:58:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}, 0x48) 16:58:51 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(0x0) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1460.405109] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1460.412380] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1460.419652] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1460.426925] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1460.434196] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}, 0x48) 16:58:51 executing program 1 (fault-call:2 fault-nth:48): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x80ffff00000000) 16:58:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x48) 16:58:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x40000000) [ 1460.822430] FAULT_INJECTION: forcing a failure. [ 1460.822430] name failslab, interval 1, probability 0, space 0, times 0 [ 1460.853221] CPU: 1 PID: 8932 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1460.860452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1460.869835] Call Trace: [ 1460.872438] dump_stack+0x172/0x1f0 [ 1460.876147] should_fail.cold+0xa/0x1b [ 1460.880046] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1460.885160] ? lock_downgrade+0x810/0x810 [ 1460.889319] ? ___might_sleep+0x163/0x280 [ 1460.893481] __should_failslab+0x121/0x190 [ 1460.897738] should_failslab+0x9/0x14 [ 1460.901547] __kmalloc+0x2dc/0x740 [ 1460.905105] ? __list_lru_init+0xd5/0x6e0 [ 1460.909262] __list_lru_init+0xd5/0x6e0 [ 1460.913257] sget_userns+0x81e/0xd30 [ 1460.916988] ? kill_litter_super+0x60/0x60 [ 1460.921236] ? ns_test_super+0x50/0x50 [ 1460.925129] ? ns_test_super+0x50/0x50 [ 1460.925144] ? kill_litter_super+0x60/0x60 [ 1460.925159] sget+0x10c/0x150 [ 1460.925179] mount_bdev+0xff/0x3c0 [ 1460.925194] ? xfs_test_remount_options+0x90/0x90 [ 1460.925212] xfs_fs_mount+0x35/0x40 [ 1460.925230] mount_fs+0x106/0x3ff [ 1460.925248] ? emergency_thaw_all+0x1a0/0x1a0 [ 1460.956366] ? __init_waitqueue_head+0x36/0x90 [ 1460.960976] vfs_kern_mount.part.0+0x6f/0x410 [ 1460.965490] do_mount+0x581/0x2d30 16:58:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa00]}, 0x48) 16:58:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0x36, "a670518b84288eb92d341b8885540dab052480ce25a9968e81c34bab44967338de059579612b3ed892c059e0e2f08da69f84a5b6c271"}, &(0x7f00000002c0)=0x3e) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000300)={r2, 0x0, 0x8, 0xff, 0x7, 0x7, 0x9, 0x2, {r3, @in6={{0xa, 0x4e21, 0x7, @mcast1, 0x7dc}}, 0x6, 0x311, 0x100, 0xbd, 0x8001}}, &(0x7f00000003c0)=0xb0) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={r4, 0x3f, 0x3c3, 0x4}, &(0x7f00000000c0)=0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1460.969071] ? copy_mount_options+0x41/0x440 [ 1460.973497] ? copy_mount_string+0x40/0x40 [ 1460.977746] ? kmem_cache_alloc_trace+0x354/0x760 [ 1460.982611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1460.988158] ? copy_mount_options+0x30e/0x440 [ 1460.992663] ksys_mount+0xdb/0x150 [ 1460.992684] __x64_sys_mount+0xbe/0x150 [ 1460.992703] do_syscall_64+0x103/0x610 [ 1461.004085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1461.004098] RIP: 0033:0x45a89a [ 1461.004114] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1461.004122] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1461.004137] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1461.004146] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1461.004155] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1461.004164] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1461.004173] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:51 executing program 1 (fault-call:2 fault-nth:49): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xc0c) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) getsockname(r1, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:58:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) 16:58:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x100000000000000) [ 1461.260198] FAULT_INJECTION: forcing a failure. [ 1461.260198] name failslab, interval 1, probability 0, space 0, times 0 [ 1461.271719] CPU: 1 PID: 8955 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1461.278924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1461.288290] Call Trace: [ 1461.290902] dump_stack+0x172/0x1f0 [ 1461.294562] should_fail.cold+0xa/0x1b [ 1461.298469] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1461.303581] ? lock_downgrade+0x810/0x810 [ 1461.307758] ? ___might_sleep+0x163/0x280 [ 1461.311916] __should_failslab+0x121/0x190 [ 1461.316179] should_failslab+0x9/0x14 [ 1461.319994] kmem_cache_alloc_trace+0x2d1/0x760 [ 1461.324678] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1461.329800] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1461.334741] __list_lru_init+0x3d3/0x6e0 [ 1461.338816] sget_userns+0x81e/0xd30 [ 1461.342541] ? kill_litter_super+0x60/0x60 [ 1461.346787] ? ns_test_super+0x50/0x50 [ 1461.350687] ? ns_test_super+0x50/0x50 [ 1461.354574] ? kill_litter_super+0x60/0x60 [ 1461.358809] sget+0x10c/0x150 [ 1461.361925] mount_bdev+0xff/0x3c0 [ 1461.365478] ? xfs_test_remount_options+0x90/0x90 [ 1461.370328] xfs_fs_mount+0x35/0x40 [ 1461.373969] mount_fs+0x106/0x3ff [ 1461.377428] ? emergency_thaw_all+0x1a0/0x1a0 [ 1461.381931] ? __init_waitqueue_head+0x36/0x90 [ 1461.386532] vfs_kern_mount.part.0+0x6f/0x410 [ 1461.391036] do_mount+0x581/0x2d30 [ 1461.394580] ? copy_mount_options+0x41/0x440 [ 1461.398996] ? copy_mount_string+0x40/0x40 [ 1461.403234] ? kmem_cache_alloc_trace+0x354/0x760 [ 1461.408085] ? _copy_from_user+0xdd/0x150 [ 1461.412237] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1461.417778] ? copy_mount_options+0x30e/0x440 [ 1461.422283] ksys_mount+0xdb/0x150 [ 1461.425831] __x64_sys_mount+0xbe/0x150 [ 1461.429812] do_syscall_64+0x103/0x610 [ 1461.433708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1461.438895] RIP: 0033:0x45a89a [ 1461.442088] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1461.460990] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1461.468696] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1461.475966] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1461.483231] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1461.490497] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1461.497792] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:54 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x60182300) 16:58:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 16:58:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x200000000000000) 16:58:54 executing program 1 (fault-call:2 fault-nth:50): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0xa1) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) write$ppp(r1, &(0x7f00000000c0)="1d8eecd81e7ab929812ce681172b36ab97507d189419c4216dade1a24ee97a71dc675e3aec4017c9a2ae2d7de38565a39d18b7c46a8dc57fad62506d6579c7e45fa5c6f6000e44bc97f106a33b1088f1257c1d96701ebf8e648895b9e4ab08857545726fa647ebecd4eb132c2dd6416068cd3c745af10d44d16107be2f32b962844d94719701f641c3b35cad91e0854f9ef962eb142402a341cf578f1d539904e2affdb8a00399", 0xa7) 16:58:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) [ 1463.693870] FAULT_INJECTION: forcing a failure. [ 1463.693870] name failslab, interval 1, probability 0, space 0, times 0 [ 1463.773166] CPU: 0 PID: 8981 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1463.780416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1463.789816] Call Trace: [ 1463.792427] dump_stack+0x172/0x1f0 [ 1463.796077] should_fail.cold+0xa/0x1b [ 1463.799991] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1463.805103] ? lock_downgrade+0x810/0x810 [ 1463.809268] ? ___might_sleep+0x163/0x280 [ 1463.809288] __should_failslab+0x121/0x190 [ 1463.809307] should_failslab+0x9/0x14 [ 1463.821466] kmem_cache_alloc_trace+0x2d1/0x760 [ 1463.826156] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1463.831276] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1463.836214] __list_lru_init+0x3d3/0x6e0 [ 1463.836238] sget_userns+0x81e/0xd30 [ 1463.836254] ? kill_litter_super+0x60/0x60 [ 1463.836272] ? ns_test_super+0x50/0x50 [ 1463.836288] ? ns_test_super+0x50/0x50 [ 1463.836302] ? kill_litter_super+0x60/0x60 [ 1463.836317] sget+0x10c/0x150 [ 1463.836338] mount_bdev+0xff/0x3c0 [ 1463.836352] ? xfs_test_remount_options+0x90/0x90 [ 1463.836373] xfs_fs_mount+0x35/0x40 [ 1463.852705] mount_fs+0x106/0x3ff [ 1463.852726] ? emergency_thaw_all+0x1a0/0x1a0 [ 1463.852745] ? __init_waitqueue_head+0x36/0x90 [ 1463.852768] vfs_kern_mount.part.0+0x6f/0x410 [ 1463.860875] do_mount+0x581/0x2d30 [ 1463.860893] ? copy_mount_options+0x41/0x440 [ 1463.860913] ? copy_mount_string+0x40/0x40 [ 1463.860932] ? kmem_cache_alloc_trace+0x354/0x760 [ 1463.909982] ? _copy_from_user+0xdd/0x150 [ 1463.914141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1463.919679] ? copy_mount_options+0x30e/0x440 [ 1463.924186] ksys_mount+0xdb/0x150 [ 1463.927732] __x64_sys_mount+0xbe/0x150 [ 1463.931711] do_syscall_64+0x103/0x610 [ 1463.935606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1463.940795] RIP: 0033:0x45a89a [ 1463.943995] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1463.962896] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1463.970603] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1463.977881] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1463.985150] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1463.992417] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1463.999682] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) 16:58:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x300000000000000) 16:58:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) socket$alg(0x26, 0x5, 0x0) accept4$alg(r0, 0x0, 0x0, 0x800) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:58:54 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:54 executing program 1 (fault-call:2 fault-nth:51): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) [ 1464.307615] FAULT_INJECTION: forcing a failure. [ 1464.307615] name failslab, interval 1, probability 0, space 0, times 0 [ 1464.321251] CPU: 1 PID: 9018 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1464.328467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1464.337826] Call Trace: [ 1464.340438] dump_stack+0x172/0x1f0 [ 1464.344099] should_fail.cold+0xa/0x1b [ 1464.348009] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1464.353118] ? lock_downgrade+0x810/0x810 [ 1464.357286] ? ___might_sleep+0x163/0x280 [ 1464.361476] __should_failslab+0x121/0x190 [ 1464.365733] should_failslab+0x9/0x14 [ 1464.369545] kmem_cache_alloc_trace+0x2d1/0x760 [ 1464.374230] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1464.379388] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1464.384340] __list_lru_init+0x3d3/0x6e0 [ 1464.384363] sget_userns+0x81e/0xd30 [ 1464.384378] ? kill_litter_super+0x60/0x60 [ 1464.384396] ? ns_test_super+0x50/0x50 [ 1464.400326] ? ns_test_super+0x50/0x50 [ 1464.404240] ? kill_litter_super+0x60/0x60 [ 1464.408507] sget+0x10c/0x150 [ 1464.411629] mount_bdev+0xff/0x3c0 [ 1464.415186] ? xfs_test_remount_options+0x90/0x90 [ 1464.420023] xfs_fs_mount+0x35/0x40 [ 1464.423652] mount_fs+0x106/0x3ff [ 1464.427094] ? emergency_thaw_all+0x1a0/0x1a0 [ 1464.431575] ? __init_waitqueue_head+0x36/0x90 [ 1464.436146] vfs_kern_mount.part.0+0x6f/0x410 [ 1464.440632] do_mount+0x581/0x2d30 [ 1464.444158] ? copy_mount_options+0x41/0x440 [ 1464.448553] ? copy_mount_string+0x40/0x40 [ 1464.452774] ? kmem_cache_alloc_trace+0x354/0x760 [ 1464.457606] ? _copy_from_user+0xdd/0x150 [ 1464.461745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1464.467270] ? copy_mount_options+0x30e/0x440 [ 1464.471752] ksys_mount+0xdb/0x150 [ 1464.475280] __x64_sys_mount+0xbe/0x150 [ 1464.479244] do_syscall_64+0x103/0x610 [ 1464.483125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1464.488298] RIP: 0033:0x45a89a 16:58:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0xe8030000) 16:58:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:58:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) [ 1464.491481] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1464.510374] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1464.518073] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1464.525337] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1464.532599] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1464.539862] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1464.547121] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) 16:58:55 executing program 1 (fault-call:2 fault-nth:52): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:55 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x400000000000000) 16:58:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = openat(r0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e22, 0xffffffffffff0819, @mcast2, 0x7}], 0x1c) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000080)={0xba, 0x9, 0x3, "4dba022b6844eef9b9a099e3757737cadbad1c25c005df1bf1507f65a35f1e5eca355260c660d2dff4f8aae0328b15f82d031fb4436a8efa3b6ae40f50c160d6ae9f324bc1a9c8da2ab5045c1b75e484840688640716517cc5146bc4f78012bc177756d4f8dc1af39d11878ce87bb8116bc6102b9330a189074e6cdcc158db0325bbf959ccfe1c64adde572696079ca956b0ecd57c0feb79439a7030c0034b472f075e798df25b8af5c0824ffdd3d0b38fad6bd28afe804efe5f"}) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:58:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) 16:58:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0xfdfdffff) 16:58:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) 16:58:55 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:55 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x500000000000000) 16:58:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) [ 1465.165072] FAULT_INJECTION: forcing a failure. [ 1465.165072] name failslab, interval 1, probability 0, space 0, times 0 [ 1465.223851] CPU: 0 PID: 9077 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1465.231085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1465.240442] Call Trace: [ 1465.243047] dump_stack+0x172/0x1f0 [ 1465.243072] should_fail.cold+0xa/0x1b [ 1465.243094] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1465.243113] ? lock_downgrade+0x810/0x810 [ 1465.243134] ? ___might_sleep+0x163/0x280 [ 1465.243156] __should_failslab+0x121/0x190 [ 1465.243178] should_failslab+0x9/0x14 [ 1465.243199] kmem_cache_alloc_trace+0x2d1/0x760 [ 1465.250708] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1465.264086] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1465.264107] __list_lru_init+0x3d3/0x6e0 [ 1465.264130] sget_userns+0x81e/0xd30 [ 1465.264146] ? kill_litter_super+0x60/0x60 [ 1465.264164] ? ns_test_super+0x50/0x50 [ 1465.264180] ? ns_test_super+0x50/0x50 [ 1465.298901] ? kill_litter_super+0x60/0x60 [ 1465.298917] sget+0x10c/0x150 [ 1465.298936] mount_bdev+0xff/0x3c0 [ 1465.298966] ? xfs_test_remount_options+0x90/0x90 [ 1465.322423] xfs_fs_mount+0x35/0x40 [ 1465.326067] mount_fs+0x106/0x3ff [ 1465.329529] ? emergency_thaw_all+0x1a0/0x1a0 [ 1465.334039] ? __init_waitqueue_head+0x36/0x90 [ 1465.339063] vfs_kern_mount.part.0+0x6f/0x410 [ 1465.343606] do_mount+0x581/0x2d30 [ 1465.347156] ? copy_mount_options+0x41/0x440 [ 1465.351577] ? copy_mount_string+0x40/0x40 [ 1465.355818] ? kmem_cache_alloc_trace+0x354/0x760 [ 1465.360680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1465.366230] ? copy_mount_options+0x30e/0x440 [ 1465.370739] ksys_mount+0xdb/0x150 [ 1465.374298] __x64_sys_mount+0xbe/0x150 [ 1465.378287] do_syscall_64+0x103/0x610 [ 1465.382191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1465.387381] RIP: 0033:0x45a89a [ 1465.387398] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1465.387406] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1465.387420] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a 16:58:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0xffff8000) [ 1465.387429] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1465.387439] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1465.387446] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1465.387453] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:56 executing program 1 (fault-call:2 fault-nth:53): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:56 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000540)=0x8) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x4c00, 0x0) ioctl$TCSETAW(r3, 0x5407, &(0x7f00000000c0)={0x4, 0xfff, 0x8, 0x7, 0x9, 0xffffffff, 0xf, 0x2fa, 0x9, 0x7}) io_setup(0x3, &(0x7f0000000100)=0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x12a02, 0x0) io_submit(r4, 0x2, &(0x7f0000000480)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x7, 0xdc, r0, &(0x7f0000000140)="343a06f132e72ab2f091c3592c73a6b03897dc5fc5a4d4b87e41be90b6c94bf7754138becd167d900cf786e8ac1462dccf9c989b16c29c95dc870e8a2afbee97b4c62b0ddf46a5b9271770ee880de0d708ef371c1a1b8aa76333bcf3c2fdf7a9efe11585f1b42902bcb7e3d24cf3c1f884bc88bb84afcde001cfa7c24eb7b1747b9d47003340defaa5abd6ce9d09ef0447eac569d7de768f133e3c1b2c00e77bf3ba8809998e72677d041606adc2302c2d855d6b7661743611cca68648284dd89ec46780ff7796cfed00131fe84a9a8820182d063209d20287e96913f59a413d5c34f4a143e219f67c8bef991a33b8d9", 0xf0, 0xb74, 0x0, 0x3, r5}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x8, 0xbd, r1, &(0x7f0000000340)="966212b2266b358b5d36b63b96fbd70d6e6f3bde825ae81e0733f1ccbb65243da54b38cd6283465eb7b1c38f8616637c394b3196444dbc0ba4dd855a4c0560eac406ae72ef1367c157d1cd7a4fe57362004cdb961c475aa345be313e28b419d488e144b5de7ccbfc667d8519744db81125f4f7ec08bcede61fee703fcecaf3508f1acdc7516c69ea9e34fc9e7cfebb4ba74a35746c1871e8cb0276550e45f6742656b18ac482be8d3521fc4ba97fe87c5c274fd0ddc9a8a1daef1f554d8eebba63548320e0f447bdf8592c8181bc5d", 0xcf, 0x2168, 0x0, 0x2, 0xffffffffffffff9c}]) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) socket$inet(0x2, 0x800, 0xf94) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, './file0/file0\x00'}, 0x6e) 16:58:56 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x48) 16:58:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x900000000000000) 16:58:56 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0xfffffdfd) 16:58:56 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18100000]}, 0x48) 16:58:56 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1465.889563] FAULT_INJECTION: forcing a failure. [ 1465.889563] name failslab, interval 1, probability 0, space 0, times 0 [ 1465.992484] CPU: 1 PID: 9117 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1465.999712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1465.999720] Call Trace: [ 1465.999749] dump_stack+0x172/0x1f0 [ 1465.999773] should_fail.cold+0xa/0x1b [ 1466.019651] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1466.024769] ? lock_downgrade+0x810/0x810 [ 1466.028930] ? ___might_sleep+0x163/0x280 [ 1466.033114] __should_failslab+0x121/0x190 [ 1466.037362] should_failslab+0x9/0x14 [ 1466.041178] kmem_cache_alloc_trace+0x2d1/0x760 [ 1466.045860] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1466.050989] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1466.055929] __list_lru_init+0x3d3/0x6e0 [ 1466.060016] sget_userns+0x81e/0xd30 [ 1466.060033] ? kill_litter_super+0x60/0x60 [ 1466.060050] ? ns_test_super+0x50/0x50 [ 1466.060071] ? ns_test_super+0x50/0x50 [ 1466.075796] ? kill_litter_super+0x60/0x60 [ 1466.080087] sget+0x10c/0x150 [ 1466.083223] mount_bdev+0xff/0x3c0 [ 1466.086776] ? xfs_test_remount_options+0x90/0x90 [ 1466.091629] xfs_fs_mount+0x35/0x40 [ 1466.095283] mount_fs+0x106/0x3ff [ 1466.098750] ? emergency_thaw_all+0x1a0/0x1a0 [ 1466.103253] ? __init_waitqueue_head+0x36/0x90 [ 1466.107847] vfs_kern_mount.part.0+0x6f/0x410 [ 1466.112467] do_mount+0x581/0x2d30 [ 1466.116011] ? copy_mount_options+0x41/0x440 [ 1466.120441] ? copy_mount_string+0x40/0x40 [ 1466.124683] ? kmem_cache_alloc_trace+0x354/0x760 [ 1466.129545] ? _copy_from_user+0xdd/0x150 [ 1466.133875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1466.139438] ? copy_mount_options+0x30e/0x440 [ 1466.143949] ksys_mount+0xdb/0x150 [ 1466.147509] __x64_sys_mount+0xbe/0x150 [ 1466.151493] do_syscall_64+0x103/0x610 [ 1466.155391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1466.160581] RIP: 0033:0x45a89a [ 1466.163791] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1466.182687] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1466.190394] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1466.197661] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1466.204925] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1466.212198] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1466.219466] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}, 0x48) 16:58:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xc00000000000000) 16:58:57 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:57 executing program 1 (fault-call:2 fault-nth:54): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x8000000000) 16:58:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 16:58:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x0, 0x80000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:58:57 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x101400) accept4$unix(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x6e, 0x80800) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000100)={0x0, 0x1}) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:58:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1100000000000000) 16:58:57 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1466.678323] FAULT_INJECTION: forcing a failure. [ 1466.678323] name failslab, interval 1, probability 0, space 0, times 0 [ 1466.756429] CPU: 1 PID: 9165 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1466.763670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1466.773026] Call Trace: [ 1466.775631] dump_stack+0x172/0x1f0 [ 1466.779283] should_fail.cold+0xa/0x1b [ 1466.783193] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1466.788309] ? lock_downgrade+0x810/0x810 [ 1466.792480] ? ___might_sleep+0x163/0x280 [ 1466.796646] __should_failslab+0x121/0x190 [ 1466.800898] should_failslab+0x9/0x14 [ 1466.804715] kmem_cache_alloc_node_trace+0x270/0x720 [ 1466.809831] ? kmem_cache_alloc_trace+0x354/0x760 [ 1466.814686] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1466.814707] __kmalloc_node+0x3d/0x70 [ 1466.814727] kvmalloc_node+0x68/0x100 [ 1466.814744] __list_lru_init+0x4aa/0x6e0 [ 1466.823649] sget_userns+0x81e/0xd30 [ 1466.823664] ? kill_litter_super+0x60/0x60 [ 1466.823683] ? ns_test_super+0x50/0x50 [ 1466.823699] ? ns_test_super+0x50/0x50 [ 1466.847293] ? kill_litter_super+0x60/0x60 [ 1466.851543] sget+0x10c/0x150 [ 1466.854670] mount_bdev+0xff/0x3c0 [ 1466.858216] ? xfs_test_remount_options+0x90/0x90 [ 1466.863064] xfs_fs_mount+0x35/0x40 [ 1466.866699] mount_fs+0x106/0x3ff [ 1466.870157] ? emergency_thaw_all+0x1a0/0x1a0 [ 1466.874652] ? __init_waitqueue_head+0x36/0x90 [ 1466.879240] vfs_kern_mount.part.0+0x6f/0x410 [ 1466.883740] do_mount+0x581/0x2d30 [ 1466.887287] ? copy_mount_options+0x41/0x440 [ 1466.891704] ? copy_mount_string+0x40/0x40 [ 1466.895952] ? kmem_cache_alloc_trace+0x354/0x760 [ 1466.900814] ? _copy_from_user+0xdd/0x150 [ 1466.904979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1466.910534] ? copy_mount_options+0x30e/0x440 [ 1466.915039] ksys_mount+0xdb/0x150 [ 1466.918586] __x64_sys_mount+0xbe/0x150 [ 1466.922574] do_syscall_64+0x103/0x610 [ 1466.926472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1466.931660] RIP: 0033:0x45a89a [ 1466.934856] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 16:58:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x48) 16:58:57 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1466.953775] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1466.961485] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1466.968769] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1466.976036] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1466.983320] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1466.990586] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x48) 16:58:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) fchdir(r1) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800, 0x10000, 0x3, 0xde, 0x7, {0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x1ff, 0x8, 0x5, 0x4, 0x1c0}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000100)={r3, @in6={{0xa, 0x4e22, 0xffffffffffffec7e, @local, 0x7}}, [0x80000001, 0xfffffffffffffff8, 0x1, 0x1000, 0x10000, 0x7fffffff, 0x3, 0x22, 0x1edf, 0x6, 0x3, 0x100, 0xfffffffffffffff9, 0x8, 0x3]}, &(0x7f0000000200)=0x100) 16:58:57 executing program 1 (fault-call:2 fault-nth:55): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x77040000000000) 16:58:58 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:58:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000]}, 0x48) 16:58:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1800000000000000) 16:58:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x8, 0xfffffffffffffff8, 0x945, 0x62, 0x7, 0x7eec, 0x0, 0x5, 0x75, 0xf0}, 0xb) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:58:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}, 0x48) [ 1467.499890] FAULT_INJECTION: forcing a failure. [ 1467.499890] name failslab, interval 1, probability 0, space 0, times 0 [ 1467.546797] CPU: 1 PID: 9212 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1467.554032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1467.563385] Call Trace: [ 1467.565992] dump_stack+0x172/0x1f0 [ 1467.569650] should_fail.cold+0xa/0x1b [ 1467.573556] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1467.578673] ? lock_downgrade+0x810/0x810 [ 1467.582839] ? ___might_sleep+0x163/0x280 [ 1467.582859] __should_failslab+0x121/0x190 [ 1467.582879] should_failslab+0x9/0x14 [ 1467.582897] kmem_cache_alloc_trace+0x2d1/0x760 [ 1467.599718] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1467.604834] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1467.604855] __list_lru_init+0x3d3/0x6e0 [ 1467.604879] sget_userns+0x81e/0xd30 [ 1467.604895] ? kill_litter_super+0x60/0x60 [ 1467.604914] ? ns_test_super+0x50/0x50 [ 1467.604930] ? ns_test_super+0x50/0x50 [ 1467.613918] ? kill_litter_super+0x60/0x60 [ 1467.613935] sget+0x10c/0x150 [ 1467.613965] mount_bdev+0xff/0x3c0 [ 1467.613981] ? xfs_test_remount_options+0x90/0x90 [ 1467.613999] xfs_fs_mount+0x35/0x40 [ 1467.614017] mount_fs+0x106/0x3ff [ 1467.614035] ? emergency_thaw_all+0x1a0/0x1a0 [ 1467.625845] ? __init_waitqueue_head+0x36/0x90 [ 1467.625885] vfs_kern_mount.part.0+0x6f/0x410 [ 1467.625904] do_mount+0x581/0x2d30 [ 1467.634037] ? copy_mount_string+0x40/0x40 [ 1467.634062] ? __sanitizer_cov_trace_const_cmp8+0x7/0x20 [ 1467.634078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1467.634093] ? copy_mount_options+0x30e/0x440 [ 1467.634112] ksys_mount+0xdb/0x150 [ 1467.673915] __x64_sys_mount+0xbe/0x150 16:58:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000]}, 0x48) 16:58:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) lgetxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)=@known='trusted.syz\x00', &(0x7f0000000080)=""/11, 0xb) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000000100)) [ 1467.673949] do_syscall_64+0x103/0x610 [ 1467.673981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1467.684977] RIP: 0033:0x45a89a [ 1467.684994] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1467.685002] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1467.685017] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1467.685025] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1467.685038] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1467.697073] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1467.706132] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x2900000000000000) 16:58:58 executing program 1 (fault-call:2 fault-nth:56): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:58:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x80ffff00000000) [ 1467.929589] FAULT_INJECTION: forcing a failure. [ 1467.929589] name failslab, interval 1, probability 0, space 0, times 0 [ 1467.952429] CPU: 1 PID: 9236 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1467.959641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1467.969000] Call Trace: [ 1467.971618] dump_stack+0x172/0x1f0 [ 1467.971643] should_fail.cold+0xa/0x1b [ 1467.979147] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1467.984266] ? lock_downgrade+0x810/0x810 [ 1467.988444] ? ___might_sleep+0x163/0x280 [ 1467.988472] __should_failslab+0x121/0x190 [ 1467.996837] should_failslab+0x9/0x14 [ 1467.996854] kmem_cache_alloc_trace+0x2d1/0x760 [ 1467.996874] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1468.005334] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1468.005354] __list_lru_init+0x3d3/0x6e0 [ 1468.005377] sget_userns+0x81e/0xd30 [ 1468.005394] ? kill_litter_super+0x60/0x60 [ 1468.027446] ? ns_test_super+0x50/0x50 [ 1468.031344] ? ns_test_super+0x50/0x50 [ 1468.035236] ? kill_litter_super+0x60/0x60 [ 1468.039478] sget+0x10c/0x150 [ 1468.042594] mount_bdev+0xff/0x3c0 [ 1468.046138] ? xfs_test_remount_options+0x90/0x90 [ 1468.050987] xfs_fs_mount+0x35/0x40 [ 1468.054616] mount_fs+0x106/0x3ff [ 1468.058088] ? emergency_thaw_all+0x1a0/0x1a0 [ 1468.062584] ? __init_waitqueue_head+0x36/0x90 [ 1468.067175] vfs_kern_mount.part.0+0x6f/0x410 [ 1468.071679] do_mount+0x581/0x2d30 [ 1468.075222] ? copy_mount_options+0x41/0x440 [ 1468.079639] ? copy_mount_string+0x40/0x40 [ 1468.083879] ? kmem_cache_alloc_trace+0x354/0x760 [ 1468.088731] ? _copy_from_user+0xdd/0x150 [ 1468.092884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1468.098425] ? copy_mount_options+0x30e/0x440 [ 1468.102925] ksys_mount+0xdb/0x150 [ 1468.106483] __x64_sys_mount+0xbe/0x150 [ 1468.110474] do_syscall_64+0x103/0x610 [ 1468.114369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1468.119557] RIP: 0033:0x45a89a [ 1468.122753] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1468.141656] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1468.149367] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1468.156637] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1468.163906] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1468.171175] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 16:58:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}, 0x48) [ 1468.178448] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:58:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ad", 0xffffffffffffffb8) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c3000000c6e13d64421ff621071a3c4ebae15bf7bd544658765188fec0878a3ca132f329cfb26da164a5c3853211d39e86aee91b516116db3c78682a40df600a72f475f2ee04858474b718dc768a66cd0c96f63eab9e3b3ed9e95372a15f78954ab7125ea996353cbce82e4cf5030adeeecaa407797c0cd7dae30ee2d99fc3542a8a1bd31b3965e0403041a11cf814217a8264830fdc650a272666731efabfa33931c42ca7e30a0b6748868a0fc99c9c85edd668c0c07756bbb78a65cc8d633a0ff60bd18d3abe"], &(0x7f0000000180)=0xe7) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x100) 16:59:01 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}, 0x48) 16:59:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:59:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x3f00000000000000) 16:59:01 executing program 1 (fault-call:2 fault-nth:57): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x100000000000000) [ 1470.356339] FAULT_INJECTION: forcing a failure. [ 1470.356339] name failslab, interval 1, probability 0, space 0, times 0 [ 1470.367764] CPU: 0 PID: 9265 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1470.374970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1470.384321] Call Trace: [ 1470.386935] dump_stack+0x172/0x1f0 [ 1470.390632] should_fail.cold+0xa/0x1b [ 1470.394541] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1470.399647] ? lock_downgrade+0x810/0x810 [ 1470.403802] ? ___might_sleep+0x163/0x280 [ 1470.407972] __should_failslab+0x121/0x190 [ 1470.412213] should_failslab+0x9/0x14 [ 1470.416019] kmem_cache_alloc_trace+0x2d1/0x760 [ 1470.420695] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1470.425817] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1470.430778] __list_lru_init+0x3d3/0x6e0 [ 1470.434848] sget_userns+0x81e/0xd30 [ 1470.438562] ? kill_litter_super+0x60/0x60 [ 1470.442817] ? ns_test_super+0x50/0x50 [ 1470.446709] ? ns_test_super+0x50/0x50 [ 1470.450598] ? kill_litter_super+0x60/0x60 [ 1470.454836] sget+0x10c/0x150 [ 1470.457974] mount_bdev+0xff/0x3c0 [ 1470.461555] ? xfs_test_remount_options+0x90/0x90 [ 1470.466417] xfs_fs_mount+0x35/0x40 [ 1470.470065] mount_fs+0x106/0x3ff [ 1470.473527] ? emergency_thaw_all+0x1a0/0x1a0 [ 1470.478029] ? __init_waitqueue_head+0x36/0x90 [ 1470.482622] vfs_kern_mount.part.0+0x6f/0x410 [ 1470.487148] do_mount+0x581/0x2d30 [ 1470.490714] ? copy_mount_string+0x40/0x40 [ 1470.494969] ? copy_mount_options+0x223/0x440 [ 1470.499466] ? write_comp_data+0x17/0x70 [ 1470.503534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1470.509079] ? copy_mount_options+0x30e/0x440 [ 1470.513582] ksys_mount+0xdb/0x150 [ 1470.517132] __x64_sys_mount+0xbe/0x150 [ 1470.521118] do_syscall_64+0x103/0x610 [ 1470.525011] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1470.530199] RIP: 0033:0x45a89a [ 1470.533396] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1470.552304] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1470.560033] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1470.567301] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1470.574569] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1470.581837] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1470.589121] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff]}, 0x48) 16:59:01 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$EVIOCSCLOCKID(r0, 0x80084504, &(0x7f0000ffcffc)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000000)={0xb6, 0x9, 0x100000000, 0x4, 0x4}) sendmmsg$unix(r3, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:59:01 executing program 1 (fault-call:2 fault-nth:58): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa000000]}, 0x48) [ 1470.854737] FAULT_INJECTION: forcing a failure. [ 1470.854737] name failslab, interval 1, probability 0, space 0, times 0 [ 1470.886697] CPU: 1 PID: 9290 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1470.893916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1470.903288] Call Trace: [ 1470.905901] dump_stack+0x172/0x1f0 [ 1470.909556] should_fail.cold+0xa/0x1b [ 1470.913458] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1470.918581] ? lock_downgrade+0x810/0x810 [ 1470.922745] ? ___might_sleep+0x163/0x280 [ 1470.926904] __should_failslab+0x121/0x190 [ 1470.931164] should_failslab+0x9/0x14 [ 1470.934985] kmem_cache_alloc_trace+0x2d1/0x760 [ 1470.939666] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1470.944790] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1470.949729] __list_lru_init+0x3d3/0x6e0 [ 1470.953807] sget_userns+0x81e/0xd30 [ 1470.957529] ? kill_litter_super+0x60/0x60 [ 1470.961778] ? ns_test_super+0x50/0x50 [ 1470.965683] ? ns_test_super+0x50/0x50 [ 1470.969578] ? kill_litter_super+0x60/0x60 [ 1470.973819] sget+0x10c/0x150 [ 1470.976949] mount_bdev+0xff/0x3c0 [ 1470.980505] ? xfs_test_remount_options+0x90/0x90 [ 1470.985364] xfs_fs_mount+0x35/0x40 [ 1470.989000] mount_fs+0x106/0x3ff [ 1470.992479] ? emergency_thaw_all+0x1a0/0x1a0 [ 1470.996985] ? __init_waitqueue_head+0x36/0x90 [ 1471.001589] vfs_kern_mount.part.0+0x6f/0x410 [ 1471.006097] do_mount+0x581/0x2d30 [ 1471.009658] ? copy_mount_string+0x40/0x40 [ 1471.013908] ? copy_mount_options+0x1de/0x440 [ 1471.018422] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1471.023279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1471.028827] ? copy_mount_options+0x30e/0x440 [ 1471.033338] ksys_mount+0xdb/0x150 [ 1471.036891] __x64_sys_mount+0xbe/0x150 [ 1471.040886] do_syscall_64+0x103/0x610 [ 1471.044792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1471.049994] RIP: 0033:0x45a89a [ 1471.053196] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1471.072110] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1471.079827] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1471.087100] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1471.094373] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 16:59:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) 16:59:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x200000000000000) [ 1471.101671] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1471.108954] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:04 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x4000000000000000) 16:59:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff85]}, 0x48) 16:59:04 executing program 1 (fault-call:2 fault-nth:59): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x4000, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:59:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x300000000000000) [ 1473.711351] FAULT_INJECTION: forcing a failure. [ 1473.711351] name failslab, interval 1, probability 0, space 0, times 0 [ 1473.741571] CPU: 1 PID: 9313 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1473.748776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1473.758172] Call Trace: [ 1473.760782] dump_stack+0x172/0x1f0 [ 1473.764454] should_fail.cold+0xa/0x1b [ 1473.768394] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1473.773507] ? lock_downgrade+0x810/0x810 [ 1473.777673] ? ___might_sleep+0x163/0x280 [ 1473.781833] __should_failslab+0x121/0x190 [ 1473.786087] should_failslab+0x9/0x14 [ 1473.789895] kmem_cache_alloc_trace+0x2d1/0x760 [ 1473.794572] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1473.799774] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1473.804713] __list_lru_init+0x3d3/0x6e0 [ 1473.808822] sget_userns+0x81e/0xd30 [ 1473.812540] ? kill_litter_super+0x60/0x60 [ 1473.816786] ? ns_test_super+0x50/0x50 [ 1473.820685] ? ns_test_super+0x50/0x50 [ 1473.824612] ? kill_litter_super+0x60/0x60 [ 1473.828865] sget+0x10c/0x150 [ 1473.831986] mount_bdev+0xff/0x3c0 [ 1473.835535] ? xfs_test_remount_options+0x90/0x90 [ 1473.840391] xfs_fs_mount+0x35/0x40 [ 1473.844035] mount_fs+0x106/0x3ff [ 1473.847508] ? emergency_thaw_all+0x1a0/0x1a0 [ 1473.852014] ? __init_waitqueue_head+0x36/0x90 [ 1473.856616] vfs_kern_mount.part.0+0x6f/0x410 16:59:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 16:59:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) [ 1473.861129] do_mount+0x581/0x2d30 [ 1473.864678] ? copy_mount_options+0x41/0x440 [ 1473.869099] ? copy_mount_string+0x40/0x40 [ 1473.873349] ? kmem_cache_alloc_trace+0x354/0x760 [ 1473.878208] ? _copy_from_user+0xdd/0x150 [ 1473.882379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1473.887932] ? copy_mount_options+0x30e/0x440 [ 1473.887964] ksys_mount+0xdb/0x150 [ 1473.887986] __x64_sys_mount+0xbe/0x150 [ 1473.896051] do_syscall_64+0x103/0x610 [ 1473.896076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1473.909108] RIP: 0033:0x45a89a [ 1473.909124] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1473.909135] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1473.931228] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1473.931238] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1473.931247] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 16:59:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000180)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="74d5b7277560bb2cf006efd13d748a8f234cdd5ad36109a6ed3df7fae0325b04118b3226f8d911e7a656df6126f8629b308c47885fa976b41e078424505ee53c0af9108068b95c9fc7f810a4a0ffc761ff96fac7cf78241593ce15805214ec35517f8a6ebe646c472dbe41a01f467b9a136b7e5b89e66e8c94d22e92aa49e2007c427133149d6fe103e2fa4ca17bd4d1e1cf584179ee44c0cce7f067e3d181fe467a795ae4d5847940fed91d67852cf4b885f2037ce986905c06612f4931a130c50b76", 0xc3) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) r4 = fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000300)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000400)=0xe8) getgroups(0x1, &(0x7f0000000440)=[0xffffffffffffffff]) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000001240)='/dev/dlm-control\x00', 0x400000, 0x0) statx(r7, &(0x7f0000001280)='./file0\x00', 0x400, 0x90, &(0x7f0000001340)) r8 = getpgrp(0x0) lstat(&(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() r11 = getpgrp(0x0) getresuid(&(0x7f0000000840)=0x0, &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = getpid() getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000d80)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000e80)=0xe8) stat(&(0x7f0000000ec0)='./file0/file0\x00', &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$KVM_SET_MP_STATE(r17, 0x4004ae99, &(0x7f0000001200)=0x6) r18 = getpgid(0xffffffffffffffff) r19 = getuid() stat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f0000001100)=[{&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000002c0)=[{&(0x7f00000001c0)="a2b10bc0bbea3c41f8903326e6f3458ec7dddd2e385290b54fff648f80f9a0b9e541b2be264fc88b7e880afca3e659093639b63b30", 0x35}, {&(0x7f0000000200)="8d8f5a7fed4e903e4646", 0xa}], 0x2, &(0x7f0000000480)=[@rights={0x20, 0x1, 0x1, [r2, r0, r2, r1]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}], 0x40, 0x4004000}, {&(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000740)=[{&(0x7f0000000540)="cbaacbf40e56da02cc41a280ab3e868bb98f84a7475fa7774ec8913e72c86c3da9fee618beeb9416bf046bd5018116840a10d5b7b01320fb09ff5e59033b18dd1531f158b1c3c70294e61350686a70ff9b40b02ca3c0dd5c5d77aa58d64fd48a148e481d9e70e98373f8521b01b5ae39223808e079fb60239efd9e6df215d6b5ccd433d751a634b9d0", 0x89}, {&(0x7f0000000600)="06c38f68498f5ab53670b7d0cf94e727e01a5ecb6f136bf69b03fedc95a003ecc41783", 0x23}, {&(0x7f0000000640)="d314cc0283c123b21bfea462e62d83aefc130eed9d0ba5ac790c6600510e21049d4b67989b4df885f0fdc22f76de4fa1f8634bce6750b07a12c08a95ccdab78082e893069b5ac0f39e6526364663cf9eced2e8b33bb51f737fec232034e99f5f79e174616bc7371ec02cef6aa3f3d2e74dc64766a623116133109afbaedac93ed115aa68", 0x84}, {&(0x7f0000000700)="3b47dd08161f85660ef2d003528ef4cdeaceb69a7c2a", 0x16}], 0x4, &(0x7f0000000a80)=[@cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x18, 0x1, 0x1, [r2]}], 0x58, 0x10}, {&(0x7f0000000b00)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000d40)=[{&(0x7f0000000b80)="f5696ad0e97b8ca6f8a9d8592c77f1c852d420fa1b0e5f7eb8e0a9b863d5bddcb98e9e272613e222f901322bd28389a744b891075e21682dcb603854333937af2311f7015cd7acf40631287186ea314df12e47d76746db02d5e297daa0076f8beb998d0459f2db7dfb69c9c5e24e7eacdd299b4b49f3cc304a6755df2c02b9f8c9bcd19d9556d1f536347cf0a98a636933fdfe11552dad87531fed1d1b6ce2146a0f46f65b2753050cf01003ddbf471f735f06f50769d628399b97628aa25b0ccc31d8f984fd8286eaf18294d1e2546f", 0xd0}, {&(0x7f0000000c80)="e25a01895394e1fe628e1f0e054b757d9011c0e39400496a8715a40ab0d31f2f9c524f08ad717c29998b359653d0eb14f6dd5d4f88e293c7fb030fe48920c9f37f5e31992a17e12d4c527f93f37e010d433323efd879180448b50242b0f190446bfc59ea33c92dba03620ba6906bd421da96b9d79e9d833108e91a6118ca82dd6615c8cd48f8050dbd128ad7f56574ea", 0x90}, {&(0x7f0000000940)="5aa80559a3bb8cbc0514eed1c610b35605e96b98746f715c5ae5ac2e38bc4fe63f33c8e5b44e651d007c273f9a213f8eb91cc49e852d6abc4aed", 0x3a}], 0x3, &(0x7f0000001040)=[@rights={0x28, 0x1, 0x1, [r1, r2, r1, r0, r2]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @rights={0x20, 0x1, 0x1, [r3, r2, r1]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}], 0x88, 0x4000}], 0x3, 0x40000) 16:59:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) [ 1473.931256] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1473.931279] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) 16:59:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xe803000000000000) 16:59:07 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) fremovexattr(r1, &(0x7f0000000000)=@random={'osx.', 'ecb(arc4)-generic\x00'}) 16:59:07 executing program 1 (fault-call:2 fault-nth:60): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) 16:59:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x400000000000000) 16:59:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xfdfdffff00000000) [ 1476.762325] cgroup: fork rejected by pids controller in /syz4 [ 1476.801678] FAULT_INJECTION: forcing a failure. [ 1476.801678] name failslab, interval 1, probability 0, space 0, times 0 16:59:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) [ 1476.881777] CPU: 0 PID: 9368 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1476.889269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1476.898625] Call Trace: [ 1476.901238] dump_stack+0x172/0x1f0 [ 1476.904887] should_fail.cold+0xa/0x1b [ 1476.908792] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1476.913904] ? lock_downgrade+0x810/0x810 [ 1476.918062] ? ___might_sleep+0x163/0x280 [ 1476.922221] __should_failslab+0x121/0x190 [ 1476.926481] should_failslab+0x9/0x14 [ 1476.930315] kmem_cache_alloc_trace+0x2d1/0x760 [ 1476.935011] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1476.940131] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1476.945066] __list_lru_init+0x3d3/0x6e0 [ 1476.945087] sget_userns+0x81e/0xd30 [ 1476.945101] ? kill_litter_super+0x60/0x60 [ 1476.945119] ? ns_test_super+0x50/0x50 [ 1476.945133] ? ns_test_super+0x50/0x50 [ 1476.945146] ? kill_litter_super+0x60/0x60 [ 1476.945162] sget+0x10c/0x150 [ 1476.972249] mount_bdev+0xff/0x3c0 [ 1476.975801] ? xfs_test_remount_options+0x90/0x90 [ 1476.980655] xfs_fs_mount+0x35/0x40 [ 1476.984292] mount_fs+0x106/0x3ff [ 1476.987756] ? emergency_thaw_all+0x1a0/0x1a0 [ 1476.992261] ? __init_waitqueue_head+0x36/0x90 [ 1476.996863] vfs_kern_mount.part.0+0x6f/0x410 [ 1477.001375] do_mount+0x581/0x2d30 [ 1477.004926] ? copy_mount_options+0x41/0x440 [ 1477.009366] ? copy_mount_string+0x40/0x40 [ 1477.013609] ? kmem_cache_alloc_trace+0x354/0x760 [ 1477.018468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1477.024019] ? copy_mount_options+0x30e/0x440 [ 1477.028532] ksys_mount+0xdb/0x150 16:59:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) [ 1477.032094] __x64_sys_mount+0xbe/0x150 [ 1477.036081] do_syscall_64+0x103/0x610 [ 1477.040001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1477.045199] RIP: 0033:0x45a89a [ 1477.048401] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1477.067305] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1477.067321] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a 16:59:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) r2 = dup2(r0, r0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@exit_looper], 0xc9, 0x0, &(0x7f0000000040)="866e0509bab91289ae1107904a99bfa28cf8ec249579feea9dc446f3fb039f9e3e3596deb7130a94013ae8889dcd248e1f40f7f8eb82c04eec0f0b179c093c1c46d73efc6dd9ec2324c91bb48045bca2d8b6cc0870a7f5a4820c887ef5088993dbf3929820b195b2df848ed13a439807480dba01b1c8faff6981bf1d586f26eb6a25f887ceb26a54a8e7738180ea67276260560af2099cd7f7921bf7b902ce0433f2843754946b63d96950cbd0f98f73780a648b54a2d18b16bd6efb667012086d3c7f107a476fc711"}) [ 1477.067331] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1477.067341] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1477.067350] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1477.067358] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) 16:59:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x500000000000000) 16:59:08 executing program 1 (fault-call:2 fault-nth:61): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1477.644996] FAULT_INJECTION: forcing a failure. [ 1477.644996] name failslab, interval 1, probability 0, space 0, times 0 [ 1477.667977] CPU: 1 PID: 9401 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1477.675194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1477.684551] Call Trace: [ 1477.687163] dump_stack+0x172/0x1f0 [ 1477.690812] should_fail.cold+0xa/0x1b [ 1477.694717] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1477.699830] ? lock_downgrade+0x810/0x810 [ 1477.703998] ? ___might_sleep+0x163/0x280 [ 1477.708162] __should_failslab+0x121/0x190 [ 1477.712422] should_failslab+0x9/0x14 [ 1477.716242] kmem_cache_alloc_trace+0x2d1/0x760 [ 1477.720925] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1477.726056] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1477.731004] __list_lru_init+0x3d3/0x6e0 [ 1477.735337] sget_userns+0x81e/0xd30 [ 1477.739055] ? kill_litter_super+0x60/0x60 [ 1477.743293] ? ns_test_super+0x50/0x50 [ 1477.747181] ? ns_test_super+0x50/0x50 [ 1477.751067] ? kill_litter_super+0x60/0x60 [ 1477.755305] sget+0x10c/0x150 [ 1477.758417] mount_bdev+0xff/0x3c0 [ 1477.761967] ? xfs_test_remount_options+0x90/0x90 [ 1477.766818] xfs_fs_mount+0x35/0x40 [ 1477.770482] mount_fs+0x106/0x3ff [ 1477.773949] ? emergency_thaw_all+0x1a0/0x1a0 [ 1477.778448] ? __init_waitqueue_head+0x36/0x90 [ 1477.783042] vfs_kern_mount.part.0+0x6f/0x410 [ 1477.787632] do_mount+0x581/0x2d30 [ 1477.791175] ? copy_mount_options+0x41/0x440 [ 1477.795589] ? copy_mount_string+0x40/0x40 [ 1477.799825] ? kmem_cache_alloc_trace+0x354/0x760 [ 1477.804673] ? _copy_from_user+0xdd/0x150 [ 1477.808830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1477.814399] ? copy_mount_options+0x30e/0x440 [ 1477.818904] ksys_mount+0xdb/0x150 [ 1477.822448] __x64_sys_mount+0xbe/0x150 [ 1477.826435] do_syscall_64+0x103/0x610 [ 1477.830336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1477.835522] RIP: 0033:0x45a89a [ 1477.838732] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1477.857670] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1477.865393] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1477.872673] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1477.879949] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1477.887219] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1477.894487] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 [ 1479.942165] IPVS: ftp: loaded support on port[0] = 21 [ 1480.119705] chnl_net:caif_netlink_parms(): no params data found [ 1480.139506] device bridge_slave_1 left promiscuous mode [ 1480.146090] bridge0: port 2(bridge_slave_1) entered disabled state [ 1480.194366] device bridge_slave_0 left promiscuous mode [ 1480.199884] bridge0: port 1(bridge_slave_0) entered disabled state [ 1483.534915] device hsr_slave_1 left promiscuous mode [ 1483.588564] device hsr_slave_0 left promiscuous mode [ 1483.629481] team0 (unregistering): Port device team_slave_1 removed [ 1483.639832] team0 (unregistering): Port device team_slave_0 removed [ 1483.650068] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1483.699709] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1483.789419] bond0 (unregistering): Released all slaves [ 1483.923574] bridge0: port 1(bridge_slave_0) entered blocking state [ 1483.930513] bridge0: port 1(bridge_slave_0) entered disabled state [ 1483.937606] device bridge_slave_0 entered promiscuous mode [ 1483.945584] bridge0: port 2(bridge_slave_1) entered blocking state [ 1483.951959] bridge0: port 2(bridge_slave_1) entered disabled state [ 1483.959363] device bridge_slave_1 entered promiscuous mode [ 1483.975119] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1483.984553] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1484.002954] team0: Port device team_slave_0 added [ 1484.009921] team0: Port device team_slave_1 added [ 1484.076248] device hsr_slave_0 entered promiscuous mode [ 1484.113385] device hsr_slave_1 entered promiscuous mode [ 1484.172796] bridge0: port 2(bridge_slave_1) entered blocking state [ 1484.179219] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1484.209445] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1484.221527] bridge0: port 2(bridge_slave_1) entered disabled state [ 1484.240818] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1484.249201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1484.256254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1484.266598] 8021q: adding VLAN 0 to HW filter on device team0 [ 1484.334831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1484.342611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1484.350334] bridge0: port 1(bridge_slave_0) entered blocking state [ 1484.356748] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1484.364042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1484.371651] bridge0: port 2(bridge_slave_1) entered blocking state [ 1484.378064] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1484.395285] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1484.403638] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1484.412437] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1484.428114] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1484.438157] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1484.450032] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1484.458421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1484.473264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1484.486472] 8021q: adding VLAN 0 to HW filter on device batadv0 16:59:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000480)=""/136) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000540), &(0x7f0000000580)=0x4) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad9a78f57f042ec2e47d270877a42343774dd84705829f1e10c6a8e99c9a1b70fe9723ea374f1e8e62a0a9b274ed55dc26ab", 0xf70cd07726e88c7e) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000440)=0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @local}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000400)=0x8) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000380)={'vxcan1\x00', {0x2, 0x4e21, @loopback}}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000300)=[@cred={0x20, 0x1, 0x2, r2, r4, r6}, @cred={0x20, 0x1, 0x2, r2, r4, r6}, @cred={0x20, 0x1, 0x2, r2, r5, r6}], 0x60}], 0x1, 0x0) 16:59:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) 16:59:18 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xffffffff00000000) 16:59:18 executing program 1 (fault-call:2 fault-nth:62): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x900000000000000) 16:59:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) [ 1487.618517] FAULT_INJECTION: forcing a failure. [ 1487.618517] name failslab, interval 1, probability 0, space 0, times 0 [ 1487.718259] CPU: 0 PID: 9428 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1487.725504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.725512] Call Trace: [ 1487.725570] dump_stack+0x172/0x1f0 [ 1487.725597] should_fail.cold+0xa/0x1b [ 1487.745064] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1487.750177] ? lock_downgrade+0x810/0x810 [ 1487.754345] ? ___might_sleep+0x163/0x280 [ 1487.758505] __should_failslab+0x121/0x190 [ 1487.762780] should_failslab+0x9/0x14 [ 1487.766621] kmem_cache_alloc_trace+0x2d1/0x760 [ 1487.771317] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1487.776431] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1487.781365] __list_lru_init+0x3d3/0x6e0 [ 1487.785432] sget_userns+0x81e/0xd30 [ 1487.789147] ? kill_litter_super+0x60/0x60 [ 1487.793388] ? ns_test_super+0x50/0x50 [ 1487.797274] ? ns_test_super+0x50/0x50 [ 1487.801161] ? kill_litter_super+0x60/0x60 [ 1487.805393] sget+0x10c/0x150 [ 1487.808500] mount_bdev+0xff/0x3c0 [ 1487.812039] ? xfs_test_remount_options+0x90/0x90 [ 1487.816900] xfs_fs_mount+0x35/0x40 [ 1487.820552] mount_fs+0x106/0x3ff [ 1487.824022] ? emergency_thaw_all+0x1a0/0x1a0 [ 1487.828519] ? __init_waitqueue_head+0x36/0x90 [ 1487.833113] vfs_kern_mount.part.0+0x6f/0x410 [ 1487.837615] do_mount+0x581/0x2d30 [ 1487.841155] ? copy_mount_options+0x41/0x440 [ 1487.845571] ? copy_mount_string+0x40/0x40 [ 1487.849807] ? kmem_cache_alloc_trace+0x354/0x760 [ 1487.854680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1487.860216] ? copy_mount_options+0x30e/0x440 [ 1487.864719] ksys_mount+0xdb/0x150 [ 1487.868262] __x64_sys_mount+0xbe/0x150 [ 1487.872242] do_syscall_64+0x103/0x610 [ 1487.876136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1487.881320] RIP: 0033:0x45a89a [ 1487.884513] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1487.903423] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1487.911125] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a 16:59:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) recvmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000000)=@can={0x1d, 0x0}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/176, 0xb0}, {&(0x7f0000000140)=""/229, 0xe5}], 0x2, &(0x7f0000000300)=""/120, 0x78}, 0x100) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f00000003c0)=@xdp={0x2c, 0x7, r2, 0x3e}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000500)="18996238cb7b1c78a78fae8885a462b5fe011d25a98a336522ea0b7972102d0dcf67806627fad345f106a5fd802eb71e6adf7167b71752fe95547a23e03222b90c51249cff4a1ef8e35fc70be31440474ca34f2c5e9103ac2192a93bbb66d4d95eba562722e70f8b31bae2aa2a18ad755c6b36ea048d4fc0e93378ac446395b95d51d3e20ce470aea32de6", 0x8b}, {&(0x7f0000000440)="c370a2c59420ee4228f15c0d03386296244b6a418a896648738daa9ec6f43e10862e1b04793691c7cba6785d93cb1405c7edf132b8614de9653225b10218e5f95fad81ad29e4c4b533446ad650a61cb94332bfc133458165952d841dd7439bfcc91eb87b9b1b", 0x66}, {&(0x7f00000005c0)="ea517ab07f0758ec370cbbb22c503e70ae86d9519f3c119daf116e59296b46417921c9259d19f45568f7317b733c88cffa4578c2c60ea69e97", 0x39}, {&(0x7f0000000600)="8ec03988ec386feb7fd736e683b7ad5849bb3292b92d7f014cd94c09c423589adf6a8be2a38ecfda2f51523a03680473ed3c9fead2021abffdc5f07f6f51543a5b55e5cc8db2393286ce6d8ffa4ea470b88a239e1569d3d013c8b5622ddc488823019b47105856a1d405618d6e38ff70bccff17c471917dd01e5d99488979e59d5c2fae712779cc60f9c", 0x8a}], 0x4, &(0x7f0000001340)=[{0x78, 0x112, 0x8d0, "ee5558b3357f9ccb46e6d0231c6fc556d3e85ea4322753fd46a4f545460edd5362fe8e7003f77b6c565c90f00575477b609801caa7cb68e9caebef386d3cee733a398dd1c42103de70b02c0e0a25993ede73de98e17a6688b59192660f00ee0db575ea7473431ead"}, {0x1010, 0x107, 0x7fff, "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"}, {0x110, 0x187, 0x800, "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"}, {0xc0, 0x114, 0x3ff, "3c43e8e4da967e7d46d798e683c51b95425ea4cb77ccf8e2e8c2d8d3d2c79dd9bda21d0be38c3676a35cf881e2f572074157a52cbda5f2a7adb9aa9cc83ca4d781abf30fec97769f9914edcac2f79306dd71cabefe9d225eb98a0fb11f3293f010c680c0baa4401cf2b0db72b782b23e5246b15935d5503f6dbd1e3b4959ebd90958b61a68c10835a8b9079da7f75c45699a5c46adec60a51e16ec1ea2c0a52da89c8745e9a8dbab97c647ac"}, {0x38, 0x11c, 0x100, "b394d3ea84a3c50196f856a4bacc5cc7363f6898607df0ff5a39a9870d6f758394c0"}, {0x20, 0x11, 0x479c, "f7faf2534da8de557ffa127f"}], 0x12b0}, 0x40) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1487.918426] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1487.925691] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1487.932960] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1487.940230] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) 16:59:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socket$can_raw(0x1d, 0x3, 0x1) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x18) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:59:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xffffffffffffffff) 16:59:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1810000000000000]}, 0x48) 16:59:18 executing program 1 (fault-call:2 fault-nth:63): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0xc00000000000000) [ 1488.310824] FAULT_INJECTION: forcing a failure. [ 1488.310824] name failslab, interval 1, probability 0, space 0, times 0 [ 1488.396644] CPU: 0 PID: 9467 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1488.403880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.413240] Call Trace: [ 1488.415848] dump_stack+0x172/0x1f0 [ 1488.419490] should_fail.cold+0xa/0x1b [ 1488.423392] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1488.428507] ? lock_downgrade+0x810/0x810 [ 1488.432658] ? ___might_sleep+0x163/0x280 [ 1488.436810] __should_failslab+0x121/0x190 [ 1488.441053] should_failslab+0x9/0x14 [ 1488.444861] kmem_cache_alloc_trace+0x2d1/0x760 [ 1488.449561] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1488.454690] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1488.459624] __list_lru_init+0x3d3/0x6e0 [ 1488.463697] sget_userns+0x81e/0xd30 [ 1488.467411] ? kill_litter_super+0x60/0x60 [ 1488.471654] ? ns_test_super+0x50/0x50 [ 1488.475545] ? ns_test_super+0x50/0x50 [ 1488.479434] ? kill_litter_super+0x60/0x60 [ 1488.483669] sget+0x10c/0x150 [ 1488.486780] mount_bdev+0xff/0x3c0 [ 1488.490320] ? xfs_test_remount_options+0x90/0x90 [ 1488.495165] xfs_fs_mount+0x35/0x40 [ 1488.498797] mount_fs+0x106/0x3ff [ 1488.502256] ? emergency_thaw_all+0x1a0/0x1a0 [ 1488.506774] ? __init_waitqueue_head+0x36/0x90 [ 1488.511370] vfs_kern_mount.part.0+0x6f/0x410 [ 1488.515875] do_mount+0x581/0x2d30 [ 1488.519415] ? copy_mount_options+0x41/0x440 [ 1488.523831] ? copy_mount_string+0x40/0x40 [ 1488.528068] ? kmem_cache_alloc_trace+0x354/0x760 [ 1488.532923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1488.538474] ? copy_mount_options+0x30e/0x440 [ 1488.542990] ksys_mount+0xdb/0x150 [ 1488.546537] __x64_sys_mount+0xbe/0x150 [ 1488.550522] do_syscall_64+0x103/0x610 [ 1488.554416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1488.559601] RIP: 0033:0x45a89a [ 1488.562792] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1488.581715] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1488.589424] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1488.596708] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1488.603985] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1488.611249] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1488.618515] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000040)) 16:59:21 executing program 1 (fault-call:2 fault-nth:64): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0x48) 16:59:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x1100000000000000) 16:59:21 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20018000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r4, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000004}, 0x800) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1490.718810] FAULT_INJECTION: forcing a failure. [ 1490.718810] name failslab, interval 1, probability 0, space 0, times 0 16:59:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) [ 1490.793305] CPU: 1 PID: 9489 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1490.800530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1490.809888] Call Trace: [ 1490.812522] dump_stack+0x172/0x1f0 [ 1490.816185] should_fail.cold+0xa/0x1b [ 1490.820095] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1490.825216] ? lock_downgrade+0x810/0x810 [ 1490.829388] ? ___might_sleep+0x163/0x280 [ 1490.833560] __should_failslab+0x121/0x190 [ 1490.837811] should_failslab+0x9/0x14 [ 1490.841627] kmem_cache_alloc_trace+0x2d1/0x760 [ 1490.846309] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1490.851434] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1490.856402] __list_lru_init+0x3d3/0x6e0 [ 1490.860501] sget_userns+0x81e/0xd30 [ 1490.864224] ? kill_litter_super+0x60/0x60 [ 1490.868482] ? ns_test_super+0x50/0x50 [ 1490.872390] ? ns_test_super+0x50/0x50 [ 1490.876285] ? kill_litter_super+0x60/0x60 [ 1490.880525] sget+0x10c/0x150 [ 1490.883644] mount_bdev+0xff/0x3c0 [ 1490.887185] ? xfs_test_remount_options+0x90/0x90 [ 1490.892033] xfs_fs_mount+0x35/0x40 [ 1490.895668] mount_fs+0x106/0x3ff [ 1490.899140] ? emergency_thaw_all+0x1a0/0x1a0 [ 1490.903654] ? __init_waitqueue_head+0x36/0x90 [ 1490.908244] vfs_kern_mount.part.0+0x6f/0x410 [ 1490.912751] do_mount+0x581/0x2d30 [ 1490.916295] ? copy_mount_options+0x41/0x440 [ 1490.920714] ? copy_mount_string+0x40/0x40 [ 1490.924967] ? kmem_cache_alloc_trace+0x354/0x760 [ 1490.929834] ? _copy_from_user+0xdd/0x150 [ 1490.933991] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1490.939560] ? copy_mount_options+0x30e/0x440 [ 1490.944064] ksys_mount+0xdb/0x150 [ 1490.947612] __x64_sys_mount+0xbe/0x150 [ 1490.951595] do_syscall_64+0x103/0x610 [ 1490.955495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1490.960687] RIP: 0033:0x45a89a [ 1490.963881] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1490.982787] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 16:59:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) 16:59:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 16:59:21 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1490.990499] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1490.997769] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1491.005038] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1491.012309] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1491.019576] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) 16:59:22 executing program 1 (fault-call:2 fault-nth:65): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x48) 16:59:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:59:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x1800000000000000) 16:59:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}, 0x48) [ 1491.333655] FAULT_INJECTION: forcing a failure. [ 1491.333655] name failslab, interval 1, probability 0, space 0, times 0 16:59:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x101100, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[@mss={0x2, 0xfd}, @timestamp], 0x2) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x101, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1491.439587] CPU: 0 PID: 9526 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1491.446827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1491.456187] Call Trace: [ 1491.458794] dump_stack+0x172/0x1f0 [ 1491.462450] should_fail.cold+0xa/0x1b [ 1491.466351] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1491.471464] ? lock_downgrade+0x810/0x810 [ 1491.475622] ? ___might_sleep+0x163/0x280 [ 1491.479789] __should_failslab+0x121/0x190 [ 1491.484213] should_failslab+0x9/0x14 [ 1491.488029] kmem_cache_alloc_trace+0x2d1/0x760 [ 1491.492707] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1491.497827] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1491.502770] __list_lru_init+0x3d3/0x6e0 [ 1491.506852] sget_userns+0x81e/0xd30 [ 1491.510574] ? kill_litter_super+0x60/0x60 [ 1491.514820] ? ns_test_super+0x50/0x50 [ 1491.514837] ? ns_test_super+0x50/0x50 [ 1491.514865] ? kill_litter_super+0x60/0x60 [ 1491.514881] sget+0x10c/0x150 [ 1491.514916] mount_bdev+0xff/0x3c0 [ 1491.514931] ? xfs_test_remount_options+0x90/0x90 16:59:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x48) [ 1491.514958] xfs_fs_mount+0x35/0x40 [ 1491.530092] mount_fs+0x106/0x3ff [ 1491.530113] ? emergency_thaw_all+0x1a0/0x1a0 [ 1491.530132] ? __init_waitqueue_head+0x36/0x90 [ 1491.530153] vfs_kern_mount.part.0+0x6f/0x410 [ 1491.559110] do_mount+0x581/0x2d30 [ 1491.562685] ? copy_mount_string+0x40/0x40 [ 1491.566940] ? copy_mount_options+0x242/0x440 [ 1491.571466] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1491.577017] ? copy_mount_options+0x30e/0x440 [ 1491.581528] ksys_mount+0xdb/0x150 [ 1491.585086] __x64_sys_mount+0xbe/0x150 [ 1491.589079] do_syscall_64+0x103/0x610 [ 1491.592996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1491.598192] RIP: 0033:0x45a89a [ 1491.601390] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1491.620296] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1491.628042] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1491.628052] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1491.628062] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1491.628072] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1491.628081] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}, 0x48) 16:59:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x30000, 0x0) fcntl$setpipe(r0, 0x407, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x6, 0x181000) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x101000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x20000000000, 0x4) r3 = socket$isdn_base(0x22, 0x3, 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x3, 0x3, 0x3, 0x0, {0xa, 0x4e23, 0x1, @local, 0xffffffffffffffbf}}}, 0x32) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80, 0x0) setsockopt$IP_VS_SO_SET_DEL(r4, 0x0, 0x484, &(0x7f0000000040)={0x0, @remote, 0x4e20, 0x1, 'nq\x00', 0x4, 0x3, 0x3}, 0x2c) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r6, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:59:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x48) 16:59:24 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:24 executing program 1 (fault-call:2 fault-nth:66): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x2900000000000000) 16:59:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x40) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x81) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000140)=""/17) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f0000000080)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 16:59:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000]}, 0x48) 16:59:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x80) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000040)={{0x2, 0x2, 0x3, 0x2, 0xaec}, 0x6, 0x5ae9, 'id1\x00', 'timer0\x00', 0x0, 0x602, 0x4, 0x3, 0x75149ca7}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) write$smack_current(r0, &(0x7f00000001c0)='-md5sum*)wlan0!trustedGPLmd5sum\x00', 0x20) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1494.138751] FAULT_INJECTION: forcing a failure. [ 1494.138751] name failslab, interval 1, probability 0, space 0, times 0 [ 1494.202423] CPU: 1 PID: 9573 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1494.209665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1494.219036] Call Trace: [ 1494.221662] dump_stack+0x172/0x1f0 [ 1494.225307] should_fail.cold+0xa/0x1b [ 1494.229222] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1494.234362] ? lock_downgrade+0x810/0x810 [ 1494.238516] ? ___might_sleep+0x163/0x280 [ 1494.242686] __should_failslab+0x121/0x190 [ 1494.246938] should_failslab+0x9/0x14 [ 1494.250775] __kmalloc+0x2dc/0x740 [ 1494.254327] ? __list_lru_init+0xd5/0x6e0 [ 1494.258493] __list_lru_init+0xd5/0x6e0 [ 1494.262486] sget_userns+0x84d/0xd30 [ 1494.266215] ? kill_litter_super+0x60/0x60 [ 1494.270473] ? ns_test_super+0x50/0x50 [ 1494.274371] ? ns_test_super+0x50/0x50 [ 1494.278260] ? kill_litter_super+0x60/0x60 [ 1494.282506] sget+0x10c/0x150 [ 1494.285646] mount_bdev+0xff/0x3c0 [ 1494.289194] ? xfs_test_remount_options+0x90/0x90 [ 1494.294561] xfs_fs_mount+0x35/0x40 [ 1494.298203] mount_fs+0x106/0x3ff [ 1494.301671] ? emergency_thaw_all+0x1a0/0x1a0 [ 1494.306179] ? __init_waitqueue_head+0x36/0x90 [ 1494.310775] vfs_kern_mount.part.0+0x6f/0x410 [ 1494.315288] do_mount+0x581/0x2d30 [ 1494.318841] ? copy_mount_options+0x41/0x440 [ 1494.323259] ? copy_mount_string+0x40/0x40 [ 1494.327518] ? kmem_cache_alloc_trace+0x354/0x760 [ 1494.332386] ? _copy_from_user+0xdd/0x150 [ 1494.336564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1494.342109] ? copy_mount_options+0x30e/0x440 [ 1494.346622] ksys_mount+0xdb/0x150 [ 1494.350176] __x64_sys_mount+0xbe/0x150 [ 1494.354168] do_syscall_64+0x103/0x610 [ 1494.358070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1494.363268] RIP: 0033:0x45a89a [ 1494.366475] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1494.385394] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1494.393122] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a 16:59:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa00000000000000]}, 0x48) 16:59:25 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1494.400409] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1494.407685] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1494.414966] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1494.422242] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x9a5b, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) getitimer(0x3, &(0x7f0000000000)) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000140)={0x0, 0x0, @ioapic}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)=0x0) ptrace$peekuser(0x3, r3, 0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="7884410e55cbe0bbb3f4ea4e3e1951cb7be003ff771c327886a348a82d0cc865319fc3f25d3ce02855c2f5a9e3a8817da5c509bb5e0e28383c9468e2845347e3b05539ccce883a140be9e724c3d30d7db41d9d636179182535eeff54af0b0999b6d16220225e7f26393e1fcfef00283dcc9f00c837ee866aa912b71c25dd3c6c078000a3c2daff493613bd6f4f50e342dafffdb7ecf5d414e89a235f84", 0x9d) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:59:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 16:59:25 executing program 1 (fault-call:2 fault-nth:67): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x3f00000000000000) 16:59:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80000, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1, 0x200000) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x80, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x200, 0x0) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x10000, 0x200002) r3 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000580)='sysfs\x00', 0x10000, 0x0) listxattr(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000480)=""/131, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r2, 0x0, 0x9, &(0x7f0000000240)='/dev/kvm\x00'}, 0x30) r4 = syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x1, 0x1c000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x765f) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000380), &(0x7f00000003c0)=0xc) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 1494.724799] FAULT_INJECTION: forcing a failure. [ 1494.724799] name failslab, interval 1, probability 0, space 0, times 0 [ 1494.769705] CPU: 0 PID: 9606 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1494.776939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1494.786312] Call Trace: [ 1494.786343] dump_stack+0x172/0x1f0 [ 1494.786369] should_fail.cold+0xa/0x1b [ 1494.786390] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1494.792606] ? lock_downgrade+0x810/0x810 [ 1494.792626] ? ___might_sleep+0x163/0x280 [ 1494.792644] __should_failslab+0x121/0x190 [ 1494.801618] should_failslab+0x9/0x14 16:59:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) [ 1494.801637] kmem_cache_alloc_node_trace+0x270/0x720 [ 1494.801656] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1494.828491] __kmalloc_node+0x3d/0x70 [ 1494.832306] kvmalloc_node+0x68/0x100 [ 1494.832326] __list_lru_init+0x4aa/0x6e0 [ 1494.832349] sget_userns+0x84d/0xd30 [ 1494.832366] ? kill_litter_super+0x60/0x60 [ 1494.848146] ? ns_test_super+0x50/0x50 [ 1494.852047] ? ns_test_super+0x50/0x50 [ 1494.855943] ? kill_litter_super+0x60/0x60 [ 1494.860196] sget+0x10c/0x150 [ 1494.863308] mount_bdev+0xff/0x3c0 [ 1494.866865] ? xfs_test_remount_options+0x90/0x90 [ 1494.871717] xfs_fs_mount+0x35/0x40 [ 1494.875348] mount_fs+0x106/0x3ff [ 1494.878860] ? emergency_thaw_all+0x1a0/0x1a0 [ 1494.883359] ? __init_waitqueue_head+0x36/0x90 [ 1494.887961] vfs_kern_mount.part.0+0x6f/0x410 [ 1494.892473] do_mount+0x581/0x2d30 [ 1494.896023] ? copy_mount_string+0x40/0x40 [ 1494.900266] ? copy_mount_options+0x234/0x440 [ 1494.904765] ? copy_mount_options+0x23d/0x440 [ 1494.909263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1494.914803] ? copy_mount_options+0x30e/0x440 [ 1494.919303] ksys_mount+0xdb/0x150 [ 1494.922849] __x64_sys_mount+0xbe/0x150 [ 1494.926833] do_syscall_64+0x103/0x610 [ 1494.930728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1494.935917] RIP: 0033:0x45a89a [ 1494.939119] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1494.958029] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 16:59:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0xcfd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) sendmsg$tipc(r1, &(0x7f00000008c0)={&(0x7f0000000040)=@name={0x1e, 0x2, 0x2, {{0x40, 0x1}, 0x2}}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000080)="5819ea0161353494feae9fba149dfb11abfb0e481802daa95b2660aef25534b067111bab1fc10cc6453102b9393f0e9ccc5997f3761e1ca9efa8c3e9f91ca6fd209a690f83eeedcc182d14c1a64ec9c4ef4aef60c6b9b624aeadc28fd22f29e9d23bba0ac8d32fc1c69f8be3904cc7b905ac798c15d21891346bd3df2672eae95dc91e762d4641440188d0395b261caf59de38a125af1cabe52784a3bcb7a0b28e5fd05d15ea9307a4e7a675453456c661ccc2dc0138d273e834f4b013a805cba214e4459cc171831b675c95fb3eacc12ad2dc707a327eb52a0bf0e93dc3d47863ac58563c7bd078c4b3bd984d18a16e8fd4b73517951a6f775f7ee0", 0xfc}, {&(0x7f0000000180)}, {&(0x7f00000001c0)="ea7fee8df152c25ffafe0297454973754c6388047dddc10b7604ecb360ed6fe8db379edbf7838c04a8de54b75ef00e753a54e7b429ef4b9878e5698e79da6b5494acff6005416cc3b5409d16", 0x4c}, {&(0x7f0000001340)="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", 0x1000}, {&(0x7f00000002c0)="4778d31e0eb75887113ac7f0ea800d1410809b1368fd2ee5fc577b20e3940f60eefcfbf133198fa0564300800c6e309bce9e4a97676761fc54a179f50eba92c37dfa10b9f66fe5116ef865f8b519fcdebaa713d457ba61e180baf730201650791f4f239309445c331e1a15047fede110f1a6fd6e5ef586963c2ac5e8fd7df43f620207b2917ba56a848acf638b5d24ab8817a8b7cdc43b002c3f5c3d75d46af7da008aabb7d786824739bfcd03bbc5045c4e627d95745e5b0a26cc76f6fd88d9ccab5f8ffc7e2a171169", 0xca}, {&(0x7f00000003c0)="dc92b88dd25e76fbc895a9c6a0c51bad37378f4c59533305fa1027d3115e4206e4ae235cf8f02feee3b9cfc805913747d99d7abeb4599ae2f15d7416fcab6660fce2246596d3afba07a1427f84057f1e499ceb3dc8608290c287be5666a78baba6016a313615d46fefcc0dcd25b8e2dbaf7797ad5fe41dbbe6a83afbabdb3e23c3055a8a1ee76174235a31bfc456762f7001eea69dadab0ba5c62f37340dfa7682d5826c6d95fdfcc39a746e2d71de5737556f59c7debe892ba55bf92f39ba66240b47786707ca11709b749fdd13a20eb7000ac1711f19e1d437e38e6372917f", 0xe0}, {&(0x7f0000000500)="87ae550dfe93635303a4df9214c33367478a469e9659470fcb69f6ff495961ec974c5d165349d4c72db04b95bad27c1ffd54be14d815ee01b9dadfb60d13f7b14b3ecfb68e1d43f37c5680811b0c52d5ba1bd89eff9db3d52bfe35110a674eac74b706033728427ecf5dd27b7ec98cb6884510919c6e84e58638a8f21825d58cb2184836fda51347e435bec0b661e0891bcfe3b891399517abf338f6a0e1debd1888b416f22d18808463ca62067c8e4cd35d3cf618ccab6b6c86b540f63d84126f42b015a8398bc386b354f08e86e3c37f675ec8178c63f1", 0xd8}, {&(0x7f0000000600)="7d4c88d2230da35f4626ea28f9fc73244875f8e788428820fd39f782096d05d5c8bb0a96bab2d54677d443b5b79d859393a8cf252a28aa425e525ac7816d19a95f80f6d3240e44f9a4941def84399151f37c3d99c3ef9effef92f8b35951fc14d6f3de7e0537a60c8cd813151b411517558b770ad2b2d6ea868e15a08a2d3c24833ce011af231c996d135ef9befcf8752b0f93401b58d4470381614054e7e357b25810811988e6bc0b5a31184b", 0xad}, {&(0x7f00000006c0)="562950b421e5064b4d300dcde7594377c5a564843c820cfed29b4a095d1d3c2a80cf3d5c9d71722296074fa22e7d30c92b5ee8a1f4e2a60df7fdba0f2bf07206d38a9229c2dacfc441d72ff8e22a2e3e009690f1", 0x54}, {&(0x7f0000000740)="3cceb8e39930167052882dc31f8083f1c11a2dce2523a5d7b1480c7a5372a729e99520932942cec37b0538bdf93c585f80521d9b72edebab800a157d529198bda83f21ecce35afdff70096d5652ceced0383d03978e9b3734bb8178784112af66811602d6d5337649e228df4e83f7757bfed6010f6a37eb3a796019650928007e3e81af268a32f0dce39467048593a6abb30c65b6d", 0x95}], 0xa, &(0x7f0000000a00)="be85707fd767b6ea9a4d56296d0433781285d5307e6e46fb94204832d1266603616920010060b4bdda6b7301493ed9c592d2f8393f585aabfe704e20355c524e35e81eead15478755abf4ace728c4fab48f4eb9e2939f237a96682a0966399641ef95f1edbda2306c1e7eb77dd17e8eff461761a0de4dc4dcd084efb44244f66f26a0c8038083707b348464faa866f39b8c49bc626d0e31f0262cbff95c884047142bdcf687e0875288ba85ef9a0409b0f91f840d2f9f786c0cc85dd86a55c5d438968f972d04c342a6ef833745cd7bbc0b0ff10c6994bf3a208e337da580d2c5a2c23af9a14bdce943116c7942912464f6527c0783dc3", 0xf7, 0x40}, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1494.965750] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1494.973019] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1494.980288] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1494.987553] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1494.994818] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 16:59:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000080)={0x7f, @local, 0x4e21, 0x3, 'lc\x00', 0x20, 0x598, 0x2b}, 0x2c) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x3bc) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x8000, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r3, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000000)}], 0x492492492492710, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x1e) 16:59:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x4000000000000000) 16:59:25 executing program 1 (fault-call:2 fault-nth:68): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1495.313822] FAULT_INJECTION: forcing a failure. [ 1495.313822] name failslab, interval 1, probability 0, space 0, times 0 [ 1495.333921] CPU: 1 PID: 9643 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1495.341138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1495.350499] Call Trace: [ 1495.353108] dump_stack+0x172/0x1f0 [ 1495.356761] should_fail.cold+0xa/0x1b [ 1495.360670] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1495.365785] ? lock_downgrade+0x810/0x810 [ 1495.369943] ? ___might_sleep+0x163/0x280 [ 1495.374114] __should_failslab+0x121/0x190 [ 1495.378364] should_failslab+0x9/0x14 [ 1495.382175] kmem_cache_alloc_trace+0x2d1/0x760 [ 1495.386859] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1495.391986] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1495.392010] __list_lru_init+0x3d3/0x6e0 [ 1495.401036] sget_userns+0x84d/0xd30 [ 1495.401057] ? kill_litter_super+0x60/0x60 [ 1495.409024] ? ns_test_super+0x50/0x50 [ 1495.412925] ? ns_test_super+0x50/0x50 [ 1495.416852] ? kill_litter_super+0x60/0x60 [ 1495.416868] sget+0x10c/0x150 [ 1495.416887] mount_bdev+0xff/0x3c0 [ 1495.416901] ? xfs_test_remount_options+0x90/0x90 [ 1495.416917] xfs_fs_mount+0x35/0x40 [ 1495.416935] mount_fs+0x106/0x3ff [ 1495.416962] ? emergency_thaw_all+0x1a0/0x1a0 [ 1495.416978] ? __init_waitqueue_head+0x36/0x90 [ 1495.417001] vfs_kern_mount.part.0+0x6f/0x410 [ 1495.417019] do_mount+0x581/0x2d30 [ 1495.448794] ? copy_mount_options+0x41/0x440 [ 1495.456822] ? copy_mount_string+0x40/0x40 [ 1495.456837] ? kmem_cache_alloc_trace+0x354/0x760 [ 1495.456857] ? _copy_from_user+0xdd/0x150 [ 1495.474501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1495.480056] ? copy_mount_options+0x30e/0x440 [ 1495.484557] ksys_mount+0xdb/0x150 [ 1495.488109] __x64_sys_mount+0xbe/0x150 [ 1495.492097] do_syscall_64+0x103/0x610 [ 1495.495995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1495.501197] RIP: 0033:0x45a89a [ 1495.504389] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1495.504398] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1495.504413] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1495.504422] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1495.504430] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1495.504439] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1495.504447] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:28 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) 16:59:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) lsetxattr$security_selinux(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:updpwd_exec_t:s0\x00', 0x23, 0x2) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={r1, &(0x7f0000000040)="cdda509b98a0658fa9cddddb1dbc71f7f007ce578e046b7faa3843494d58848b8828df40329f820d396735c53fa365b6f4f6f7e58a06a9e87c64916761f8931cd84c0e20c83b0471b7f083e114353125059dd4126517256007fa950feb30a303b33fa91d5cccb8b95936e6038822111623b5b3d9", &(0x7f00000000c0)=""/149}, 0x18) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:59:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x6018230000000000) 16:59:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) 16:59:28 executing program 1 (fault-call:2 fault-nth:69): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) [ 1497.648384] FAULT_INJECTION: forcing a failure. [ 1497.648384] name failslab, interval 1, probability 0, space 0, times 0 [ 1497.753464] CPU: 1 PID: 9662 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1497.760718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1497.770076] Call Trace: [ 1497.772682] dump_stack+0x172/0x1f0 [ 1497.776326] should_fail.cold+0xa/0x1b [ 1497.780220] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1497.785330] ? lock_downgrade+0x810/0x810 [ 1497.789491] ? ___might_sleep+0x163/0x280 [ 1497.793643] __should_failslab+0x121/0x190 [ 1497.797889] should_failslab+0x9/0x14 [ 1497.801695] kmem_cache_alloc_trace+0x2d1/0x760 [ 1497.806369] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1497.811487] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1497.816422] __list_lru_init+0x3d3/0x6e0 [ 1497.820499] sget_userns+0x84d/0xd30 [ 1497.824217] ? kill_litter_super+0x60/0x60 [ 1497.828454] ? ns_test_super+0x50/0x50 [ 1497.832350] ? ns_test_super+0x50/0x50 [ 1497.836244] ? kill_litter_super+0x60/0x60 [ 1497.840487] sget+0x10c/0x150 [ 1497.843599] mount_bdev+0xff/0x3c0 [ 1497.847140] ? xfs_test_remount_options+0x90/0x90 [ 1497.851988] xfs_fs_mount+0x35/0x40 [ 1497.855622] mount_fs+0x106/0x3ff [ 1497.859084] ? emergency_thaw_all+0x1a0/0x1a0 [ 1497.863587] ? __init_waitqueue_head+0x36/0x90 [ 1497.868176] vfs_kern_mount.part.0+0x6f/0x410 [ 1497.872675] do_mount+0x581/0x2d30 [ 1497.876218] ? copy_mount_options+0x41/0x440 [ 1497.880633] ? copy_mount_string+0x40/0x40 [ 1497.884869] ? kmem_cache_alloc_trace+0x354/0x760 [ 1497.889721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1497.895262] ? copy_mount_options+0x30e/0x440 [ 1497.899761] ksys_mount+0xdb/0x150 [ 1497.903306] __x64_sys_mount+0xbe/0x150 [ 1497.907290] do_syscall_64+0x103/0x610 [ 1497.911204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1497.916391] RIP: 0033:0x45a89a [ 1497.919586] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1497.938504] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1497.946228] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a 16:59:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) [ 1497.953496] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1497.960761] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1497.968047] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1497.975316] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:28 executing program 1 (fault-call:2 fault-nth:70): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x175) fchdir(r0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x110000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, r3, 0x0, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x23}}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x44001}, 0x4000810) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) rt_sigaction(0x34, &(0x7f0000000200)={&(0x7f0000000180)="640fc6272d45fa41d9ecc4e17976750e8d48870fae37c443196c99f2ffffffee47150f000000c481d85c3413478348991e", {0x7810a731}, 0x0, &(0x7f00000001c0)="410f4688b40900006447f6fddf8cad00000021c481635184f700000080c4e2d5a70a66460f5b5a234181c86d566666c423d968d700660f5be9c442a9045232"}, &(0x7f0000000380)={&(0x7f00000002c0)="2ed357006767660f383790578f78a96464430f0f51ac9ec42359489b001000007b66440f381ef6790f0fae6ee2f0468331003e420f0f90fcac0000a7c461df2a1d0c000000", {}, 0x0, &(0x7f0000000340)="450f4d7700c462893c6b6e3e44d8d4c44159f28b32233333f226f081662f060000000f0f646781b7c4620da944dd098f69e89a7fd741cb0f01dc"}, 0x8, &(0x7f00000003c0)) 16:59:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0xe803000000000000) 16:59:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) [ 1498.253291] FAULT_INJECTION: forcing a failure. [ 1498.253291] name failslab, interval 1, probability 0, space 0, times 0 [ 1498.265352] CPU: 0 PID: 9690 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1498.272570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1498.281965] Call Trace: [ 1498.284583] dump_stack+0x172/0x1f0 [ 1498.288227] should_fail.cold+0xa/0x1b [ 1498.292323] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1498.297438] ? lock_downgrade+0x810/0x810 [ 1498.301598] ? ___might_sleep+0x163/0x280 [ 1498.305760] __should_failslab+0x121/0x190 [ 1498.310011] should_failslab+0x9/0x14 [ 1498.313861] kmem_cache_alloc_trace+0x2d1/0x760 [ 1498.318538] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1498.323650] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1498.328592] __list_lru_init+0x3d3/0x6e0 [ 1498.332662] sget_userns+0x84d/0xd30 [ 1498.336380] ? kill_litter_super+0x60/0x60 [ 1498.340626] ? ns_test_super+0x50/0x50 [ 1498.344518] ? ns_test_super+0x50/0x50 [ 1498.348410] ? kill_litter_super+0x60/0x60 [ 1498.352654] sget+0x10c/0x150 [ 1498.355798] mount_bdev+0xff/0x3c0 [ 1498.355815] ? xfs_test_remount_options+0x90/0x90 [ 1498.355832] xfs_fs_mount+0x35/0x40 [ 1498.364231] mount_fs+0x106/0x3ff [ 1498.364250] ? emergency_thaw_all+0x1a0/0x1a0 [ 1498.364268] ? __init_waitqueue_head+0x36/0x90 [ 1498.364290] vfs_kern_mount.part.0+0x6f/0x410 [ 1498.375849] do_mount+0x581/0x2d30 [ 1498.375884] ? copy_mount_options+0x41/0x440 [ 1498.384956] ? copy_mount_string+0x40/0x40 [ 1498.384980] ? kmem_cache_alloc_trace+0x354/0x760 [ 1498.385002] ? _copy_from_user+0xdd/0x150 [ 1498.385020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1498.411701] ? copy_mount_options+0x30e/0x440 [ 1498.416228] ksys_mount+0xdb/0x150 [ 1498.416249] __x64_sys_mount+0xbe/0x150 [ 1498.416272] do_syscall_64+0x103/0x610 [ 1498.427649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.427662] RIP: 0033:0x45a89a [ 1498.427681] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1498.454979] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1498.454995] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1498.455004] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1498.455028] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1498.455037] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1498.455045] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) 16:59:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:59:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) 16:59:31 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0xfdfdffff00000000) 16:59:31 executing program 1 (fault-call:2 fault-nth:71): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x4924924924924bb, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x74, &(0x7f0000000080)=[@in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0xc}}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, @in6={0xa, 0x4e24, 0x6, @ipv4={[], [], @empty}, 0xd429}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x100000000}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000180)={r2, 0x80000000}, &(0x7f00000001c0)=0x8) accept$alg(r0, 0x0, 0x0) [ 1500.741285] FAULT_INJECTION: forcing a failure. [ 1500.741285] name failslab, interval 1, probability 0, space 0, times 0 [ 1500.795050] CPU: 0 PID: 9718 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1500.802287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1500.802296] Call Trace: [ 1500.814241] dump_stack+0x172/0x1f0 [ 1500.817880] should_fail.cold+0xa/0x1b [ 1500.817899] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1500.817918] ? lock_downgrade+0x810/0x810 [ 1500.831063] ? ___might_sleep+0x163/0x280 [ 1500.835224] __should_failslab+0x121/0x190 [ 1500.839475] should_failslab+0x9/0x14 [ 1500.843282] __kmalloc+0x2dc/0x740 [ 1500.846832] ? __list_lru_init+0xd5/0x6e0 [ 1500.851002] __list_lru_init+0xd5/0x6e0 [ 1500.855008] sget_userns+0x84d/0xd30 [ 1500.858725] ? kill_litter_super+0x60/0x60 [ 1500.858758] ? ns_test_super+0x50/0x50 [ 1500.858774] ? ns_test_super+0x50/0x50 [ 1500.858787] ? kill_litter_super+0x60/0x60 [ 1500.858801] sget+0x10c/0x150 [ 1500.866912] mount_bdev+0xff/0x3c0 [ 1500.866928] ? xfs_test_remount_options+0x90/0x90 [ 1500.866956] xfs_fs_mount+0x35/0x40 [ 1500.866980] mount_fs+0x106/0x3ff [ 1500.893647] ? emergency_thaw_all+0x1a0/0x1a0 [ 1500.898151] ? __init_waitqueue_head+0x36/0x90 [ 1500.898176] vfs_kern_mount.part.0+0x6f/0x410 [ 1500.898197] do_mount+0x581/0x2d30 [ 1500.910798] ? copy_mount_options+0x41/0x440 [ 1500.915224] ? copy_mount_string+0x40/0x40 [ 1500.915242] ? kmem_cache_alloc_trace+0x354/0x760 [ 1500.915268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1500.915283] ? copy_mount_options+0x30e/0x440 [ 1500.915318] ksys_mount+0xdb/0x150 [ 1500.915336] __x64_sys_mount+0xbe/0x150 [ 1500.934432] do_syscall_64+0x103/0x610 16:59:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 16:59:31 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1500.934457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1500.941992] RIP: 0033:0x45a89a [ 1500.954263] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1500.973167] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1500.973182] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1500.973191] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1500.973200] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1500.973208] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1500.973216] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000000480)) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020000070000000029bd7000fedbdf2502001000000004d3000004d20000000019000900d00500002020090971e7afbcee0952b6a0cc311888b5f5fa7f48c56a33ad550626f76460a3e5727082abc547e01a20ae43b8e1061cb348cbd79c4704566f25e976979a5b116e1bfd4f3032dd500b9a90066f1890026ad621d0bf41628595025e8ef433028c3f72d2fe4fa984e319a0bbf278205348dcd2fbb410362e91520957c833d74f4a1be1e560dbc108b20cba6e1f16829662593b06ae08b9a1093650bbb9b3e8f4b7d7cda46b4c267ba1f6ab9f0e81a4761797e85021dcf5ce52e5000000000000010017004e2200000400030001010000080000000000000004fbffffffffffff000000000000000002000a0001000000000000000000000002001300060000002abd70000735000002000100000004d40681ae020100006005000200ffff00000100010000000000000000000000070000000000000057e1b14f327fd2d1c133e3a9b5eff0aee6f8acc1a12d9442cb8fc0c7c1d8da34248d17f6d23552"], 0x160}}, 0x4000000) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x10100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000100)={0x3, 'veth0_to_hsr\x00', 0x2}, 0x18) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000200)=0xb) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:59:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) 16:59:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x48) 16:59:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0xffffffffffffffff) 16:59:32 executing program 1 (fault-call:2 fault-nth:72): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x48) 16:59:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) fchdir(r0) 16:59:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) getsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f00000000c0)=0x2d, 0x4) 16:59:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x48) [ 1501.520992] FAULT_INJECTION: forcing a failure. [ 1501.520992] name failslab, interval 1, probability 0, space 0, times 0 [ 1501.625357] CPU: 0 PID: 9766 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1501.632589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1501.641943] Call Trace: [ 1501.644578] dump_stack+0x172/0x1f0 [ 1501.648219] should_fail.cold+0xa/0x1b [ 1501.652121] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1501.657242] ? lock_downgrade+0x810/0x810 [ 1501.661401] ? ___might_sleep+0x163/0x280 [ 1501.665563] __should_failslab+0x121/0x190 [ 1501.669811] should_failslab+0x9/0x14 16:59:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x48) [ 1501.673619] kmem_cache_alloc_trace+0x2d1/0x760 [ 1501.678302] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1501.683460] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1501.688414] __list_lru_init+0x3d3/0x6e0 [ 1501.692529] sget_userns+0x84d/0xd30 [ 1501.696257] ? kill_litter_super+0x60/0x60 [ 1501.700502] ? ns_test_super+0x50/0x50 [ 1501.704402] ? ns_test_super+0x50/0x50 [ 1501.708293] ? kill_litter_super+0x60/0x60 [ 1501.712555] sget+0x10c/0x150 [ 1501.715667] mount_bdev+0xff/0x3c0 [ 1501.715683] ? xfs_test_remount_options+0x90/0x90 16:59:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f00000005c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000006c0)={@empty, 0x0}, &(0x7f0000000700)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000800)={'veth0_to_bridge\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'vcan0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0}, &(0x7f0000001c80)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001dc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e00)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000001f00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001f40)={'vxcan1\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000002080)={@local, 0x0}, &(0x7f00000020c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002140)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002180)={0x11, 0x0, 0x0}, &(0x7f00000021c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002200)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000002240)={0x11, 0x0, 0x0}, &(0x7f0000002280)=0x14, 0x800) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syzkaller0\x00', 0x0}) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000002880)={&(0x7f0000002300)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000027c0)=[{&(0x7f0000002380)=""/132, 0x84}, {&(0x7f0000002440)=""/57, 0x39}, {&(0x7f0000002480)=""/174, 0xae}, {&(0x7f0000002540)=""/222, 0xde}, {&(0x7f0000002640)=""/62, 0x3e}, {&(0x7f0000002680)=""/96, 0x60}, {&(0x7f0000002700)=""/131, 0x83}], 0x7, &(0x7f0000002840)=""/23, 0x17}, 0x12142) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000002a80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ac0)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000002bc0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f00000033c0)={&(0x7f0000000100), 0xc, &(0x7f0000003380)={&(0x7f0000001080)=ANY=[@ANYBLOB='l\a\x00\x00', @ANYRES16=r3, @ANYBLOB="040327bd7000fbdbdf250200000008000100", @ANYRES32=r4, @ANYBLOB="7800020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400010000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000008000100", @ANYRES32=r5, @ANYBLOB="a001020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000200000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000100010038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400c300000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000500000008000600", @ANYRES32=r6, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c0004006861736800000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006c625f73746174735f7a6566726573685f696e74657276616c000000000000000800030003000000080004000300000008000100", @ANYRES32=r8, @ANYBLOB="780002003800010a240001006d636173745f72656a6f696e5f696e74257276616c010000006d52c99bcbd24ef1080000003c000100240081958349760cc25c0100656e61626c65640000000000000000000000000000754ab91300000000000000000000000800030006000000040004009ff750758c700fd0c2f3f6b89c3943be9c555747f0fe28c62615dd18583bb94c494378b15131d2cf6364245fa2b3c5a65886c781bfcdd62309678ce8717d93175f9a6f9e0e00c837a73fc05f1b59fb938b3438edb5289219766bd3a53ce5ea6ebe460f521a48", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="500002004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000008000100", @ANYRES32=r11, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000400000008000100", @ANYRES32=r12, @ANYBLOB="8c0002004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c000400ff7f01090500000008000100", @ANYRES32=r13, @ANYBLOB="b400020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400952d000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r14, @ANYBLOB="08000700000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r15, @ANYBLOB="0a0b150ec04376006878df7c38fa99ea5202cb66d2ec44e516f346f44200315fd9033cff49f9e9983314a22db016d7a774", @ANYRES32=r16, @ANYBLOB="0002020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004004c0000005c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002c00040007000603000000000700c50701010000080005ff060000000400b9cd0200000005000400ece4677038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000101000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r18, @ANYBLOB="08000700000000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r19, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400ffff000008000100", @ANYRES32=r20, @ANYBLOB="b40002003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r21, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400060000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r22], 0x76c}, 0x1, 0x0, 0x0, 0x80}, 0x4010) r23 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_QUERYCTRL(r23, 0xc0445624, &(0x7f0000000080)={0xffffffffffffffe0, 0xd, "e405659e8abb22b5bc6a6bb182e91d71eb9f51c9b041a3f8ec8a3bce641ea81d", 0x8, 0x5, 0x0, 0x3, 0x103}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1501.715700] xfs_fs_mount+0x35/0x40 [ 1501.715718] mount_fs+0x106/0x3ff [ 1501.715737] ? emergency_thaw_all+0x1a0/0x1a0 [ 1501.715756] ? __init_waitqueue_head+0x36/0x90 [ 1501.715777] vfs_kern_mount.part.0+0x6f/0x410 [ 1501.744782] do_mount+0x581/0x2d30 [ 1501.748337] ? copy_mount_options+0x41/0x440 [ 1501.752757] ? copy_mount_string+0x40/0x40 [ 1501.757008] ? kmem_cache_alloc_trace+0x354/0x760 [ 1501.761865] ? _copy_from_user+0xdd/0x150 [ 1501.766041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1501.771602] ? copy_mount_options+0x30e/0x440 [ 1501.776113] ksys_mount+0xdb/0x150 [ 1501.779669] __x64_sys_mount+0xbe/0x150 [ 1501.783675] do_syscall_64+0x103/0x610 [ 1501.787593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1501.792788] RIP: 0033:0x45a89a [ 1501.795996] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1501.814908] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1501.814923] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1501.814932] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1501.814941] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1501.814959] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1501.814968] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:34 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c12") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x48) 16:59:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffe22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x862e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'L+', 0xff}, 0x28, 0x3) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) socket$inet6(0xa, 0x2, 0x6) 16:59:34 executing program 1 (fault-call:2 fault-nth:73): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x300ffc, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f000000a000/0x1000)=nil, &(0x7f000000a000/0x3000)=nil, &(0x7f000000a000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000009000/0x2000)=nil, &(0x7f0000002000/0x2000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000017000/0x1000)=nil, &(0x7f000000e000/0x1000)=nil, &(0x7f000000b000/0x1000)=nil, &(0x7f0000000080)="d7bceffdf453be2bd75d28a0f3b1b815d52f4f2817ab412e6281e5475546854734febe08e01b0ab5ac2fd89e4d2464885c7688ac27067285305752ca4e2f5ee9c4ab219c927da8e193fad9f2ae18f41f508edefbfe3dee7e78fb0e9c7cac70ec22daf8bb21d02f8cd44bbc31b0510e8d006d481a04703f3b8f464000", 0x7c, r3}, 0x68) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:59:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000000)=0x8) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1504.103917] FAULT_INJECTION: forcing a failure. [ 1504.103917] name failslab, interval 1, probability 0, space 0, times 0 16:59:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x48) [ 1504.155720] CPU: 1 PID: 9799 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1504.162962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1504.172321] Call Trace: [ 1504.174931] dump_stack+0x172/0x1f0 [ 1504.178591] should_fail.cold+0xa/0x1b [ 1504.182494] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1504.187607] ? lock_downgrade+0x810/0x810 [ 1504.191764] ? ___might_sleep+0x163/0x280 [ 1504.195921] __should_failslab+0x121/0x190 [ 1504.195940] should_failslab+0x9/0x14 16:59:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x48) [ 1504.195967] kmem_cache_alloc_trace+0x2d1/0x760 [ 1504.195986] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1504.196006] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1504.218719] __list_lru_init+0x3d3/0x6e0 [ 1504.222797] sget_userns+0x84d/0xd30 [ 1504.226522] ? kill_litter_super+0x60/0x60 [ 1504.230772] ? ns_test_super+0x50/0x50 [ 1504.234673] ? ns_test_super+0x50/0x50 [ 1504.238564] ? kill_litter_super+0x60/0x60 [ 1504.242815] sget+0x10c/0x150 [ 1504.245934] mount_bdev+0xff/0x3c0 [ 1504.249496] ? xfs_test_remount_options+0x90/0x90 [ 1504.254348] xfs_fs_mount+0x35/0x40 [ 1504.257991] mount_fs+0x106/0x3ff [ 1504.258009] ? emergency_thaw_all+0x1a0/0x1a0 [ 1504.265962] ? __init_waitqueue_head+0x36/0x90 [ 1504.265986] vfs_kern_mount.part.0+0x6f/0x410 [ 1504.266006] do_mount+0x581/0x2d30 [ 1504.266021] ? copy_mount_options+0x41/0x440 [ 1504.266042] ? copy_mount_string+0x40/0x40 [ 1504.266060] ? kmem_cache_alloc_trace+0x354/0x760 [ 1504.292563] ? _copy_from_user+0xdd/0x150 [ 1504.296724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1504.302269] ? copy_mount_options+0x30e/0x440 16:59:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa]}, 0x48) [ 1504.306773] ksys_mount+0xdb/0x150 [ 1504.310330] __x64_sys_mount+0xbe/0x150 [ 1504.314319] do_syscall_64+0x103/0x610 [ 1504.318222] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1504.323417] RIP: 0033:0x45a89a [ 1504.326620] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1504.345525] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 16:59:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) 16:59:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x10000, 0x801) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1504.353269] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1504.360546] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1504.367821] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1504.375096] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1504.375105] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-', 0x6}, 0x28, 0x3) 16:59:37 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c12") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:37 executing program 1 (fault-call:2 fault-nth:74): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) 16:59:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) mlockall(0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) lookup_dcookie(0x18000, &(0x7f0000000100)=""/78, 0x4e) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x8, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f00000000c0)={0x100000000, r3, 0x0, 0x8}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000000)=0x531) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 16:59:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f0000000000)={0x7fffffff, 0xbe5f}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:59:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1507.162547] FAULT_INJECTION: forcing a failure. [ 1507.162547] name failslab, interval 1, probability 0, space 0, times 0 [ 1507.215700] CPU: 1 PID: 9850 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1507.222928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1507.232290] Call Trace: [ 1507.234894] dump_stack+0x172/0x1f0 [ 1507.238576] should_fail.cold+0xa/0x1b [ 1507.242479] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1507.247591] ? lock_downgrade+0x810/0x810 [ 1507.251768] ? ___might_sleep+0x163/0x280 [ 1507.255927] __should_failslab+0x121/0x190 [ 1507.260187] should_failslab+0x9/0x14 16:59:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) [ 1507.264002] kmem_cache_alloc_trace+0x2d1/0x760 [ 1507.268696] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1507.273816] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1507.278755] __list_lru_init+0x3d3/0x6e0 [ 1507.282849] sget_userns+0x84d/0xd30 [ 1507.286571] ? kill_litter_super+0x60/0x60 [ 1507.286590] ? ns_test_super+0x50/0x50 [ 1507.286604] ? ns_test_super+0x50/0x50 [ 1507.286618] ? kill_litter_super+0x60/0x60 [ 1507.286632] sget+0x10c/0x150 [ 1507.286652] mount_bdev+0xff/0x3c0 [ 1507.286668] ? xfs_test_remount_options+0x90/0x90 [ 1507.294785] xfs_fs_mount+0x35/0x40 [ 1507.318006] mount_fs+0x106/0x3ff [ 1507.321483] ? emergency_thaw_all+0x1a0/0x1a0 [ 1507.325990] ? __init_waitqueue_head+0x36/0x90 [ 1507.330592] vfs_kern_mount.part.0+0x6f/0x410 [ 1507.335098] do_mount+0x581/0x2d30 [ 1507.338650] ? copy_mount_options+0x41/0x440 [ 1507.343074] ? copy_mount_string+0x40/0x40 [ 1507.343091] ? kmem_cache_alloc_trace+0x354/0x760 [ 1507.343112] ? _copy_from_user+0xdd/0x150 [ 1507.343131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1507.343147] ? copy_mount_options+0x30e/0x440 [ 1507.343165] ksys_mount+0xdb/0x150 [ 1507.343184] __x64_sys_mount+0xbe/0x150 [ 1507.343203] do_syscall_64+0x103/0x610 [ 1507.356400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.356412] RIP: 0033:0x45a89a [ 1507.356441] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1507.356449] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 16:59:38 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c12") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) 16:59:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400800, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r2, 0x80044326, &(0x7f0000000040)=0xa2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1507.356462] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1507.356490] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1507.356498] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1507.356505] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1507.356512] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:38 executing program 1 (fault-call:2 fault-nth:75): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:59:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) 16:59:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/81, 0x51}, {&(0x7f0000000200)=""/152, 0x98}], 0x2, 0x0, 0x0, 0x8014}, 0x4000080) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) get_thread_area(&(0x7f0000000000)={0x81, 0x20001000, 0xffffffffffffffff, 0x3, 0x3, 0x9, 0x10000, 0x3, 0x2, 0x8}) fsetxattr(r2, &(0x7f0000000040)=@random={'security.', '/dev/kvm\x00'}, &(0x7f0000000340)='/dev/kvm\x00', 0x9, 0x3) [ 1507.680198] FAULT_INJECTION: forcing a failure. [ 1507.680198] name failslab, interval 1, probability 0, space 0, times 0 [ 1507.692876] CPU: 1 PID: 9886 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1507.700083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1507.709443] Call Trace: [ 1507.712054] dump_stack+0x172/0x1f0 [ 1507.715698] should_fail.cold+0xa/0x1b [ 1507.719595] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1507.724712] ? lock_downgrade+0x810/0x810 [ 1507.728901] ? ___might_sleep+0x163/0x280 [ 1507.733063] __should_failslab+0x121/0x190 [ 1507.737308] should_failslab+0x9/0x14 [ 1507.741110] kmem_cache_alloc_trace+0x2d1/0x760 [ 1507.745785] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1507.750900] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1507.755838] __list_lru_init+0x3d3/0x6e0 [ 1507.759909] sget_userns+0x84d/0xd30 [ 1507.763629] ? kill_litter_super+0x60/0x60 [ 1507.767867] ? ns_test_super+0x50/0x50 [ 1507.771756] ? ns_test_super+0x50/0x50 [ 1507.775648] ? kill_litter_super+0x60/0x60 [ 1507.779882] sget+0x10c/0x150 [ 1507.782997] mount_bdev+0xff/0x3c0 [ 1507.786543] ? xfs_test_remount_options+0x90/0x90 [ 1507.791390] xfs_fs_mount+0x35/0x40 [ 1507.795026] mount_fs+0x106/0x3ff [ 1507.798487] ? emergency_thaw_all+0x1a0/0x1a0 [ 1507.802988] ? __init_waitqueue_head+0x36/0x90 [ 1507.807585] vfs_kern_mount.part.0+0x6f/0x410 [ 1507.812091] do_mount+0x581/0x2d30 [ 1507.815634] ? copy_mount_options+0x41/0x440 [ 1507.820053] ? copy_mount_string+0x40/0x40 [ 1507.824292] ? kmem_cache_alloc_trace+0x354/0x760 [ 1507.829140] ? _copy_from_user+0xdd/0x150 [ 1507.833292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1507.838831] ? copy_mount_options+0x30e/0x440 [ 1507.843331] ksys_mount+0xdb/0x150 [ 1507.846874] __x64_sys_mount+0xbe/0x150 [ 1507.850852] do_syscall_64+0x103/0x610 [ 1507.854745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.859935] RIP: 0033:0x45a89a 16:59:38 executing program 2: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0xb326bff9a58d5cff, 0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:59:38 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1507.863138] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1507.882041] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1507.889748] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1507.897021] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1507.904290] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1507.911555] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1507.918823] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1018]}, 0x48) 16:59:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="fe762add26c69c067787a131776ff9ddd4dfdf74f5fcbc9c9f511ed46c4545c5451179b5d7e0091c5bec04c806771666e87db6e42a01e32a5276bc56", 0x8e) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000000)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x1, 0x0) 16:59:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1810]}, 0x48) 16:59:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:59:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair(0xb, 0xf, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000080)={0x0, @rand_addr, @empty}, &(0x7f00000000c0)=0xc) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getpeername(r1, &(0x7f0000000300)=@xdp, &(0x7f0000000280)=0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x3, 0x8000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r5, 0x404c534a, &(0x7f0000000200)={0x9, 0xff, 0xa41}) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000140), 0x1, 0x0) 16:59:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) r3 = getegid() lchown(&(0x7f0000000000)='./file0/file0\x00', r2, r3) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:59:39 executing program 1 (fault-call:2 fault-nth:76): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 16:59:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) [ 1508.458795] FAULT_INJECTION: forcing a failure. [ 1508.458795] name failslab, interval 1, probability 0, space 0, times 0 16:59:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = shmget(0x3, 0x1000, 0x200, &(0x7f0000004000/0x1000)=nil) shmctl$SHM_LOCK(r2, 0xb) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+', 0x2}, 0x28, 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 16:59:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x48) [ 1508.544875] CPU: 1 PID: 9935 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1508.552135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1508.561496] Call Trace: [ 1508.564110] dump_stack+0x172/0x1f0 [ 1508.567750] should_fail.cold+0xa/0x1b [ 1508.571647] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1508.576759] ? lock_downgrade+0x810/0x810 [ 1508.580915] ? ___might_sleep+0x163/0x280 [ 1508.585076] __should_failslab+0x121/0x190 [ 1508.589325] should_failslab+0x9/0x14 [ 1508.593136] kmem_cache_alloc_trace+0x2d1/0x760 [ 1508.597821] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1508.602932] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1508.607883] __list_lru_init+0x3d3/0x6e0 [ 1508.611969] sget_userns+0x84d/0xd30 [ 1508.615694] ? kill_litter_super+0x60/0x60 [ 1508.619937] ? ns_test_super+0x50/0x50 [ 1508.623844] ? ns_test_super+0x50/0x50 [ 1508.627740] ? kill_litter_super+0x60/0x60 [ 1508.631990] sget+0x10c/0x150 [ 1508.635115] mount_bdev+0xff/0x3c0 [ 1508.638706] ? xfs_test_remount_options+0x90/0x90 [ 1508.643560] xfs_fs_mount+0x35/0x40 [ 1508.647194] mount_fs+0x106/0x3ff [ 1508.650657] ? emergency_thaw_all+0x1a0/0x1a0 [ 1508.655164] ? __init_waitqueue_head+0x36/0x90 [ 1508.659764] vfs_kern_mount.part.0+0x6f/0x410 [ 1508.664272] do_mount+0x581/0x2d30 [ 1508.667817] ? copy_mount_options+0x41/0x440 [ 1508.672237] ? copy_mount_string+0x40/0x40 [ 1508.676493] ? kmem_cache_alloc_trace+0x354/0x760 [ 1508.681361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1508.686912] ? copy_mount_options+0x30e/0x440 [ 1508.691420] ksys_mount+0xdb/0x150 [ 1508.694982] __x64_sys_mount+0xbe/0x150 [ 1508.698977] do_syscall_64+0x103/0x610 [ 1508.702874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1508.708068] RIP: 0033:0x45a89a [ 1508.711268] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1508.730175] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1508.737892] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1508.745167] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1508.752444] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1508.759730] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1508.767007] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:41 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:41 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x410080) accept$alg(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x8010, r0, 0x8) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000000c0)="add89cb0fbe60f2a779e7f0681d3e99ae8b66eb9f51350aef564407a8f3360e07f084fbf24381aff7e5c2d4edfa92ae28a140f403f9bb713a604edf0d040b4a8e12ff1abf211c5e4a0474bee55897457478127578810ee796b1881cbf1a5ac70a627ffda82001d13f1be35cedb5e2193c2e550", 0xfffffffffffffedc) sendmmsg$unix(r3, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:59:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x48) 16:59:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x600000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x7) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:59:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$tipc(0x1e, 0x2, 0x0) recvmmsg(r3, &(0x7f00000036c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000300)=""/186, 0xba}], 0x1, 0x0, 0xfffffffffffffedf}}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/snmp6\x00') preadv(r4, &(0x7f0000000480), 0x10000000000001c1, 0x21) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:59:41 executing program 1 (fault-call:2 fault-nth:77): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x48) [ 1511.067134] FAULT_INJECTION: forcing a failure. [ 1511.067134] name failslab, interval 1, probability 0, space 0, times 0 [ 1511.119044] CPU: 0 PID: 9962 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1511.126278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1511.135637] Call Trace: [ 1511.135669] dump_stack+0x172/0x1f0 [ 1511.135693] should_fail.cold+0xa/0x1b [ 1511.135716] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1511.135736] ? lock_downgrade+0x810/0x810 [ 1511.150939] ? ___might_sleep+0x163/0x280 [ 1511.150970] __should_failslab+0x121/0x190 [ 1511.163978] should_failslab+0x9/0x14 [ 1511.167794] kmem_cache_alloc_trace+0x2d1/0x760 [ 1511.172475] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1511.172499] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1511.172518] __list_lru_init+0x3d3/0x6e0 [ 1511.186592] sget_userns+0x84d/0xd30 [ 1511.190314] ? kill_litter_super+0x60/0x60 [ 1511.194565] ? ns_test_super+0x50/0x50 [ 1511.198459] ? ns_test_super+0x50/0x50 [ 1511.202349] ? kill_litter_super+0x60/0x60 [ 1511.206594] sget+0x10c/0x150 [ 1511.209721] mount_bdev+0xff/0x3c0 [ 1511.213269] ? xfs_test_remount_options+0x90/0x90 [ 1511.218125] xfs_fs_mount+0x35/0x40 [ 1511.221764] mount_fs+0x106/0x3ff [ 1511.225224] ? emergency_thaw_all+0x1a0/0x1a0 [ 1511.229723] ? __init_waitqueue_head+0x36/0x90 [ 1511.234321] vfs_kern_mount.part.0+0x6f/0x410 [ 1511.238831] do_mount+0x581/0x2d30 [ 1511.242376] ? copy_mount_options+0x41/0x440 [ 1511.242398] ? copy_mount_string+0x40/0x40 [ 1511.242414] ? kmem_cache_alloc_trace+0x354/0x760 [ 1511.242437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1511.261429] ? copy_mount_options+0x30e/0x440 [ 1511.265946] ksys_mount+0xdb/0x150 [ 1511.269511] __x64_sys_mount+0xbe/0x150 [ 1511.273499] do_syscall_64+0x103/0x610 [ 1511.277402] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1511.282595] RIP: 0033:0x45a89a [ 1511.285791] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1511.305273] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 16:59:41 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0x0, 0x0, 0xfd99) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10000, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000040)={0x4, 0xab, 0x1, 0x1000}, 0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:59:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, r2) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1511.313016] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1511.315615] cgroup: fork rejected by pids controller in /syz0 [ 1511.320295] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1511.320305] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1511.320315] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1511.320324] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x48) 16:59:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$VIDIOC_G_TUNER(r5, 0xc054561d, &(0x7f0000000080)={0xffffffffffff52e7, "938900b0d7686f00a5d625e506b4f4ef08814922970c4e3a1ec2785850fdbc1f", 0x3, 0x40, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r5, r4, &(0x7f0000010000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x1be) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)=0x0) syz_open_procfs$namespace(r6, &(0x7f0000000140)='ns/mnt\x00') 16:59:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}, 0x48) 16:59:44 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ad", 0x2c3) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:59:44 executing program 1 (fault-call:2 fault-nth:78): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}, 0x48) 16:59:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400, 0x0) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 16:59:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x8000000000000) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:59:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x48) [ 1514.140163] FAULT_INJECTION: forcing a failure. [ 1514.140163] name failslab, interval 1, probability 0, space 0, times 0 16:59:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) restart_syscall() r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1514.229756] CPU: 0 PID: 10014 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1514.237089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1514.246441] Call Trace: [ 1514.249053] dump_stack+0x172/0x1f0 [ 1514.252699] should_fail.cold+0xa/0x1b [ 1514.256611] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1514.261768] ? lock_downgrade+0x810/0x810 [ 1514.265972] ? ___might_sleep+0x163/0x280 [ 1514.270141] __should_failslab+0x121/0x190 [ 1514.274391] should_failslab+0x9/0x14 [ 1514.278205] kmem_cache_alloc_trace+0x2d1/0x760 [ 1514.282885] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1514.288016] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1514.288036] __list_lru_init+0x3d3/0x6e0 [ 1514.288060] sget_userns+0x84d/0xd30 [ 1514.301287] ? kill_litter_super+0x60/0x60 [ 1514.305540] ? ns_test_super+0x50/0x50 [ 1514.309441] ? ns_test_super+0x50/0x50 [ 1514.313335] ? kill_litter_super+0x60/0x60 [ 1514.313352] sget+0x10c/0x150 [ 1514.313372] mount_bdev+0xff/0x3c0 [ 1514.313387] ? xfs_test_remount_options+0x90/0x90 [ 1514.313405] xfs_fs_mount+0x35/0x40 [ 1514.313424] mount_fs+0x106/0x3ff [ 1514.313441] ? emergency_thaw_all+0x1a0/0x1a0 [ 1514.313456] ? __init_waitqueue_head+0x36/0x90 [ 1514.313476] vfs_kern_mount.part.0+0x6f/0x410 [ 1514.313495] do_mount+0x581/0x2d30 [ 1514.313511] ? copy_mount_options+0x41/0x440 [ 1514.313532] ? copy_mount_string+0x40/0x40 [ 1514.313549] ? kmem_cache_alloc_trace+0x354/0x760 [ 1514.366795] ? _copy_from_user+0xdd/0x150 [ 1514.370961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1514.376506] ? copy_mount_options+0x30e/0x440 [ 1514.381010] ksys_mount+0xdb/0x150 [ 1514.384559] __x64_sys_mount+0xbe/0x150 [ 1514.388542] do_syscall_64+0x103/0x610 [ 1514.392434] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1514.397620] RIP: 0033:0x45a89a [ 1514.400812] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1514.419719] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1514.427433] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1514.434716] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1514.441988] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1514.449255] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1514.456520] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) r2 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000040)={0x1, 0x1, 0x9, 0x10000, 0x2b, 0x8, 0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) r3 = dup(r0) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000100)={0x8d2e, 0x7}) 16:59:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa00]}, 0x48) 16:59:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$IMGETDEVINFO(r4, 0x80044944, &(0x7f0000000080)={0x200}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:59:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) 16:59:47 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a0") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:47 executing program 1 (fault-call:2 fault-nth:79): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x80040) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000040)={0x0, 0x7ff, 0x8, 0x5, 0x800, 0xffffffff}) 16:59:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 16:59:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e24, 0x6190, @mcast2}, {0xa, 0x4e24, 0xc, @loopback, 0x5}, 0x7ff, [0x5, 0x7fff, 0x8000, 0x80000000, 0x0, 0x4, 0x1, 0x7]}, 0x5c) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 16:59:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000002000/0x18000)=nil, 0x0, 0x2a9, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) ioctl$VIDIOC_STREAMOFF(r3, 0x40045613, &(0x7f0000000080)=0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1517.203616] FAULT_INJECTION: forcing a failure. [ 1517.203616] name failslab, interval 1, probability 0, space 0, times 0 16:59:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) [ 1517.263262] CPU: 0 PID: 10062 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1517.270573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1517.279933] Call Trace: [ 1517.282557] dump_stack+0x172/0x1f0 [ 1517.286200] should_fail.cold+0xa/0x1b [ 1517.290112] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1517.295226] ? lock_downgrade+0x810/0x810 [ 1517.300071] ? ___might_sleep+0x163/0x280 [ 1517.300092] __should_failslab+0x121/0x190 [ 1517.300110] should_failslab+0x9/0x14 16:59:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) [ 1517.312284] kmem_cache_alloc_trace+0x2d1/0x760 [ 1517.316972] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1517.322099] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1517.327043] __list_lru_init+0x3d3/0x6e0 [ 1517.331125] sget_userns+0x84d/0xd30 [ 1517.334848] ? kill_litter_super+0x60/0x60 [ 1517.339095] ? ns_test_super+0x50/0x50 [ 1517.343003] ? ns_test_super+0x50/0x50 [ 1517.346900] ? kill_litter_super+0x60/0x60 [ 1517.351235] sget+0x10c/0x150 [ 1517.354352] mount_bdev+0xff/0x3c0 [ 1517.357904] ? xfs_test_remount_options+0x90/0x90 16:59:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) [ 1517.362760] xfs_fs_mount+0x35/0x40 [ 1517.366394] mount_fs+0x106/0x3ff [ 1517.369851] ? emergency_thaw_all+0x1a0/0x1a0 [ 1517.369870] ? __init_waitqueue_head+0x36/0x90 [ 1517.369892] vfs_kern_mount.part.0+0x6f/0x410 [ 1517.378964] do_mount+0x581/0x2d30 [ 1517.378990] ? copy_mount_options+0x41/0x440 [ 1517.391413] ? copy_mount_string+0x40/0x40 [ 1517.395662] ? kmem_cache_alloc_trace+0x354/0x760 [ 1517.400526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1517.406074] ? copy_mount_options+0x30e/0x440 [ 1517.410587] ksys_mount+0xdb/0x150 16:59:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) [ 1517.414141] __x64_sys_mount+0xbe/0x150 [ 1517.418133] do_syscall_64+0x103/0x610 [ 1517.422032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1517.427251] RIP: 0033:0x45a89a [ 1517.431498] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1517.431507] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 16:59:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) [ 1517.431523] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1517.431536] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1517.472660] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1517.479931] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1517.487213] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000080)=""/97) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) sched_setparam(r3, &(0x7f0000000100)=0x7fff) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:59:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:59:50 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a0") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r4, 0x408c5333, &(0x7f0000000200)={0x1, 0x28, 0x48, 'queue0\x00', 0x80000000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x200000, 0x0) bind$bt_rfcomm(r5, &(0x7f0000000080)={0x1f, {0x2, 0x80000000, 0x7, 0xe06a, 0x81, 0x5}, 0x6}, 0xa) 16:59:50 executing program 1 (fault-call:2 fault-nth:80): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) 16:59:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r0, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:59:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x47, 0x0) r4 = getpgrp(0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = gettid() r8 = geteuid() fstat(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001480)=0x0) getresuid(&(0x7f00000014c0), &(0x7f0000001500), &(0x7f0000001540)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001580)={0x0, 0x0, 0x0}, &(0x7f00000015c0)=0xc) r13 = fcntl$getown(r0, 0x9) r14 = geteuid() getresgid(&(0x7f0000001600), &(0x7f0000001640)=0x0, &(0x7f0000001680)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000016c0)=0x0) getresuid(&(0x7f0000001700), &(0x7f0000001740)=0x0, &(0x7f0000001780)) lstat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r3, &(0x7f0000001980)={&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000000140)="0188f36a5075fe13338bf108ee8e8264ee144539b9579f131b2f8a8faf466028ac0a73b606283da17ed2e7730983c7bacbff3c62efe480013d51a8a071bd58dca8e0a9b06cd77d470bc855957daa702692673c58905e04611936279a87724dbeb41acd555bad1259c5f68b21bd6bf38a8119cebac8", 0x75}], 0x2, &(0x7f0000001880)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x18, 0x1, 0x1, [r1, r1]}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @rights={0x38, 0x1, 0x1, [r2, r1, r1, r1, r1, r2, r2, r2, r1]}, @cred={0x20, 0x1, 0x2, r16, r17, r18}], 0xf0, 0x81}, 0x4004801) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x101ff, 0x0, &(0x7f0000010000/0x4000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:59:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80000, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:59:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) [ 1520.237509] FAULT_INJECTION: forcing a failure. [ 1520.237509] name failslab, interval 1, probability 0, space 0, times 0 [ 1520.381245] CPU: 1 PID: 10109 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1520.388568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1520.397926] Call Trace: [ 1520.400544] dump_stack+0x172/0x1f0 [ 1520.404208] should_fail.cold+0xa/0x1b [ 1520.408125] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1520.413240] ? lock_downgrade+0x810/0x810 [ 1520.417420] ? ___might_sleep+0x163/0x280 [ 1520.421584] __should_failslab+0x121/0x190 [ 1520.425856] should_failslab+0x9/0x14 [ 1520.429667] kmem_cache_alloc_trace+0x2d1/0x760 [ 1520.434357] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1520.439473] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1520.444423] __list_lru_init+0x3d3/0x6e0 [ 1520.448512] sget_userns+0x84d/0xd30 [ 1520.452247] ? kill_litter_super+0x60/0x60 [ 1520.456498] ? ns_test_super+0x50/0x50 [ 1520.460393] ? ns_test_super+0x50/0x50 [ 1520.464287] ? kill_litter_super+0x60/0x60 [ 1520.468533] sget+0x10c/0x150 [ 1520.471663] mount_bdev+0xff/0x3c0 [ 1520.475213] ? xfs_test_remount_options+0x90/0x90 [ 1520.480068] xfs_fs_mount+0x35/0x40 [ 1520.483709] mount_fs+0x106/0x3ff [ 1520.487173] ? emergency_thaw_all+0x1a0/0x1a0 [ 1520.491679] ? __init_waitqueue_head+0x36/0x90 [ 1520.496306] vfs_kern_mount.part.0+0x6f/0x410 [ 1520.500825] do_mount+0x581/0x2d30 [ 1520.504377] ? copy_mount_options+0x41/0x440 [ 1520.508800] ? copy_mount_string+0x40/0x40 [ 1520.513047] ? kmem_cache_alloc_trace+0x354/0x760 [ 1520.517908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1520.523454] ? copy_mount_options+0x30e/0x440 [ 1520.527989] ksys_mount+0xdb/0x150 [ 1520.531545] __x64_sys_mount+0xbe/0x150 [ 1520.535533] do_syscall_64+0x103/0x610 [ 1520.539437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1520.544666] RIP: 0033:0x45a89a [ 1520.547865] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1520.566776] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1520.574494] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a 16:59:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) [ 1520.581771] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1520.589042] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1520.596312] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1520.603599] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x48) 16:59:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x80) write$cgroup_type(r2, &(0x7f0000000040)='threaded\x00', 0x9) 16:59:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x10000) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x14) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e24, @loopback}}, 0x5, 0x3ff, 0x2, 0x3ff, 0x2}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000180)={r5, 0xa7}, &(0x7f0000000200)=0x8) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) init_module(&(0x7f0000000340)='^\x00', 0x2, &(0x7f0000000380)='/dev/cachefiles\x00') syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) recvfrom(r4, &(0x7f0000000240)=""/123, 0x7b, 0x60, 0x0, 0x0) 16:59:54 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a0") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:54 executing program 1 (fault-call:2 fault-nth:81): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:54 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x24101, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000500)={0x60, 0x0, 0x6, {{0x7c6, 0x3, 0x2, 0x8, 0x5, 0x0, 0x1f, 0x2800000}}}, 0x60) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff14, 0x4000000, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in6=@rand_addr="deea28252557aa6560ba88ff5bbc7e0b", 0x5, 0x1, 0x4e20, 0xd4, 0xa, 0x80, 0x20, 0x8, r6, r7}, {0x7fffffff, 0x3, 0x8, 0x20, 0xf216, 0xfffffffffffffff9, 0x2, 0x2}, {0x7, 0x1, 0x87, 0x7}, 0x5, 0x6e6bb4, 0x2, 0x0, 0x0, 0x1}, {{@in, 0x4d2, 0x3b}, 0xa, @in=@remote, 0x0, 0x2, 0x3, 0x8, 0x400, 0x6, 0x1ff}}, 0xe8) ioctl$KVM_RUN(r4, 0xae80, 0x0) write$FUSE_STATFS(r5, &(0x7f0000000200)={0x60, 0x0, 0x1, {{0x7, 0x4, 0x7fffffff, 0x5de287af, 0x6, 0x2, 0x80000000, 0x3}}}, 0x60) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) 16:59:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18100000]}, 0x48) 16:59:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="23ee0000", @ANYRES16=r2, @ANYBLOB="080025bd7000fedbdf250200000008000600020000000800050009000000"], 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x40000) getsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:59:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_pts(r1, 0x2000) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1523.348834] FAULT_INJECTION: forcing a failure. [ 1523.348834] name failslab, interval 1, probability 0, space 0, times 0 [ 1523.385508] CPU: 1 PID: 10155 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1523.392856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1523.402216] Call Trace: [ 1523.404824] dump_stack+0x172/0x1f0 [ 1523.408481] should_fail.cold+0xa/0x1b [ 1523.412393] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1523.417527] ? lock_downgrade+0x810/0x810 [ 1523.421701] ? ___might_sleep+0x163/0x280 [ 1523.425867] __should_failslab+0x121/0x190 [ 1523.430115] should_failslab+0x9/0x14 [ 1523.433931] kmem_cache_alloc_trace+0x2d1/0x760 [ 1523.438621] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1523.443743] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1523.448680] __list_lru_init+0x3d3/0x6e0 [ 1523.452768] sget_userns+0x84d/0xd30 [ 1523.456509] ? kill_litter_super+0x60/0x60 [ 1523.460753] ? ns_test_super+0x50/0x50 [ 1523.464653] ? ns_test_super+0x50/0x50 [ 1523.468547] ? kill_litter_super+0x60/0x60 [ 1523.472783] sget+0x10c/0x150 [ 1523.475901] mount_bdev+0xff/0x3c0 [ 1523.479452] ? xfs_test_remount_options+0x90/0x90 [ 1523.484312] xfs_fs_mount+0x35/0x40 [ 1523.487965] mount_fs+0x106/0x3ff [ 1523.491452] ? emergency_thaw_all+0x1a0/0x1a0 [ 1523.495969] ? __init_waitqueue_head+0x36/0x90 [ 1523.500571] vfs_kern_mount.part.0+0x6f/0x410 [ 1523.505084] do_mount+0x581/0x2d30 [ 1523.508635] ? copy_mount_options+0x41/0x440 [ 1523.513063] ? copy_mount_string+0x40/0x40 [ 1523.517306] ? kmem_cache_alloc_trace+0x354/0x760 [ 1523.517333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1523.517349] ? copy_mount_options+0x30e/0x440 [ 1523.517367] ksys_mount+0xdb/0x150 [ 1523.535765] __x64_sys_mount+0xbe/0x150 [ 1523.539756] do_syscall_64+0x103/0x610 [ 1523.543652] entry_SYSCALL_64_after_hwframe+0x49/0xbe 16:59:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}, 0x48) 16:59:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) [ 1523.548882] RIP: 0033:0x45a89a [ 1523.552103] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1523.571007] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1523.578720] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1523.585996] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 16:59:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xee, 0x40180) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000040)={0x0, 0x1, 0x3, {0x8, @sliced={0x6, [0x101, 0xffff, 0x1, 0x8, 0x8f4, 0x8, 0x5c8, 0xbd5, 0x63d3, 0x3, 0x7, 0x7fffffff, 0x2, 0x7b, 0x101, 0xffff, 0xffffffff, 0x2, 0x200, 0x101, 0x7, 0x8, 0x3, 0x3ff, 0xffffffff, 0x9, 0x1, 0x9, 0xc51, 0x1, 0x1f, 0x7f, 0x3, 0x4, 0xa27, 0x7, 0x583e, 0x0, 0xffffffff, 0x3ff, 0x8, 0xfff, 0x8, 0x5d, 0x2000000000000000, 0x4, 0x2, 0x1], 0x4}}}) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) syz_open_pts(r1, 0x0) [ 1523.593276] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1523.600565] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1523.607857] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x48) 16:59:54 executing program 1 (fault-call:2 fault-nth:82): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000000080)={0xffffffffffffff81}, 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) [ 1523.908199] FAULT_INJECTION: forcing a failure. [ 1523.908199] name failslab, interval 1, probability 0, space 0, times 0 [ 1523.933202] CPU: 0 PID: 10193 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1523.940498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1523.949863] Call Trace: [ 1523.952461] dump_stack+0x172/0x1f0 [ 1523.956100] should_fail.cold+0xa/0x1b [ 1523.960005] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1523.965114] ? lock_downgrade+0x810/0x810 [ 1523.969267] ? ___might_sleep+0x163/0x280 [ 1523.973418] __should_failslab+0x121/0x190 [ 1523.977688] should_failslab+0x9/0x14 [ 1523.981490] kmem_cache_alloc_node_trace+0x270/0x720 [ 1523.986595] ? kmem_cache_alloc_trace+0x354/0x760 [ 1523.991445] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1523.996552] __kmalloc_node+0x3d/0x70 [ 1524.000376] kvmalloc_node+0x68/0x100 [ 1524.004178] __list_lru_init+0x4aa/0x6e0 [ 1524.008246] sget_userns+0x84d/0xd30 [ 1524.011997] ? kill_litter_super+0x60/0x60 [ 1524.016238] ? ns_test_super+0x50/0x50 [ 1524.020129] ? ns_test_super+0x50/0x50 [ 1524.024020] ? kill_litter_super+0x60/0x60 [ 1524.028264] sget+0x10c/0x150 [ 1524.031380] mount_bdev+0xff/0x3c0 [ 1524.034924] ? xfs_test_remount_options+0x90/0x90 [ 1524.039775] xfs_fs_mount+0x35/0x40 [ 1524.043410] mount_fs+0x106/0x3ff [ 1524.046870] ? emergency_thaw_all+0x1a0/0x1a0 [ 1524.051370] ? __init_waitqueue_head+0x36/0x90 [ 1524.055972] vfs_kern_mount.part.0+0x6f/0x410 [ 1524.060485] do_mount+0x581/0x2d30 [ 1524.064028] ? copy_mount_options+0x41/0x440 [ 1524.068446] ? copy_mount_string+0x40/0x40 [ 1524.072680] ? kmem_cache_alloc_trace+0x354/0x760 [ 1524.077533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1524.083101] ? copy_mount_options+0x30e/0x440 [ 1524.087608] ksys_mount+0xdb/0x150 [ 1524.091156] __x64_sys_mount+0xbe/0x150 [ 1524.095142] do_syscall_64+0x103/0x610 [ 1524.099037] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1524.104227] RIP: 0033:0x45a89a [ 1524.107425] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1524.126327] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1524.134039] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1524.141305] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1524.148577] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1524.155845] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1524.163113] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:57 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(0x0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:59:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$TCFLSH(r1, 0x540b, 0x8) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 16:59:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x48) 16:59:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x100000000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x2) write$selinux_attr(r4, &(0x7f0000000080)='system_u:object_r:inetd_exec_t:s0\x00', 0x22) 16:59:57 executing program 1 (fault-call:2 fault-nth:83): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80400, 0x0) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000014000/0x2000)=nil, 0x2000}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x1f, 0x0, 0x84) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1526.390776] FAULT_INJECTION: forcing a failure. [ 1526.390776] name failslab, interval 1, probability 0, space 0, times 0 [ 1526.411413] CPU: 0 PID: 10213 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1526.418704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1526.428060] Call Trace: [ 1526.430669] dump_stack+0x172/0x1f0 [ 1526.434314] should_fail.cold+0xa/0x1b [ 1526.438212] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1526.443321] ? lock_downgrade+0x810/0x810 [ 1526.447510] ? ___might_sleep+0x163/0x280 [ 1526.451673] __should_failslab+0x121/0x190 [ 1526.455919] should_failslab+0x9/0x14 [ 1526.459748] kmem_cache_alloc_trace+0x2d1/0x760 [ 1526.459768] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1526.459790] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1526.474475] __list_lru_init+0x3d3/0x6e0 [ 1526.474498] sget_userns+0x84d/0xd30 [ 1526.474513] ? kill_litter_super+0x60/0x60 [ 1526.474546] ? ns_test_super+0x50/0x50 16:59:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000]}, 0x48) [ 1526.474561] ? ns_test_super+0x50/0x50 [ 1526.474589] ? kill_litter_super+0x60/0x60 [ 1526.474620] sget+0x10c/0x150 [ 1526.498574] mount_bdev+0xff/0x3c0 [ 1526.505197] ? xfs_test_remount_options+0x90/0x90 [ 1526.505214] xfs_fs_mount+0x35/0x40 [ 1526.505232] mount_fs+0x106/0x3ff [ 1526.505251] ? emergency_thaw_all+0x1a0/0x1a0 [ 1526.505269] ? __init_waitqueue_head+0x36/0x90 [ 1526.505292] vfs_kern_mount.part.0+0x6f/0x410 [ 1526.505311] do_mount+0x581/0x2d30 [ 1526.505328] ? copy_mount_options+0x41/0x440 [ 1526.538678] ? copy_mount_string+0x40/0x40 [ 1526.542922] ? kmem_cache_alloc_trace+0x354/0x760 [ 1526.547793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1526.553338] ? copy_mount_options+0x30e/0x440 [ 1526.557842] ksys_mount+0xdb/0x150 [ 1526.561398] __x64_sys_mount+0xbe/0x150 [ 1526.565392] do_syscall_64+0x103/0x610 [ 1526.569295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1526.574489] RIP: 0033:0x45a89a 16:59:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}, 0x48) 16:59:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) getuid() getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000001c0)="ad", 0x1) sendmmsg$unix(r3, &(0x7f0000001300), 0x0, 0x40000) [ 1526.577687] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1526.596597] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1526.596613] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1526.596621] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1526.596629] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1526.596636] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1526.596644] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 16:59:57 executing program 1 (fault-call:2 fault-nth:84): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:59:57 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000880)='/dev/media#\x00', 0x10000, 0x0) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f00000008c0)='!$(cgroupbdev(ppp0\xf1\x00', 0x14) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x800, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000100)={0x0, @aes256}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$PPPIOCSPASS(r3, 0x40107447, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x80, 0x6, 0x80000000, 0xfffffffffffffffb}, {0x8, 0x8bf, 0x40, 0x8}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x80, 0x4}, &(0x7f0000000300)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000340)={r5, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000080)=0x4) write(r3, &(0x7f0000000a40)="83ef024655dea061f4827aeb3fc7dc52cffbc8a035d71b57099ae7405c638635640c5dc19fec9f666340025a21b939c7fa64e8b33636251950e331ed4b76f342c56d5f37ecb019f992967e71287984810d46", 0x52) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={r6, 0x3}, 0x8) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000940)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="020225bc7000fedbdb2501000000000000000841000000140018000000096574683a626f6e6430000000"], 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x4) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000440)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000040)={0x1, [0xd0]}, &(0x7f0000000840)=0x6) ioctl$KVM_RUN(r4, 0xae80, 0x0) 16:59:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000]}, 0x48) [ 1526.827920] FAULT_INJECTION: forcing a failure. [ 1526.827920] name failslab, interval 1, probability 0, space 0, times 0 [ 1526.855069] CPU: 1 PID: 10237 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1526.862420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1526.871785] Call Trace: [ 1526.874396] dump_stack+0x172/0x1f0 [ 1526.878042] should_fail.cold+0xa/0x1b [ 1526.878065] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1526.878085] ? lock_downgrade+0x810/0x810 [ 1526.887077] ? ___might_sleep+0x163/0x280 [ 1526.887096] __should_failslab+0x121/0x190 [ 1526.887114] should_failslab+0x9/0x14 [ 1526.887129] kmem_cache_alloc_trace+0x2d1/0x760 [ 1526.887146] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1526.887169] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1526.887186] __list_lru_init+0x3d3/0x6e0 [ 1526.903496] sget_userns+0x84d/0xd30 [ 1526.903513] ? kill_litter_super+0x60/0x60 [ 1526.903532] ? ns_test_super+0x50/0x50 [ 1526.903548] ? ns_test_super+0x50/0x50 [ 1526.903565] ? kill_litter_super+0x60/0x60 [ 1526.913323] sget+0x10c/0x150 [ 1526.913346] mount_bdev+0xff/0x3c0 [ 1526.913361] ? xfs_test_remount_options+0x90/0x90 [ 1526.913378] xfs_fs_mount+0x35/0x40 [ 1526.913399] mount_fs+0x106/0x3ff [ 1526.960747] ? emergency_thaw_all+0x1a0/0x1a0 [ 1526.965253] ? __init_waitqueue_head+0x36/0x90 [ 1526.970290] vfs_kern_mount.part.0+0x6f/0x410 [ 1526.974803] do_mount+0x581/0x2d30 [ 1526.978345] ? copy_mount_options+0x41/0x440 [ 1526.982760] ? copy_mount_string+0x40/0x40 [ 1526.987000] ? kmem_cache_alloc_trace+0x354/0x760 [ 1526.991851] ? _copy_from_user+0xdd/0x150 [ 1526.996009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1527.001548] ? copy_mount_options+0x30e/0x440 [ 1527.006054] ksys_mount+0xdb/0x150 [ 1527.009604] __x64_sys_mount+0xbe/0x150 [ 1527.013588] do_syscall_64+0x103/0x610 [ 1527.017511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1527.022700] RIP: 0033:0x45a89a [ 1527.025896] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1527.044799] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1527.052507] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1527.059776] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1527.067046] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1527.074315] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1527.081602] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 17:00:00 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(0x0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:00:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x301800, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000140)=0x6) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000000)={0x10000, 0x3, 0x0, [{0x2, 0x9b1, 0x100000000, 0x5, 0x5, 0x9, 0x8}, {0x10000, 0x2, 0xae, 0x40, 0x5, 0xb4, 0x5}, {0x79, 0xba, 0x2, 0x7ff, 0x10001, 0x6, 0x9c}]}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x16c00000}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000002c0)={r2, 0x1e96, 0xb2, "a240af52decf96ac287fcc00d46b1e7d851a625f06c632a162990b479785621fbdd459c255a19a35b96ee3c461012faaeed3098406e8676e4ec22cae6e7489455decff56af89bff5e6e3ab7596184632b054f87f5874c87a8cb877e60281266408912ec9b381a28621e729516833490a38c4c29a4312d648e80f9a330041af5e6072b68e62b533864931f7ef8892dc6a409ab5ba639fd9e96632a72e5988c456dbf444cc251b4befad894875b568524c2a7d"}, 0xba) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r3, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x400080, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7f, 0xa, 0x18, 0x0, "ce6cf74f81aa176234e5105110793e2bb499931143ff64eea4df26d169c0a4f1e9560945c1a0878177b62073adbcfafa67e9b617efbe7bef97a11fb23804a6d6", "49907cc97b2de2026c277123a51952b7d516f761ff5a96107ada6f29257cc75e", [0x86, 0xff]}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1b, 0xb3, 0x6, 0x4, 0x22, r2, 0x4}, 0x2c) ioctl$VIDIOC_ENUMAUDOUT(r2, 0xc0345642, &(0x7f0000000000)={0x674f, "d592e39c25076ce59976db71079cd1e0cf060a548d95780616260e551486cf91", 0x1, 0x1}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000180)=0xfb) 17:00:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}, 0x48) 17:00:00 executing program 1 (fault-call:2 fault-nth:85): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x1fd, 0x2, 0x100000, 0x1000, &(0x7f0000005000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1529.447688] FAULT_INJECTION: forcing a failure. [ 1529.447688] name failslab, interval 1, probability 0, space 0, times 0 [ 1529.509669] CPU: 1 PID: 10264 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1529.516997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1529.526352] Call Trace: [ 1529.528973] dump_stack+0x172/0x1f0 [ 1529.532622] should_fail.cold+0xa/0x1b [ 1529.536546] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1529.541665] ? lock_downgrade+0x810/0x810 [ 1529.545825] ? ___might_sleep+0x163/0x280 [ 1529.549999] __should_failslab+0x121/0x190 [ 1529.554265] should_failslab+0x9/0x14 [ 1529.558077] kmem_cache_alloc_trace+0x2d1/0x760 [ 1529.558097] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1529.558120] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1529.558138] __list_lru_init+0x3d3/0x6e0 [ 1529.567924] sget_userns+0x84d/0xd30 [ 1529.567942] ? kill_litter_super+0x60/0x60 [ 1529.567969] ? ns_test_super+0x50/0x50 [ 1529.567986] ? ns_test_super+0x50/0x50 [ 1529.592645] ? kill_litter_super+0x60/0x60 [ 1529.592664] sget+0x10c/0x150 [ 1529.592683] mount_bdev+0xff/0x3c0 [ 1529.603538] ? xfs_test_remount_options+0x90/0x90 [ 1529.608385] xfs_fs_mount+0x35/0x40 [ 1529.612022] mount_fs+0x106/0x3ff [ 1529.615486] ? emergency_thaw_all+0x1a0/0x1a0 [ 1529.619994] ? __init_waitqueue_head+0x36/0x90 [ 1529.624590] vfs_kern_mount.part.0+0x6f/0x410 [ 1529.629092] do_mount+0x581/0x2d30 [ 1529.632636] ? copy_mount_options+0x41/0x440 [ 1529.637050] ? copy_mount_string+0x40/0x40 [ 1529.641287] ? kmem_cache_alloc_trace+0x354/0x760 [ 1529.646141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1529.651682] ? copy_mount_options+0x30e/0x440 [ 1529.656183] ksys_mount+0xdb/0x150 [ 1529.659734] __x64_sys_mount+0xbe/0x150 [ 1529.663720] do_syscall_64+0x103/0x610 [ 1529.667618] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1529.672806] RIP: 0033:0x45a89a [ 1529.676004] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1529.694913] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1529.702624] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a 17:00:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}, 0x48) [ 1529.709892] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1529.717180] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1529.724449] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1529.731723] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 17:00:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x4, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:00:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:00 executing program 1 (fault-call:2 fault-nth:86): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff]}, 0x48) [ 1529.973901] FAULT_INJECTION: forcing a failure. [ 1529.973901] name failslab, interval 1, probability 0, space 0, times 0 [ 1529.996803] CPU: 0 PID: 10287 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1530.004105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.013463] Call Trace: [ 1530.016069] dump_stack+0x172/0x1f0 [ 1530.019718] should_fail.cold+0xa/0x1b [ 1530.023626] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1530.028741] ? lock_downgrade+0x810/0x810 [ 1530.032900] ? ___might_sleep+0x163/0x280 [ 1530.037061] __should_failslab+0x121/0x190 [ 1530.041661] should_failslab+0x9/0x14 [ 1530.045473] kmem_cache_alloc_trace+0x2d1/0x760 [ 1530.050156] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1530.055278] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1530.060224] __list_lru_init+0x3d3/0x6e0 [ 1530.064296] sget_userns+0x84d/0xd30 [ 1530.064312] ? kill_litter_super+0x60/0x60 [ 1530.064330] ? ns_test_super+0x50/0x50 [ 1530.064346] ? ns_test_super+0x50/0x50 [ 1530.064359] ? kill_litter_super+0x60/0x60 [ 1530.064371] sget+0x10c/0x150 [ 1530.064393] mount_bdev+0xff/0x3c0 [ 1530.090927] ? xfs_test_remount_options+0x90/0x90 [ 1530.095794] xfs_fs_mount+0x35/0x40 [ 1530.099437] mount_fs+0x106/0x3ff [ 1530.099457] ? emergency_thaw_all+0x1a0/0x1a0 [ 1530.099475] ? __init_waitqueue_head+0x36/0x90 [ 1530.107443] vfs_kern_mount.part.0+0x6f/0x410 [ 1530.107464] do_mount+0x581/0x2d30 [ 1530.107480] ? copy_mount_options+0x41/0x440 17:00:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa000000]}, 0x48) [ 1530.107499] ? copy_mount_string+0x40/0x40 [ 1530.107514] ? kmem_cache_alloc_trace+0x354/0x760 [ 1530.107539] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1530.107555] ? copy_mount_options+0x30e/0x440 [ 1530.143611] ksys_mount+0xdb/0x150 [ 1530.147161] __x64_sys_mount+0xbe/0x150 [ 1530.151151] do_syscall_64+0x103/0x610 [ 1530.155056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1530.160669] RIP: 0033:0x45a89a [ 1530.163868] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1530.182771] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1530.182786] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1530.182796] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1530.182806] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1530.182814] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1530.182822] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 17:00:03 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(0x0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:00:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x1, 0x1, 0x1}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='9p\x00', 0x1401, &(0x7f00000003c0)={'trans=unix,', {[{@access_uid={'access', 0x3d, r2}}, {@loose='loose'}, {@version_9p2000='version=9p2000'}, {@debug={'debug', 0x3d, 0xff}}], [{@euid_gt={'euid>', r3}}, {@audit='audit'}]}}) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r4, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:03 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x10000, 0x0) name_to_handle_at(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0xd9, 0x9, "ed87c03123f920b3032bf5783b86ad565c97c4b3b2b92423749603043282f40d644b16b2e1eef1961080b0ce80c2d1220c1503ef36a1684fbfe5fdd9718fb16b72a27a864be2015e684f57d31fd593e75abfec48ed469374ca984a89d639f4541c5683a538487c30e286c8df198381a5aa196739e6f9fedb871d887e76d2f55fc7d4009252789ee1312d7c3403a3a3beb029460fd55bf6c3b366ec42a1d9501555bbddd1d20e8df2b287447e97bb6b24d8844be99ab740d0bcdc087465f3729b00ca0085371ef8ec796e1570f9bceab834"}, &(0x7f0000000140), 0x400) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x4) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = shmget(0x2, 0x2000, 0x201, &(0x7f000000f000/0x2000)=nil) shmctl$SHM_UNLOCK(r5, 0xc) r6 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xce, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r6, 0x84, 0x16, &(0x7f0000000080)={0x6, [0x80000000, 0xff, 0x2, 0x4, 0x8, 0x5]}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:00:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) 17:00:03 executing program 1 (fault-call:2 fault-nth:87): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:03 executing program 3: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$getflags(r0, 0x40b) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0xfffffffffffffffb, 0x103140) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f0000000240)={0xc, 0x8, 0xfa00, {&(0x7f0000000300)}}, 0x10) getsockopt$inet6_mreq(r4, 0x29, 0x1d, &(0x7f0000000d80)={@empty, 0x0}, &(0x7f0000000dc0)=0x14) bind(r4, &(0x7f0000000e00)=@xdp={0x2c, 0x8495236e1ef5fde2, r5, 0x20}, 0x80) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x8, 0x5b608888, 0x2, 0xff00000000000000, 0x8}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000100)={r6, 0x101}, 0x8) ioctl$KVM_S390_UCAS_MAP(r3, 0x4018ae50, &(0x7f0000000140)={0x9, 0x9, 0x5}) epoll_create1(0x80000) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1532.486076] FAULT_INJECTION: forcing a failure. [ 1532.486076] name failslab, interval 1, probability 0, space 0, times 0 17:00:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff85]}, 0x48) [ 1532.568664] CPU: 0 PID: 10319 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1532.576000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1532.585359] Call Trace: [ 1532.587976] dump_stack+0x172/0x1f0 [ 1532.591635] should_fail.cold+0xa/0x1b [ 1532.595539] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1532.600650] ? lock_downgrade+0x810/0x810 [ 1532.604810] ? ___might_sleep+0x163/0x280 [ 1532.608990] __should_failslab+0x121/0x190 [ 1532.613242] should_failslab+0x9/0x14 [ 1532.617064] kmem_cache_alloc_trace+0x2d1/0x760 [ 1532.621745] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1532.626862] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1532.631810] __list_lru_init+0x3d3/0x6e0 [ 1532.635885] sget_userns+0x84d/0xd30 [ 1532.639610] ? kill_litter_super+0x60/0x60 [ 1532.643856] ? ns_test_super+0x50/0x50 [ 1532.647749] ? ns_test_super+0x50/0x50 [ 1532.651643] ? kill_litter_super+0x60/0x60 [ 1532.655888] sget+0x10c/0x150 [ 1532.659014] mount_bdev+0xff/0x3c0 [ 1532.659031] ? xfs_test_remount_options+0x90/0x90 [ 1532.659047] xfs_fs_mount+0x35/0x40 [ 1532.671068] mount_fs+0x106/0x3ff [ 1532.674532] ? emergency_thaw_all+0x1a0/0x1a0 [ 1532.679045] ? __init_waitqueue_head+0x36/0x90 [ 1532.683645] vfs_kern_mount.part.0+0x6f/0x410 [ 1532.688153] do_mount+0x581/0x2d30 [ 1532.691700] ? copy_mount_options+0x41/0x440 [ 1532.696121] ? copy_mount_string+0x40/0x40 [ 1532.700364] ? kmem_cache_alloc_trace+0x354/0x760 [ 1532.705229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1532.710776] ? copy_mount_options+0x30e/0x440 [ 1532.715284] ksys_mount+0xdb/0x150 17:00:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r0, 0x0, 0x12, &(0x7f0000000080)='ecb(arc4)-generic\x00'}, 0x30) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000600)={@in={0x2, 0x4e20}, {&(0x7f0000000500)=""/199, 0xc7}, &(0x7f00000002c0), 0x42}, 0xa0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RSETATTR(r6, &(0x7f0000000200)={0x7, 0x1b, 0x1}, 0x7) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f0000000000)=[{&(0x7f0000000980)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000380)=[@rights={0x28, 0x1, 0x1, [r0, r0, r2, r1, r2]}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r3, r5, r7}, @rights={0x18, 0x1, 0x1, [r1]}, @rights={0x20, 0x1, 0x1, [r2, r4, r4]}, @cred={0x20, 0x1, 0x2, r3, r5, r7}], 0xb8}], 0x1, 0x0) [ 1532.718834] __x64_sys_mount+0xbe/0x150 [ 1532.722820] do_syscall_64+0x103/0x610 [ 1532.726719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1532.731912] RIP: 0033:0x45a89a [ 1532.735118] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1532.754040] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1532.754056] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a 17:00:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000000080)=@sco={0x1f, {0x3, 0x4301, 0x934, 0x400, 0x200, 0x56be1703}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)="e4c77195ac77c8db8c393b72d11db2096722bd9982ef28de74ab5dbc8e580a142b90073031fe5e3f771202c3f0b577cff34814f0b516665fec0f85fc2086bf22a3cf49370775b8d957712c14aff6a9e0afbc05e647ca6c99ca8f457c59bf00b65b459b8719088c9e5f1f5f608cd012833fd6681fd1f7ebe0fda6e30b2a47553934a6646bf983bd74bae4b25dc1336b43646c1214bdf26a3b839393977b1dba7c2d54be43639f2333dfed25a6", 0xac}, {&(0x7f0000000300)="480701e02a896087c5194bf824f2479bfe77cac45b2eff63888c3c958654b25116010ec92abb911702ef072dc5fbeda9891c860010322a26aacfa50ace486129ba5a4a65a40c7586a68c61b33809a0cce39003bd2683d64c6f6547273ba7d1ab49dc246e33642dac8dfe2bff6784aeae8ea03afae7531bd3dac17e8e0980b734d68bfc7d8ff16221575f2b152eb968f1fd7d4aa5acb568c91f830f841b0024b94116b133954eb956a6caee81adc57d766cb1d1c81bea36000d02194e2b7933309067c7b83e01a0536f9fbd88aeb760f0e8162730270c1ae4317372707c56b31d8f2e89c2bbee9fbc05f0ebc73826a14def", 0xf1}, {&(0x7f0000000000)="2b7cf7d964395e1ab11ffa948c718c1c9244f5f19cd2c0", 0x17}], 0x3, &(0x7f0000000400)=[{0xa8, 0x114, 0x4, "35e3bcdcfe5f1135e8744e8d20803800d272167eee1dcad2490d8125e74e75a42ccf43c0c409ce70529cfbb886cb10b76144a2bc1f78e3b95ae5a4137f166d172e2a59c16dcb987bf14a13f6302a3db0cd6dc9f9e6024585571a6783d2fd8dc4667ffb38220903b1908b720876416d1f922e23e00b1fd7c27a8421f365b019902feeb909476adb08704fc6a6b1877efed7482636a56b37f4"}, {0xe0, 0x109, 0xe3, "7887de8f6f6b4a0a121575b95fd6dd8383485c206ff8e93c60dfcb81a18178642f30e4302a17e53e7279d041f86e900215d6c15e78c0ca30a67813771d00762ecf81fcaccaf05ef5e890a3f37fda747120b0f0d20d14359bd19350bc3121ac24355ae66a53e583025c783289a0e728a6676e1d1ab3f81904f6748d56c8dcb0503616ad7a943aa440dfe0af62d7573f2788ec7ff1bafce96a34ea4132c863c31bd40162e7853d0876f4dd477552e65f1333796814d8515f2aa13859a95e803ab4979c592931ad8d8fa5c6"}, {0x28, 0x101, 0xfffffffffffffffa, "7318a86c94ca62d32dae5480017cd4cf86"}], 0x1b0}, 0xc0c}, {{&(0x7f00000005c0)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x3, 0x0, 0x4, 0x4, {0xa, 0x4e21, 0x7, @local, 0x7}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000640)="3ef696d03be1552cad2ed5d7cd4e0892fde0c5146fb5bc57ed72910d0e83874d4302f9cac5f4a53b33ce74e5db95f6f693bc42aa54a7a1b118b78a4b16d6ee40320e44e0d90d141d710d9b7bf29ee78eeba4f91c3edcc4f69da6dd6ee6b8c0fc65781e0102519e26dab891c0b69b1943190e7c887739bb155e0c0d4d41df5bd0bc02521c869bc269ed27998faea0acd79a2374b2f794fba8c7f535598a5ffd134fd7987b4b0dfda41e7e107f2332bb7409164b32cc8d49493666983e2860ced96d1ff3a6920ddbe720e74e9c058a54ca8f7dbd38daccfcf1fff683ae0ae52b3837367650b8d294fda5319475496f7338a0cb31e971969203782f8ecbc4def90c10b7ff6740180e3d7bc6be4f177a7b4c70473e01ab4351a5f254df5d55cc2551b93485304b6486596176ba711925176a2e4a634d953d7b83caa339bfefeeaa6cb0f2921f2ed7effed187af738876b5bac2d48fbd44083df84e9b2581ba6417b8cfe4138a1f54b285541566a79f8c30d4748279942fd1d29bd2a5a8efb69f2cbc3799e9f0fa97eaabe86b2143e81272ac8dee23ff40bbf6a8d3410d1d920a19de603a0b9d595f0318c27aed4f5e81d48a6a18b348cc8123ab1eb2b9b4bf03126ad6e06d8a59557ac93bf06282a85d4b100b3582b6c2660f3dcea5255712f9679c40e2631c4b0d456406d848e3d9ab1e84e296b6b1044f6eee26d6de2204ef36cabfc9ca4ee01ed14015eb47373858a85be03e6653e74295e30c015e3175b8b0379ddd898f0c522f51f8762014bb203a62e107a6d36d2ea2341bd932667ed2caab790db8484f0d43a29b54faf725cdda815ff75be9b4e731c357708599bfe72ef3b159a4cb9f9a34eb262472f2cfc2f6159894f8833fdbaba0f8e622752a27da74d66d4d3e88d40d0669478a8484ac96bf787a433d989c48026272b73719d753a5bad1cffd0c54d867b66ebcffbb7998058359574a791d55a0bf9fe9d3071e7d3a038819b69a6ba8fe63b0726f50d9472c795369e4c4146ad8d5483da461042e08125e52085284cffc656835d3f8bed002bfb4945bb147b60c5a3c31d243d6bf6d5c7b1101bf02f48c6d36560254c06340e00bfb96dc2a6807a6ae2970980631157bd3e4f861c229b5cb5b9d63bbc98240b55a16635b08442f487c252af9e659729858575ea5022b4865af4e7cd5f20b6a77aaf729dfe211bcd22a1fbed51edaeb395f5e9c02c224ac8915bf9d133a339f3bf05a4f0ff03f273f0681c8bff414af491ec544e7c6350d16b3583c9a429108be39bae27c0457d7a9a2077a722f1946b10b997215889a1a8a12e640aece9115794a8f1405494c2703dcf07664d33168e997e4769e2ca3aab62546886038f3f2bc7c1c48876d067ba30c9f280f7c957ec56243637caec05244f78c25b6d4b1bbf7365e92c3482da33e7286c7de119d313dcb51edbab4607887488b8f531860298510c4de83e2ae123e26eb1605662a3a204e9654eb56f3a3f70930d2cde3173d4bfd8aa75e70fff85af0b3b05c2265c22219776271a16d4b07905fffd6176a3b084f0a5bae13f0521f44d1536b0cbcca3441f9d848b02226a81a6257177e7aba299fb346de97a531aee8463555c472d17cc47f66a23e42379e5f1a3ce9fa56f5b6f0f132738afb50e64819d60e65ed0b1676820aefc0a7f32ba39a2d484db1793e0df54d59474bf18b10aca627dcc2436e1d162eae3a35734b75cfbf395be9cafce21a24524acc9c90d89b71af3aacc95f09baa51d957370c22e9124d5a53b0ef9089fdcffc5b123c5fb2ea6fd0a796c8dc6336ae79cb0e312fb7242407716218b9415cb0b10551f18701b93aed15263b29ec65e492ce111c3b1953bef4c92a48d8a335a69562ec9ec35ad92d6fbec299c9d05dc2b2e6d64608fc4ab6e2d252576b77428a927aec8873962a2d59685c7b61a51c95da2a05e8975462613cf4c9dd62fd7d502b1b8c9d5d18afa5e4994f58d0e971408074c718d4b4b01fed804282b9327db6fe66e8ab3c48a1423426cef4e0e4e96359ed2610035c5efc919d065b50ea061ec017c791e4b62704c2238ead89ca9f7107df4d5074baec0e05b7bfe33c96c251fee627479cc3e8eb34d0a32e8c12602ea8757e24fe81436b341436b031aeb36a9746d1c12c9a80354eeeced1a927ab5649ae03c35ac3cdc758e1ff2b61cda39b433c3b3c00272d71572df00b96f0bb4f7afba0b455ef97ccca1c30edfcee74ecb50a7841e62d9a5b884cb5806d1eeaf0929a973c0785b646787b7e360fa30c92558d2abd7e657a2bc0c5e62f1c8a52fdd099f351012c8b6ba36bf0ad77af9d4ab0bb5df84748b4b8d3e096deb6c84c32bf654b0d205a357de7587dff317b5f68408ffa76140fba824649a2641a3f5987cdd31751b13c3612c8d7d753e5869fdaa26f1f1a5d18930fb85e404a6aee6e8120f28249380a37aefc6dc618a8be3888fb6afa2bd4d800484532cf8c3b3300f64612501d4930927880a43c123d9f4998ce6d83d2b69bf239ba14c5ae18624dbf7506899c0adf7f05006672afa0fe0d3fcaf8b6b4ce25263b937d28e10cd4b8874e9a70e298fc1ab32ff3cdbe2d3935efec34b4be4e0d0a9b7796b22189a7404e33ec069b3b087ae4af393c460a6adee75ba4c6e6fef1f586ee1f344a993651766d53ce4a74a28981ad32eeaf60693b0403229b7a52ca577870c9a71a99dd842008c1d78901ab07b9820e296f81fc6ee195abf41e580987a53ca9f237df8f4e024f26d603725eb6ad64a8a11ddb6cb9ebf2aa5b8ae7eb599f7b154348f8f21c79f4a847a67ecf79c004823ba347e84e99acad8fdf61e7b01c483bc6970219fec90dc273dee094f7fdc887b588beb8fa0f5d2ecd9c55fa82c69f4f992cf71702a385e47d873f058883c6b06026881e811dc73ca86e4231d431389f040c7a307f151f18492b6faa233bf343606577df26a76d65e20db671d75f93d32259d09d57ee655a69b33f91684eafae46f3d03d11d79505bd3335bb3dc9d37e0ad57db5b118855f6821babcc94e78dd3aa6184cd194b2988fce719213e0af9d3e75902ba8a5ffa3e6e169fa871194b1b7a4090eba493a8113cdb69bf68006378e867e6cfd017c2cd80ba41e4ff020aadff1eaec21a39f79e45478ec8a77735ac7bda82e6a8a85f60b5cb773470d0b7bc2caf8864cdd3542a08eef33885db09b60e27b841afe0ee7bab029a7559774b63af81251724f49084887de9b274e377aebdfb81840c7d274807ed89c0d4bae76a38ea396e1a502950edaafc21540e2170adb14e6afa2004985d07879d0c0aefeb7bcbaa2c96a7019341e037fe2687eb2cf9b9888c57cc9cd832b4e58ea67f3dff55fe92a36164be93d205f21cb2253754c5f562dfc86ee1e91c802a4c04e20561dabc38af58c013c143646d0f85cbb91ce477ac0d4103f238b18ba9c4543e47d5b6baec60b94eab45224fe6485fea856e3315b595cfe35311c4ec62180a5c9327d88f14d4448a64313c6fd99952e0f54e579383c628ef76dc45907026e27ba51fa3826d3326dbd11606e270eebc7d6a2965c988cb6559f1ccba239f6ed0a5be9fae2deda65b0a9f30612b9b14c924176fe1a876063c1762f0bbae685488be6d898c73c71f443623e0f685a322b7860f1cfac80c010e65d5a4b8daa199219d31dba42b353804c5f9018f7b83896190c6585b9c6b96bc73cf3e824a2fb6dbae0244b8e548288229b8769d915c12f89b79cfcfc76fbddcc0ac9606c25d7b581d2c39bc46dd73bb3c3868ce3f9e6d5f8dd345287ec329014944a5783e06a1ceb902bf74616a16831861131419a91ebe92706c73bf906a460ff547791b666a335acef4ab37e6d30e203f264520a03fb5413c407fb4ea255d9a81e74ce83b6d80e0b4a0afdb619d11527873c35eb2af31dc4e8c78a53df893201a402da58ae2080799e569f6b52c5e0d6b2ea724e2076e341da70794fcbebe1dd820eaa20f9b16d3d2178e8f6b904033b5a8384a7710cbbd6be9630e5970c8a397d9ab6eba13f26f423bcb832dd9d4628fde92ab1227742a5340025c6de518f340a50429f1dd01adf376da81b4908b4cf758bb6bfca49a525cbf3f396954a6aa72c063265131cde005b2ba0836890e06119a4003e4b28a7a8ddaea0bb0d894c0d5967056ddab774f794e10d3aa5ad102dd8685af3d2c28b9e6fb79fcedc1e220f094c7faa74f9efb91c56b0563f2cf04a3c74c6c3718906aaf94ea0d17af41f00a5ba76f6da421bba217fcb76342e6705bc54bbaf7c0393afc99175ce8a3a1048a29ff6c2306ed79b104476506f6473f663c8f13edeacd8d75ccfa1f8b8410b21f301a0a3cec63025bf6361c694148234e158fc33b617c0c2229ab1155937fb610fb38a871598b71dd0e6bd1417f4b99ba9dbb1c5d77915d98a805544e9333c52f4901321ae2cc32ca016ef003c8efb823a1d0a03eba01181cd41f5087f0a8ee3cb20624c0856308dce8330659ad8bc98a6845064909b7ddfdff7ac60a44efe3aac974e29c064fbb5632051f43b49d8ec26412f3e03f3b3ea7d4ea7c6966cda0415fd1b56618da2bfe9fe0c12570eb9b978e26230ca0ea17cb608cdbc23fb37b9ba98aaae79036bda46cdac781d2ec7a58d89b46ddcd32f500cb96c0e0658c2a16d403525cc57a3bfa71fa82736cbb03179f42a88be2985de625c4d8cf4c053c86df58f67e20459c822104e1f29aa44fd86451bb4af22ea042daaa2041c6dbca0a9bfdcb30bc4231acd2050caf67e5f729d35aea58a336dafd55b4a8c9d5a065dae74246ff657e2a43029fbb80ada09ff4d76de3398916e9d9d2966bafc2e5c8d80d44e03b558ed330aa648be1c7245d9675fd7d358c43cef13ff78d77215022a236d7001a3c79fa19c882a8a0dea77fc13d7586091031a2fc588f72055ca7de33c68e03d0e1ec2fb582559f0df5b3c5f8fdcbce5a006b37eb3dd94a16cb1a5d5bfbb57755da81f0ca8569c264d145c415dcad6f5d710bc4978e788b9f1593c210c92e79f1541cac43119f401bb26869b19c84407f847f6137736ee843558dac97df99eaf829de2a23522b27ca9e51a804d34b900e0e8bf4306c2e1b91338aaeab80d4be606cadd0b83f920e632737378f5655f48c69f63fcac42eedaf516c702128407df1451ce8df45baba9f101406a269fb3031ccf3f4f73d212a3f905fc0cf0ee2aad09d8b72e010eeffacf7e534dd68d07f42b761b1fddbbcba1e607e3459ce1d6ed7c1fd20dd5d11390cc2bb0bc05d533477ab9911a21e1dd13bd3a4d6c8c36f9069d643fca46a49923bf514cb800467ccbed1fa0804d5d3dd8fb5e3f078ff228b53be0847201f4432f7a294a4c6a102fe810cb77eef444c730654b4f08d8abe4975ac2d61f69daebc403da3552623bc0eb82d93c4812e8d08a7e952a9c88252ea5859b07d01183593582ff1243abd02a68be341a98aaf2dee677d1aec528f7e332145cc2f610b34b0ee7eaee38747c6b18b9261ad9c4e007273ef524d0b92a8b1ba07a4f0b0c446a15a6b54840f64d1cb608aa2020da31d8a07a54d9be6fa5f795176687515fb1f13c4e4e0382420c92c9cfe3ece4d8a3030c688c2efcfdb34013b84e90e8302e86c210458a708b3b975110e9cfb759106da0ead2895f203a45299f6d6dd1342d99d7edb7298ae36a7a91980bf1dce3ad5f85420bdedd8c4e4a2214da52ab36860b4a5b4137965757d5818968dfa8717acbb5448c537db9da11c3afa07d04771edec52aed3762d0311c85aa64f2ab98510", 0x1000}, {&(0x7f0000001640)="1cd71cb5278df0a45d4846d7cd9bfe5aae4ba79450aceac4919cbbda624b5f738c4c1ff03558800cd30b2ff47292bfac4230c900fedca52c0963bed996d4c68240beacb6c0b806a83fa5bf3b8f1b25dc5803e990d327363969dc631ead8af7e717ec63a94ec9f53eb4c65438cbe729584e516f328b6e88dc6b99e14417b1474f938cb8f8df29994acff60ddf999458fdbf524625d0c06a32c3b3d3b1ef97bd8e7579d04831abbb2ef67b40304ca5eb23b4cbffee33d51e8ceacd1b346c192ede9b42a790e17746a5f39f2dbc3a82f03a559b55a944265a83fea20670227e1523e86c4883e4551915", 0xe8}, {&(0x7f0000001740)="9851b97e0f5385952ed119c8d40ca9ef644228c0f6849c399c937a9e9da3f39403184ba92cb39ddb8381e55feaad611d1ab45d50e14a264bc91fa36af30cb1bbff0d59eef41852ed21eeb764378bc2507b6779e6739cd0", 0x57}, {&(0x7f00000017c0)="7389d28d00016d95d6126ad767e268c579e5996cc0d44c443704788521863c7a2c81e6b76af499b206b9e80c52aa664fdaad37e73f75812632654345a1e0ee65acb3540ccca415f406", 0x49}], 0x4}, 0x8}, {{&(0x7f0000001840)=@ethernet={0x1}, 0x80, &(0x7f0000001b80)=[{&(0x7f00000018c0)="4bcbe5eed68ac80f23747819534a03121285dda11491355e31031e5eba534b38be9ac55f67854b8702ffc93a4831fe0f16c06371bd7e768573412a5eed000ab32a257689aa80ab439181a4eedc44836dcaf02001f8f663b5112cfc5d736066a7a5468939806b0f9eb11febc902c104338f33d3e145adfb5ebb712d6afc6d6c66198b62bf26a333041561c97dce5911635bb09bc821383af7ed93c967bb61a2b32bf3f08f3e29b26b08d334", 0xab}, {&(0x7f0000001980)="27baeacad3cb50a31ad8fd47851121adbf2e41f41c09f6b51e42e2b397a2e74291b3c42cb5d6e865f01383724556e5127946342c42dfbecfe780421633e814e5dea8730ea1deca0ad8bdb8cba63ae9ba886fb4ded19437af13fba0b7a7d42977e9dcae355bb8160dc431eb879225a44a311afe752e2c6a0acfea24853be945e3ac99892dcc50cdef62b620e343e1ec8f80929bcfb8429b57c8467b8120c4f245fec905704a464a15b26ff7643394869ad2f9e79a3951acb424", 0xb9}, {&(0x7f0000001a40)="5c49035e831a72a434bc0e9ff8fa6ccc5458e3319fa07536c4b4588c52effee92e67eceda7c1016f35a6e6812631a71cd1ebfce37dfacfa333801d3b4df062442c1b203971f639c021c1a807febe15f73777", 0x52}, {&(0x7f0000001ac0)="ac5623666746ef41bdcc924a9e5ccbda72cc1c789dee55a0cca300cd4b003824dcd90ff6d57a5358fdc43e7253b0d3069199224e31972307724393929b61fa587b782e96ea5253dd65bdb9393b11fb2460d69647970d1d497fbc7504ec0b2ef06ffe3571d6e598f47b9ce020452c5d333e6da8db7d061741b7299a07611bab27f13a6a1b32fc81446e83c4f938e71b85b2ae6f4f62ae5852c1b2c18f73d175f04995ea5f21d11325d5e36f7e86df89ac", 0xb0}], 0x4, &(0x7f0000001bc0)=[{0xc0, 0x117, 0x7, "169c4e9641b537049c415a26faf935079d8ae240b660d9a88132cf11c63028471b68f7a1d1e678f9df2792c4b8b34c0aae30805047ebefa52c7680f15f1c5fa29f7b87e1173dc3faa22db8a6b0de01c13a396a5b3fdf2905ac14424dfd2ff9fc470bc831f4fe2edc9e41225ab62d6d7e9ba5119b7f8d75d7170eb44b46908ea62db55387318489b18c5a4a8e0f4578d1fa5488b442464cf9e78e6d2bdaac43ca5be9d12a6655f39f3d4d2c5f2c335318"}], 0xc0}, 0x5}, {{&(0x7f0000001c80)=@ethernet={0x7, @local}, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001d00)="6aaf88994dee9883cd5d821b47fa539b00dc49e63cd53efc3a29ffe3f2708b3a917f038612c154f2785a95b8ebbb529f7ff1a3752e9544115d759522d010a4ab5aacf1a658b2cc36db9839f6fa48e7206f8288d18ca41147dd3d16f32d0b74dc86191c43d8fb158d", 0x68}, {&(0x7f0000001d80)="3a6066c1a64131be44f5d901bc1ce6e19148027938e2254152e09bd922b178a8a5fdfea153bc717f084125b2127c335aa46bd90bd176a3de5e3967314ce65d61e935b28a336333d5c31f675302d2ff597a7f220c6b23c0f5f5525ca5ae8bbdaac6672649c1f2a64b5a945909a4077def372205340b66adb340d6d02bf76cf7e12726c343f683cd918e93edf8032c009f1824547abbc3928a86ae94d270b56035e8d85d373d8ab8e120bc5460db175ff8e316a076ccc997c79c39193afcb5736511df17d162d0d81711a35c4110687d46a1e7db2a50d4f0c7880e2211e1f17dbbc180034e1153352af8be9969f6", 0xed}], 0x2, &(0x7f0000001ec0)=[{0xa8, 0x10d, 0x10000, "0cd776fe0fb2be224bd57cca9b2abcc84ed6c4beb050b05691a05290571aafe42b9b6cc01bf4e6f7fd1e732434f2f13671618f45f39440578bc00ec162681fac4884d1e587ab8f6bab1e25112d4a2d61752e78cae0d68470ab5c13fc55e41f064eddad89fbd06af75bc8ec6c7543bbc10d2d5c254d483e8684ec4878133a09e7a6c8b729a17e4413356c59c78224cd5bf1683fec"}, {0xc0, 0x10f, 0xfffffffffffffffd, "9c442ac0d407319ba9983af9da63ff5b8eea3b608fbcc73c453c6a4b63a654e85a4d6bcbe3bc18c27e550a65f3e73f80ce4ee20a7e27557016643d038874638069763fc98fc605e04b025eba9affc328821267256bb9c1dccf77e6561d375352ff414ff5bc3affd471f05b92cd4dbe0cbb696f9aed4fa24e5b8f8bef1d3522e48faf7902ef3047351681269c2b0c5ac1be3dd1c09f40a4efc5cbd60129ccceab578a8ddbb4afd913929a"}, {0x98, 0x196, 0x5, "1685c762fd0c43d875b26268d931a27dc5a26aa008d656a13ced306ef58b74084d1d9c1acc084f656c3ab6d25a24ef9bfaf804f58a9dc54d861b016d2202ad50bbb713ca922fb470b4b85352749f798b1a76fa238c3904ef7625ca251b67362bf7c72790fcf4e0a86521a922f511852282621297d99573f06b24431f7d52a0d64a69cb03552535"}, {0x108, 0x6, 0x3f, "e6ffa9523606b47402988ecaba8453588f66f996312b5060f8115b709e62f671a2fd8ccc473234974b3615e1c6c286d1c670ab09958e83c1231d9a8141fcbd28b960ffebcd0085b26986768ba353c4210ebe25a4377d1d8a15833f4120d2f376cfe8846440f7f9b0c800f9acc8fe3f3b8e99e56b7809bcd4605d87b1af1fd3eb0291fd28c90b274c7720182ae1f80e66f4fbf823863bcdd75af08aea726c056b90c04fbff986d7cecafbc6ee644726ba07c658f2bd72950aece6f4ce9118fcd9dc25f7dd5c15e5e2311d334a23ea37778af77970590b3e54d35420ebd22e86c0b4930640afa1b5937dce703e4f0ca66fab8baa14"}, {0x1010, 0xff, 0x7, "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"}, {0x98, 0x100, 0x3, "8627895151261422f152753f256139a36997afed71097392333924044c556da57156a8a601f59469992bef3eacda4a10985b9fd2287d10ef2f775dd32c7ea015a94b4aadfbf6ae0739f4a963597488d07bece445beac52492679654fe10bb3dac909a0cd77005f1995aedadd44e1d7aff98a803d8a53d054265cb924eb65039bdc"}], 0x13b0}, 0xec0895}, {{&(0x7f0000003280)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e24, @loopback}, 0x2, 0x3, 0x4, 0x4}}, 0x80, &(0x7f00000055c0)=[{&(0x7f0000003300)="35c0339cd46adbf5c53ad07fd47210fb67fe455171425708e4a160de808edc3d5a3cddb8ba847e968006743f74bec545052f11c72c662d38b51807001f1ec7a2e2227203b8da8f38a4da44dad8cd893dad84ed93ea1892ef3c1bc3b92b0fb036164fb2b63ad4a55900d8d73570b714a127d9f536cab6763c32999ec05180229b46c677f395b7fbed3b4194f3323cdc755161be57d3a37fb5595a145e2e11687b091ce84c815db988b1ac2d0fe95f5255152514da1518a5774856809c2f70deb288de358e49e855c39fe3788fdbac0b64cbecd3b7ae856456dd64b1138f97a976677fe42e40d64a9d6292ab5b28fda4283adbbf423afd", 0xf6}, {&(0x7f0000003400)="f456bc3ebd39eaa2e3b9612dcbb93a88ca3b2085016f1db588f0a80cd084a6eaf9b5c3a322f3da57cc38d100ef0a2334bcb27a4881e51774533a48abeb1082b384ff12ef558a7247ea4e7437a330879761455fe79b7d33a6ecfeed5bbb42f4703a9293d42d997635f74cf0baa713cf4d48140a788a0b01bd97bfb37a537499fce1c9731b76934068927c2c5a3bb6cccdd32e74eaaac300c642d25eab574457e147b41d9902418c91d2e2457f5df4d0db6e7d06b1a4518ddd42bf52e4314a2a92253e61490e639fab83ca8631bebea66d", 0xd0}, {&(0x7f0000003500)="c81faf8b8cd3eecee9e8ba7d41b0d3a707388037e36c027c03f9", 0x1a}, {&(0x7f0000003540)="8c6cea0839fb02ebef50601a241c094ab4dbd2d48e4c8533eeb6884cdbcbef582f0eeb6a189a7dcc7993b2ecae09438e591f617d3e265a83b824cdb0ecfe66a67dedbaf121ae96dc35185d865d", 0x4d}, {&(0x7f00000035c0)="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", 0x1000}, {&(0x7f00000045c0)="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", 0x1000}], 0x6, &(0x7f0000005640)=[{0x40, 0x113, 0x1, "858e5e0d69f847d240da0be153a4464c01eea48d7e573fc90d781b885723db0aad3c8e5991a4c19ed49c22b7f8"}, {0x48, 0x13b, 0x3ff, "347f0f35a8add444f9f46fd7a9780781e98a451e18bf8122dd82f5ee2dd7c7a3ebe47f8d6b3fe9a4948dc2ca7b314feaac03"}], 0x88}, 0x9}], 0x5, 0x4000) 17:00:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) [ 1532.754066] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1532.754076] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1532.754084] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1532.754093] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 17:00:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000000)={0x8651, 0x25}) 17:00:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 17:00:06 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:00:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000100)) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000040)={0x7f, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f00000002c0)={&(0x7f00000001c0)=[0x3, 0x100000000, 0x0, 0x9, 0x8001, 0x7], 0x6, 0x401, 0x1, 0x0, 0xad, 0x7f, {0x2, 0x0, 0x8, 0x4, 0x80, 0x2, 0x4a6, 0x3f, 0x9, 0x7, 0xce5, 0xffff, 0xe7f, 0xfff, "01b4e8d30733adff7d18e738dd47b6cd905893834ea5049aa7556cee751a8083"}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r5 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) userfaultfd(0x0) sendmmsg$unix(r5, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:06 executing program 1 (fault-call:2 fault-nth:88): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x6ab019f9f2a5362a) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000040)={0x57200000000000}, 0x4) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:00:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 17:00:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000005000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000000)="652e0f01cb0f09650f9163000f51a70070660f35d70f753db885038ee00f01cbbaf80c66b8c88e838766efbafc0ced", 0x2f}], 0x1, 0x1, &(0x7f00000000c0)=[@flags={0x3, 0x200000}], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1535.502901] FAULT_INJECTION: forcing a failure. [ 1535.502901] name failslab, interval 1, probability 0, space 0, times 0 [ 1535.563181] CPU: 1 PID: 10361 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1535.570477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1535.579841] Call Trace: [ 1535.579870] dump_stack+0x172/0x1f0 [ 1535.579902] should_fail.cold+0xa/0x1b [ 1535.586107] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1535.586125] ? lock_downgrade+0x810/0x810 [ 1535.586145] ? ___might_sleep+0x163/0x280 [ 1535.586162] __should_failslab+0x121/0x190 [ 1535.607636] should_failslab+0x9/0x14 [ 1535.611449] kmem_cache_alloc_trace+0x2d1/0x760 [ 1535.616130] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1535.621244] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1535.626197] __list_lru_init+0x3d3/0x6e0 [ 1535.626220] sget_userns+0x84d/0xd30 [ 1535.626237] ? kill_litter_super+0x60/0x60 [ 1535.638235] ? ns_test_super+0x50/0x50 [ 1535.642128] ? ns_test_super+0x50/0x50 [ 1535.642144] ? kill_litter_super+0x60/0x60 [ 1535.642160] sget+0x10c/0x150 [ 1535.642179] mount_bdev+0xff/0x3c0 [ 1535.650279] ? xfs_test_remount_options+0x90/0x90 [ 1535.650298] xfs_fs_mount+0x35/0x40 [ 1535.650317] mount_fs+0x106/0x3ff [ 1535.650335] ? emergency_thaw_all+0x1a0/0x1a0 [ 1535.673342] ? __init_waitqueue_head+0x36/0x90 [ 1535.677943] vfs_kern_mount.part.0+0x6f/0x410 [ 1535.682457] do_mount+0x581/0x2d30 [ 1535.686009] ? copy_mount_options+0x41/0x440 [ 1535.690425] ? copy_mount_string+0x40/0x40 [ 1535.694662] ? kmem_cache_alloc_trace+0x354/0x760 [ 1535.699774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1535.705316] ? copy_mount_options+0x30e/0x440 [ 1535.709817] ksys_mount+0xdb/0x150 [ 1535.713366] __x64_sys_mount+0xbe/0x150 [ 1535.717349] do_syscall_64+0x103/0x610 [ 1535.721243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1535.726433] RIP: 0033:0x45a89a [ 1535.729628] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1535.748529] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1535.756240] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a 17:00:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) [ 1535.763513] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1535.770779] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1535.778073] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1535.785341] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 17:00:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) 17:00:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x6, 0x4800) mknodat(r2, &(0x7f0000000080)='./file0\x00', 0x0, 0x7fff) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000300)={'filter\x00', 0x7, 0x4, 0x480, 0x258, 0x0, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000000), {[{{@arp={@multicast1, @local, 0xffffff00, 0xff000000, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, {[0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x1, 0x7, 0x7, 0x0, 0x592d, 0x3, 'batadv0\x00', 'bridge_slave_0\x00', {}, {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @mac=@remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x2, 0xffffffff}}}, {{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x5, 0x9}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={[], 0x14}, @empty, @rand_addr=0xe9ae, @broadcast, 0x2, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) 17:00:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x16000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:00:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) 17:00:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r1) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000080)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:00:09 executing program 1 (fault-call:2 fault-nth:89): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) 17:00:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x2000) ioctl$TCSBRK(r2, 0x5409, 0x100) 17:00:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:00:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x40080) connect$caif(r4, &(0x7f00000003c0)=@util={0x25, "6a5bebc9175dba4a7dd111714af2e196"}, 0x18) ioctl$UI_SET_EVBIT(r4, 0x40045564, 0x3) ioctl$KVM_INTERRUPT(r3, 0x4004ae86, &(0x7f0000000000)=0x2) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f00000007c0)={0xfffffffffffffff8, 0x0, 0x6015, 0x7f, 0x8, 0x5, 0x2, 0x1}) ioctl$VIDIOC_S_HW_FREQ_SEEK(r4, 0x40305652, &(0x7f0000000400)={0x5, 0x1, 0x2, 0x7, 0x1ff, 0x7f, 0x10001}) readv(r4, &(0x7f0000000780)=[{&(0x7f0000000440)=""/99, 0x63}, {&(0x7f00000004c0)=""/204, 0xcc}, {&(0x7f00000005c0)=""/221, 0xdd}, {&(0x7f00000006c0)=""/137, 0x89}], 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x20400, 0x30) ioctl$KDGETMODE(r5, 0x4b3b, &(0x7f0000000240)) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$EBT_SO_GET_INFO(r5, 0x0, 0x80, &(0x7f0000000300)={'filter\x00'}, &(0x7f0000000280)=0x78) r6 = open(&(0x7f0000000080)='./file0\x00', 0x200, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x7) fstat(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(r6, 0x89e0, &(0x7f0000000140)={0x3, @null, r7}) 17:00:09 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:00:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) [ 1538.586296] FAULT_INJECTION: forcing a failure. [ 1538.586296] name failslab, interval 1, probability 0, space 0, times 0 [ 1538.655486] CPU: 0 PID: 10416 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1538.662806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1538.672166] Call Trace: [ 1538.674776] dump_stack+0x172/0x1f0 [ 1538.678438] should_fail.cold+0xa/0x1b [ 1538.682346] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1538.687468] ? lock_downgrade+0x810/0x810 [ 1538.691682] ? ___might_sleep+0x163/0x280 [ 1538.695853] __should_failslab+0x121/0x190 [ 1538.695874] should_failslab+0x9/0x14 [ 1538.695889] __kmalloc+0x2dc/0x740 [ 1538.695908] ? __list_lru_init+0xd5/0x6e0 [ 1538.711596] __list_lru_init+0xd5/0x6e0 [ 1538.715594] xfs_alloc_buftarg+0x120/0x2e0 [ 1538.719839] xfs_open_devices+0x250/0x560 [ 1538.724014] ? xfs_blkdev_put+0x30/0x30 [ 1538.728008] ? set_blocksize+0x2bf/0x340 [ 1538.732086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1538.737634] ? sb_set_blocksize+0xe4/0x110 [ 1538.741887] xfs_fs_fill_super+0x6f7/0x14f0 [ 1538.746219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1538.752781] mount_bdev+0x307/0x3c0 [ 1538.752797] ? xfs_test_remount_options+0x90/0x90 [ 1538.752814] xfs_fs_mount+0x35/0x40 [ 1538.752833] mount_fs+0x106/0x3ff [ 1538.752852] ? emergency_thaw_all+0x1a0/0x1a0 [ 1538.752874] ? __init_waitqueue_head+0x36/0x90 [ 1538.777576] vfs_kern_mount.part.0+0x6f/0x410 [ 1538.782090] do_mount+0x581/0x2d30 [ 1538.785646] ? copy_mount_options+0x41/0x440 [ 1538.790069] ? copy_mount_string+0x40/0x40 [ 1538.794312] ? kmem_cache_alloc_trace+0x354/0x760 [ 1538.794335] ? _copy_from_user+0xdd/0x150 [ 1538.794354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1538.794371] ? copy_mount_options+0x30e/0x440 [ 1538.794389] ksys_mount+0xdb/0x150 [ 1538.808898] __x64_sys_mount+0xbe/0x150 [ 1538.816915] do_syscall_64+0x103/0x610 [ 1538.816938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1538.816952] RIP: 0033:0x45a89a [ 1538.833193] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 17:00:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) keyctl$setperm(0x5, r1, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:00:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) [ 1538.852108] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1538.859821] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1538.867101] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1538.874377] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1538.881659] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1538.888977] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 17:00:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x0, 0x8000000000}], 0x1, 0x0) 17:00:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000080)={0x6, 0x0, [{}, {}, {}, {}, {}, {}]}) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:00:09 executing program 1 (fault-call:2 fault-nth:90): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) 17:00:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x1001, &(0x7f0000000200)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@rq={'rq', 0x3d, 0x10000000}}, {@sq={'sq', 0x3d, 0x81}}, {@common=@noextend='noextend'}], [{@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x7}}, {@dont_appraise='dont_appraise'}, {@measure='measure'}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@obj_role={'obj_role', 0x3d, '/dev/kvm\x00'}}]}}) close(r0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x20101, 0x80) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000400)={{0x5, 0x6, 0x847, 0x5, '\x00', 0xfffffffffffffff7}, 0x0, [0x800, 0x52, 0x9, 0xe4b, 0x1, 0x0, 0x5, 0x0, 0x200, 0x0, 0x6, 0x1, 0x88a, 0xa1d, 0xfffffffffffffff8, 0x7f, 0x401, 0x1, 0x2, 0x100, 0x100, 0x0, 0x2, 0x70, 0x8, 0xb1a, 0x0, 0x89, 0xffffffffffffff02, 0x5, 0x100, 0x1, 0x9, 0x0, 0x1, 0x33, 0x5, 0x1f, 0x101, 0x0, 0x9, 0x429, 0x754d5550, 0x9e2, 0x2, 0x1, 0x81, 0xfffffffffffffff7, 0x80000001, 0x0, 0x80, 0x0, 0x1431, 0x4, 0x40, 0x9, 0x100, 0x8, 0x4, 0x5, 0x0, 0x3, 0xf63, 0x101, 0xfff, 0x8, 0x800, 0x0, 0x1000, 0x2, 0x6, 0x100000000, 0x1ff, 0x10001, 0x7f, 0x7f, 0x1, 0xeb95, 0x2, 0x2, 0x3, 0xe2, 0x2, 0x7, 0xe63b, 0x401, 0x7, 0xd8, 0x10001, 0x100, 0x7, 0x4e32ab8f, 0x7, 0xff, 0x8, 0x9, 0x2, 0x10001, 0x800, 0xcb6, 0xffffffffac6f159a, 0x7, 0x6, 0x2, 0x1ff, 0x2, 0x8, 0x401, 0x8, 0x4, 0x6, 0x7, 0x7fffffff, 0x3, 0xfffffffffffffff9, 0x401, 0x1, 0xffff, 0x47af, 0x2, 0x1, 0x3, 0x9767, 0x3, 0x0, 0xd9, 0x4]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) fstatfs(r0, &(0x7f0000000300)=""/227) 17:00:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$adsp(0xfffffffffffffffd, 0x7, 0x6000) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000080)={0x100000000, {{0xa, 0x4e24, 0x3, @empty, 0x1}}}, 0x88) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000000)=0x5, &(0x7f0000000040)=0x2) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) sendmsg$unix(r2, &(0x7f0000000440)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000400)=[{&(0x7f00000002c0)="65ac19d94c8fad81f045b8f019d8368e00a5be3bd2f22aed40e1a3ede0e239eac54a9cfdb008bbe000db2203b29a5b34f4c4aa82a77605cd0289d0ffdae56b1543ade229e78ab26d5d845b45e3a23e79241b6953713e8239f30a3884eabbfb7da3d089c5d86fcbabcbf6d27dd3b4591168", 0x71}, {&(0x7f0000001340)="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", 0x1000}, {&(0x7f0000000340)="31d3381a339835ffd9d7ced5499a486915caf4be7ff84eb7db25b18b50c6ab70504232552f78f7c082dd65c60a3741bdec2dc33ac671e7f3c878464ca8349e9300689586aed62256b1cd2ee9afabf644d595bbb7de82f3dcb6ba02149b26547f84fe07edba0d1d965d34f2be3691d86d1563bf05ef538f0636e5f6b10269e3242c3f5dcfc7f1ee4047a2682a03e569feef3d213d7464ed7109040889f24111c9a4e57f439f04447eee3b", 0xaa}], 0x3, 0x0, 0x0, 0x4040005}, 0x40) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000140)={0x100000001, 0x0, 0x10000, 0x6}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000180)={0x400, r3, 0x10000, 0x7}) [ 1539.246002] FAULT_INJECTION: forcing a failure. [ 1539.246002] name failslab, interval 1, probability 0, space 0, times 0 [ 1539.283861] CPU: 0 PID: 10455 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1539.291174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1539.300542] Call Trace: [ 1539.303159] dump_stack+0x172/0x1f0 [ 1539.306797] should_fail.cold+0xa/0x1b [ 1539.310692] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1539.315812] ? lock_downgrade+0x810/0x810 [ 1539.319991] ? ___might_sleep+0x163/0x280 [ 1539.324144] __should_failslab+0x121/0x190 [ 1539.328384] should_failslab+0x9/0x14 [ 1539.332185] __kmalloc_track_caller+0x2d8/0x740 [ 1539.336855] ? mark_held_locks+0xb1/0x100 [ 1539.341009] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1539.346142] ? __debug_object_init+0x190/0xc30 [ 1539.350722] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1539.355822] ? xfs_parseargs+0xd9/0x12a0 [ 1539.359893] kstrndup+0x5f/0xf0 [ 1539.363178] xfs_parseargs+0xd9/0x12a0 [ 1539.367067] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1539.372174] ? suffix_kstrtoint.constprop.0+0x250/0x250 [ 1539.377544] ? __lock_is_held+0xb6/0x140 [ 1539.381622] ? lockdep_init_map+0x10c/0x5b0 [ 1539.385950] ? init_timer_key+0x122/0x370 [ 1539.390116] xfs_fs_fill_super+0x538/0x14f0 [ 1539.394450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1539.400011] mount_bdev+0x307/0x3c0 [ 1539.403638] ? xfs_test_remount_options+0x90/0x90 [ 1539.408482] xfs_fs_mount+0x35/0x40 [ 1539.412117] mount_fs+0x106/0x3ff [ 1539.415578] ? emergency_thaw_all+0x1a0/0x1a0 [ 1539.420077] ? __init_waitqueue_head+0x36/0x90 [ 1539.424672] vfs_kern_mount.part.0+0x6f/0x410 [ 1539.429173] do_mount+0x581/0x2d30 [ 1539.432717] ? copy_mount_options+0x41/0x440 [ 1539.437132] ? copy_mount_string+0x40/0x40 [ 1539.441367] ? kmem_cache_alloc_trace+0x354/0x760 [ 1539.446216] ? _copy_from_user+0xdd/0x150 [ 1539.450368] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1539.455907] ? copy_mount_options+0x30e/0x440 [ 1539.460417] ksys_mount+0xdb/0x150 [ 1539.463970] __x64_sys_mount+0xbe/0x150 [ 1539.467967] do_syscall_64+0x103/0x610 [ 1539.471868] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1539.477055] RIP: 0033:0x45a89a 17:00:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) [ 1539.480252] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1539.499165] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1539.506874] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1539.514140] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1539.521407] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1539.528674] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1539.535939] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 17:00:12 executing program 1 (fault-call:2 fault-nth:91): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioprio_set$uid(0x3, r3, 0x3c1) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000300)={[], 0x0, 0x3, 0xa, 0x0, 0x26f, 0x2000, 0x6000, [], 0x53}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400100, 0x0) ioctl$VIDIOC_REQBUFS(r4, 0xc0145608, &(0x7f0000000080)={0xfffffffffffffffe, 0x7, 0x1}) 17:00:12 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:00:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1810000000000000]}, 0x48) 17:00:12 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x480341, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:00:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000000)='net/arp\x00') sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0xb0f}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r4, 0x1, 0x4}, 0x8) 17:00:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0x48) [ 1541.664002] FAULT_INJECTION: forcing a failure. [ 1541.664002] name failslab, interval 1, probability 0, space 0, times 0 [ 1541.778881] CPU: 0 PID: 10480 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1541.786247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1541.795602] Call Trace: [ 1541.795634] dump_stack+0x172/0x1f0 [ 1541.795659] should_fail.cold+0xa/0x1b [ 1541.795681] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1541.795701] ? lock_downgrade+0x810/0x810 [ 1541.810866] ? ___might_sleep+0x163/0x280 [ 1541.819155] __should_failslab+0x121/0x190 [ 1541.823404] should_failslab+0x9/0x14 [ 1541.827222] kmem_cache_alloc_trace+0x2d1/0x760 [ 1541.831905] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1541.837026] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1541.841971] __list_lru_init+0x3d3/0x6e0 [ 1541.846075] sget_userns+0x84d/0xd30 [ 1541.849793] ? kill_litter_super+0x60/0x60 [ 1541.854036] ? ns_test_super+0x50/0x50 [ 1541.857945] ? ns_test_super+0x50/0x50 [ 1541.861872] ? kill_litter_super+0x60/0x60 [ 1541.866111] sget+0x10c/0x150 [ 1541.869227] mount_bdev+0xff/0x3c0 [ 1541.872770] ? xfs_test_remount_options+0x90/0x90 [ 1541.877615] xfs_fs_mount+0x35/0x40 [ 1541.881245] mount_fs+0x106/0x3ff [ 1541.884705] ? emergency_thaw_all+0x1a0/0x1a0 [ 1541.889209] ? __init_waitqueue_head+0x36/0x90 [ 1541.893805] vfs_kern_mount.part.0+0x6f/0x410 [ 1541.898405] do_mount+0x581/0x2d30 [ 1541.901955] ? copy_mount_string+0x40/0x40 [ 1541.906211] ? copy_mount_options+0x223/0x440 [ 1541.910709] ? copy_mount_options+0x223/0x440 [ 1541.915205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1541.920754] ? copy_mount_options+0x30e/0x440 [ 1541.925259] ksys_mount+0xdb/0x150 [ 1541.928801] __x64_sys_mount+0xbe/0x150 [ 1541.932782] do_syscall_64+0x103/0x610 [ 1541.936681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1541.941868] RIP: 0033:0x45a89a [ 1541.945062] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1541.963976] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1541.971690] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a 17:00:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) [ 1541.978958] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1541.986241] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1541.993510] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1542.000794] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 17:00:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x00', 0xfffffffffffffffa) request_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='skcipher\x00', 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x3}, r0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x1, 0x2) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x76) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000540)) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000000580)=""/4) sendmmsg$unix(r3, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) r5 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f00000008c0)=0xe8) getresuid(&(0x7f0000000900)=0x0, &(0x7f0000000940), &(0x7f0000000980)) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000200)='./file0\x00', 0x81, 0x1, &(0x7f0000000240)=[{&(0x7f00000004c0)="d05f7153a479c5ec41847b7a357436bbf5536d3c882f769d5ea31797c71270abd961e522ec1c5ac75a35d8588cd9e158f179ae0bd8bab39d644388f28b716f69d78f6bb313daa4b3428c59d8d4df0e332f8854bcd0952c67d0f7e97e1e3c26bac75745ea4a9c039f", 0x68, 0x6}], 0x100000, &(0x7f00000009c0)={[{@noheap='noheap'}, {@lazytime='lazytime'}, {@usrquota={'usrquota', 0x3d, 'TIPC\x00'}}, {@prjquota={'prjquota'}}, {@noextent_cache='noextent_cache'}, {@acl='acl'}, {@background_gc_off='background_gc=off'}, {@six_active_logs='active_logs=6'}, {@prjquota={'prjquota', 0x3d, '/dev/audio\x00'}}], [{@fsmagic={'fsmagic', 0x3d, 0x5}}, {@euid_lt={'euid<', r5}}, {@euid_lt={'euid<', r6}}, {@hash='hash'}, {@euid_eq={'euid', 0x3d, r7}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', r8}}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role', 0x3d, '/dev/audio\x00'}}, {@uid_gt={'uid>', r9}}]}) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200800, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r10, 0x408c5333, &(0x7f0000000080)={0x2, 0x1, 0xfff, 'queue1\x00', 0xffff}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r11 = accept(r2, &(0x7f0000000300)=@sco, &(0x7f0000000280)=0x80) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r11, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="200025bd7000ffdbdf250100000000002000024100000010001369623a697036746e6c300000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000814) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:00:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) 17:00:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) 17:00:13 executing program 1 (fault-call:2 fault-nth:92): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1542.340597] FAULT_INJECTION: forcing a failure. [ 1542.340597] name failslab, interval 1, probability 0, space 0, times 0 [ 1542.358291] CPU: 1 PID: 10522 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1542.365588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1542.374942] Call Trace: [ 1542.377563] dump_stack+0x172/0x1f0 [ 1542.381210] should_fail.cold+0xa/0x1b [ 1542.385107] ? fault_create_debugfs_attr+0x1e0/0x1e0 17:00:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000002c0)=[@text16={0x10, &(0x7f0000000080)="0f070f07ba6100b081ee806700000f21e1ff9700000f070ff67a0f66b9fd0300000f32f0f6990700", 0x28}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x3, 0x3, 0xf000, 0x2000, &(0x7f0000007000/0x2000)=nil}) [ 1542.390217] ? lock_downgrade+0x810/0x810 [ 1542.394376] ? ___might_sleep+0x163/0x280 [ 1542.398537] __should_failslab+0x121/0x190 [ 1542.402788] should_failslab+0x9/0x14 [ 1542.406600] __kmalloc_track_caller+0x2d8/0x740 [ 1542.411279] ? mark_held_locks+0xb1/0x100 [ 1542.415455] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1542.420566] ? __debug_object_init+0x190/0xc30 [ 1542.420581] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1542.420595] ? xfs_parseargs+0xd9/0x12a0 [ 1542.420617] kstrndup+0x5f/0xf0 [ 1542.420632] xfs_parseargs+0xd9/0x12a0 [ 1542.430309] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1542.430327] ? suffix_kstrtoint.constprop.0+0x250/0x250 [ 1542.430342] ? __lock_is_held+0xb6/0x140 [ 1542.430364] ? lockdep_init_map+0x10c/0x5b0 [ 1542.460375] ? init_timer_key+0x122/0x370 [ 1542.464542] xfs_fs_fill_super+0x538/0x14f0 [ 1542.468885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1542.474446] mount_bdev+0x307/0x3c0 [ 1542.478094] ? xfs_test_remount_options+0x90/0x90 [ 1542.482950] xfs_fs_mount+0x35/0x40 [ 1542.486602] mount_fs+0x106/0x3ff [ 1542.490071] ? emergency_thaw_all+0x1a0/0x1a0 [ 1542.494582] ? __init_waitqueue_head+0x36/0x90 [ 1542.499181] vfs_kern_mount.part.0+0x6f/0x410 [ 1542.503708] do_mount+0x581/0x2d30 [ 1542.507277] ? copy_mount_options+0x41/0x440 [ 1542.511702] ? copy_mount_string+0x40/0x40 [ 1542.511721] ? kmem_cache_alloc_trace+0x354/0x760 [ 1542.511743] ? _copy_from_user+0xdd/0x150 [ 1542.511762] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1542.520827] ? copy_mount_options+0x30e/0x440 [ 1542.520850] ksys_mount+0xdb/0x150 [ 1542.520869] __x64_sys_mount+0xbe/0x150 [ 1542.520889] do_syscall_64+0x103/0x610 [ 1542.530558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1542.538568] RIP: 0033:0x45a89a [ 1542.538585] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1542.538594] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1542.538610] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1542.538619] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1542.538628] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1542.538640] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1542.546478] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 17:00:15 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:00:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0xfffffffffffffffe) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f0000000040)={0x6, 0xff, 0x40}) 17:00:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x48) 17:00:15 executing program 1 (fault-call:2 fault-nth:93): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x1000000000, 0x0, 0xffffffffffffffc7) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:00:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x800, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x129, 0x3, 0x80000001}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x40004) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x12, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1544.734727] FAULT_INJECTION: forcing a failure. [ 1544.734727] name failslab, interval 1, probability 0, space 0, times 0 17:00:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}, 0x48) 17:00:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000000)=0xc7) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1544.829748] CPU: 1 PID: 10544 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1544.837075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1544.846441] Call Trace: [ 1544.849052] dump_stack+0x172/0x1f0 [ 1544.852695] should_fail.cold+0xa/0x1b [ 1544.856594] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1544.861707] ? lock_downgrade+0x810/0x810 [ 1544.865874] ? ___might_sleep+0x163/0x280 [ 1544.870041] __should_failslab+0x121/0x190 [ 1544.874293] should_failslab+0x9/0x14 17:00:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000015000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000000)={0xbf2, 0x1f000}) signalfd(r0, &(0x7f0000000080)={0x8}, 0x8) [ 1544.878103] kmem_cache_alloc_trace+0x2d1/0x760 [ 1544.882781] ? lock_downgrade+0x810/0x810 [ 1544.886951] __alloc_workqueue_key+0x79c/0xe00 [ 1544.891563] ? up_write+0x1c/0x150 [ 1544.895117] ? register_shrinker_prepared+0x116/0x190 [ 1544.900325] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1544.905345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1544.910890] ? xfs_alloc_buftarg+0x26d/0x2e0 [ 1544.915311] ? xfs_open_devices+0x14a/0x560 [ 1544.919640] ? xfs_blkdev_put+0x30/0x30 [ 1544.923625] xfs_init_mount_workqueues+0x6d/0x6d0 [ 1544.928472] ? sb_set_blocksize+0xe4/0x110 [ 1544.932728] xfs_fs_fill_super+0x719/0x14f0 [ 1544.932750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1544.932771] mount_bdev+0x307/0x3c0 [ 1544.932786] ? xfs_test_remount_options+0x90/0x90 [ 1544.951128] xfs_fs_mount+0x35/0x40 [ 1544.954771] mount_fs+0x106/0x3ff [ 1544.958236] ? emergency_thaw_all+0x1a0/0x1a0 [ 1544.962738] ? __init_waitqueue_head+0x36/0x90 [ 1544.967335] vfs_kern_mount.part.0+0x6f/0x410 [ 1544.971839] do_mount+0x581/0x2d30 [ 1544.975399] ? copy_mount_string+0x40/0x40 [ 1544.979655] ? copy_mount_options+0x244/0x440 [ 1544.984160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1544.989708] ? copy_mount_options+0x30e/0x440 [ 1544.994219] ksys_mount+0xdb/0x150 [ 1544.997774] __x64_sys_mount+0xbe/0x150 [ 1545.001758] do_syscall_64+0x103/0x610 [ 1545.001780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1545.001794] RIP: 0033:0x45a89a [ 1545.014106] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1545.033019] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1545.040741] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1545.048015] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1545.048025] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1545.048033] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1545.048041] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 17:00:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x48) 17:00:15 executing program 1 (fault-call:2 fault-nth:94): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000100)=0xc) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x401, 0xcfa, 0x0, 0x7ff, 0x0, 0x3, 0x10, 0x2, 0x6, 0xfb, 0x2, 0x3, 0x2, 0x80000001, 0xffffffff, 0x299, 0xeb5, 0x6, 0x5, 0xd4, 0x9, 0xfddc, 0xfffffffffffff51f, 0xffffffffffffc97e, 0x4, 0x2, 0xffffffff, 0x3, 0x5, 0x1, 0x4, 0x200, 0x5, 0x1, 0x50, 0x7fffffff, 0x0, 0x3ff, 0x5, @perf_config_ext={0x8af, 0x3}, 0x0, 0x40, 0x3, 0x1, 0x3, 0x7ff, 0x1}, r4, 0x5, r1, 0x0) [ 1545.359749] FAULT_INJECTION: forcing a failure. [ 1545.359749] name failslab, interval 1, probability 0, space 0, times 0 [ 1545.377758] CPU: 0 PID: 10578 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1545.385071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1545.394426] Call Trace: [ 1545.394456] dump_stack+0x172/0x1f0 [ 1545.394480] should_fail.cold+0xa/0x1b [ 1545.394501] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1545.394526] ? lock_downgrade+0x810/0x810 [ 1545.413839] ? ___might_sleep+0x163/0x280 [ 1545.418009] __should_failslab+0x121/0x190 [ 1545.422256] should_failslab+0x9/0x14 [ 1545.426076] kmem_cache_alloc_trace+0x2d1/0x760 [ 1545.430759] ? lock_downgrade+0x810/0x810 [ 1545.434927] __alloc_workqueue_key+0x79c/0xe00 [ 1545.434941] ? up_write+0x1c/0x150 [ 1545.434970] ? register_shrinker_prepared+0x116/0x190 [ 1545.434998] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1545.435015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1545.443128] ? xfs_alloc_buftarg+0x26d/0x2e0 [ 1545.443147] ? xfs_open_devices+0x14a/0x560 [ 1545.443164] ? xfs_blkdev_put+0x30/0x30 [ 1545.443183] xfs_init_mount_workqueues+0x6d/0x6d0 [ 1545.443200] ? sb_set_blocksize+0xe4/0x110 [ 1545.480675] xfs_fs_fill_super+0x719/0x14f0 [ 1545.485011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1545.490573] mount_bdev+0x307/0x3c0 [ 1545.494228] ? xfs_test_remount_options+0x90/0x90 [ 1545.499060] xfs_fs_mount+0x35/0x40 [ 1545.502693] mount_fs+0x106/0x3ff [ 1545.506142] ? emergency_thaw_all+0x1a0/0x1a0 [ 1545.510625] ? __init_waitqueue_head+0x36/0x90 [ 1545.515198] vfs_kern_mount.part.0+0x6f/0x410 [ 1545.519700] do_mount+0x581/0x2d30 [ 1545.523253] ? copy_mount_options+0x41/0x440 [ 1545.527661] ? copy_mount_string+0x40/0x40 [ 1545.531900] ? kmem_cache_alloc_trace+0x354/0x760 [ 1545.536748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1545.542305] ? copy_mount_options+0x30e/0x440 [ 1545.546816] ksys_mount+0xdb/0x150 [ 1545.550349] __x64_sys_mount+0xbe/0x150 [ 1545.554317] do_syscall_64+0x103/0x610 [ 1545.558205] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1545.563387] RIP: 0033:0x45a89a [ 1545.566589] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1545.585477] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1545.593178] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1545.600432] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1545.607684] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1545.614938] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1545.622204] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 17:00:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x408800, 0x0) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1, 0x2001) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000200)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x6, 0xa, 0x7}) 17:00:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}, 0x48) 17:00:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000000)="6ee8bce5499adcf7a686ecca9edfde9880487dc6b5df0d8c66d35bbe26ce9e26118075556a4b5d8e0169c13352ae717c3cd928a33bca2a3bc7e44f73bf2ebcfb61b0fde153a0b243ac9ce0a5adb5be3bc347b3fe0bf5ab94d6bda9d137efc1d742a402d8f5ba3861d9274fcf0424aa969dc907ca3708234a284e62c3f2fd8a786d756e2df8", 0x85}, {&(0x7f00000000c0)="9b986df4fc04f61b68df88d4231c185b43a52d429d6d2eb5113f393ac22218c72dcd57c895aa0206bd7e2afa12db7ab0bd8d842f7f3fe8f35e83f5f86ecda2aa0cfd3d8772f96553d12a393fcfcefce0df2076c171b9d0e5a0a2522e5b011daded56ceacad3ca57b3d", 0x69}, {&(0x7f0000000140)="5f9a2faa28c02c7f2c6c9d329f1416b21f4d0114b54b6ae77d692377a039b707f9f17dd6664906c709894d5dc52b1b7856c65fdda227e95b115bd6e8a94915bb0db8ea942db18d19934b1d21e6f8c5d8d907", 0x52}, {&(0x7f00000002c0)="140f8a57575b5e15ddd094d7e24849f255fd4b2057c4fdb58173a0ca8692da0a15a0d86b1a8254112e32859ab88d6431d1f7f535d3ebbd7c0f4e0fca62a5e9c672fd68ebc7862b874ba756e13fdb2038152e5ff216e8848079f3ba3e2a6f5a8359eb7bca34a9b9e716fe2207efbec777c2d81b361bb3e6bd7db09950c0e1b3841f95b80538607768eecf82170803e3e59f5220d4c3c02cd8eaacf5e13f2b6816eb0cdafe7e899ee487abfbc5cec714f6b8e09d740b6e4f17065daaf9cc22a0f8583846c35b97e7792df992bec09be3892305d28526fa9bcc89327002ba90a6a56aa63e80ca679893acd9020e0c2b5e32b7f0ed16", 0xf4}, {&(0x7f00000001c0)="8f6073693757def6e02f20b66147d4940736ab638b79b6f211ecbe098c2ddcca46d1c31a2eb4daeecfdf1f9c2bfff0444533472980d812f9ad66d3c7a6094193d486849dd0f7478ecdf30449a3a7502897a4b38adaf49e6ccd16e6bd96a8c2e7dc842cfaf7948388bd19bbdb14b051abcb3477ffb0", 0x75}, {&(0x7f00000003c0)="182d2a236a8c0beb5deaeef4dd405197eec791dc40e0b150b0c548e7a1740b0a02e6e287b590b0cdecd61cc865c7729f7b53934e24cbde280c60bfcf11f99b6f0d432da9482d", 0x46}, {&(0x7f0000000500)="1dc26d1ddd95f5e24d81754877122bce42006f85737de02e7c87b785ab4ef56b6f26675f606aa8e0c7ab77cceb79ccc605c9013eff9a6fc61b2c18f850b0073ae5db34042bba19b400639d29bbeee94155b2d303660106b70caf4c22ff7973a81de8cab18d8e6c3d7cd43b73b0a47d03fed9bd0bac8a4037d6a72825785cb57060ab9eefe0b5b42097c1e5227df1ebdcea419155ba8b75405a0d9895c1c937215d7d8d91a67c9380dca13d14f106d8c5ac1804dc3fdd76ddbb65db33d8ad072d3fd5428542c3ca5bb905963dede01c1a906f88ac6aa48369e6bdc7b02c9d", 0xde}], 0x7) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:18 executing program 1 (fault-call:2 fault-nth:95): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:18 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:00:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x40) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0x3) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1547.761098] FAULT_INJECTION: forcing a failure. [ 1547.761098] name failslab, interval 1, probability 0, space 0, times 0 [ 1547.812625] CPU: 1 PID: 10594 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1547.819944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1547.829310] Call Trace: [ 1547.831921] dump_stack+0x172/0x1f0 [ 1547.835562] should_fail.cold+0xa/0x1b [ 1547.839467] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1547.844581] ? lock_downgrade+0x810/0x810 [ 1547.844600] ? ___might_sleep+0x163/0x280 [ 1547.844618] __should_failslab+0x121/0x190 [ 1547.844635] should_failslab+0x9/0x14 [ 1547.860933] __kmalloc_track_caller+0x2d8/0x740 [ 1547.865618] ? mark_held_locks+0xb1/0x100 [ 1547.869793] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1547.874902] ? __debug_object_init+0x190/0xc30 [ 1547.879493] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1547.884599] ? xfs_parseargs+0xd9/0x12a0 [ 1547.888681] kstrndup+0x5f/0xf0 [ 1547.888697] xfs_parseargs+0xd9/0x12a0 [ 1547.888714] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1547.895912] ? suffix_kstrtoint.constprop.0+0x250/0x250 [ 1547.895928] ? __lock_is_held+0xb6/0x140 [ 1547.895950] ? lockdep_init_map+0x10c/0x5b0 [ 1547.895979] ? init_timer_key+0x122/0x370 [ 1547.895999] xfs_fs_fill_super+0x538/0x14f0 [ 1547.923298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1547.928850] mount_bdev+0x307/0x3c0 [ 1547.932479] ? xfs_test_remount_options+0x90/0x90 [ 1547.937333] xfs_fs_mount+0x35/0x40 [ 1547.940972] mount_fs+0x106/0x3ff [ 1547.944436] ? emergency_thaw_all+0x1a0/0x1a0 [ 1547.948937] ? __init_waitqueue_head+0x36/0x90 [ 1547.953539] vfs_kern_mount.part.0+0x6f/0x410 [ 1547.958042] do_mount+0x581/0x2d30 [ 1547.961586] ? copy_mount_options+0x41/0x440 [ 1547.966007] ? copy_mount_string+0x40/0x40 [ 1547.970251] ? kmem_cache_alloc_trace+0x354/0x760 [ 1547.975106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1547.980647] ? copy_mount_options+0x30e/0x440 [ 1547.985149] ksys_mount+0xdb/0x150 [ 1547.988693] __x64_sys_mount+0xbe/0x150 [ 1547.992674] do_syscall_64+0x103/0x610 [ 1547.996569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1548.001756] RIP: 0033:0x45a89a [ 1548.004987] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1548.023890] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1548.031613] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1548.038877] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1548.046148] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1548.053414] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 17:00:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x48) 17:00:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x1fe, 0x1, 0x105002, 0x2000, &(0x7f000000f000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x101000, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000300)={'security\x00', 0xe1, "13580b5a9297a9f81f35f16d875d353d50f00b952b3fa3d0d15a8022018f542a24252e77d83f36debfb5deb4de5668ceffa95ecb19937f4739f7f91061c16f4845ef7a71dff96389c9f5bef08a4d8ce354280b2ddd699c8df6b317dd8003ec5499b863d49c7b3c4bf6d6bff8c51e7c68486f0ccd35a83f04dff48c7fd45b0d97719268a1f3d9203b6467f94f5078091e96b9ce0ac65fce19e9f954d181b7eb35e818e163a205df5b129b2012dfa151240cf31b91ff137946300a99bd518d2dfff817ad9f3434199f3a248d8e9d07814a27cdb20abccb01b636de44e88634661a80"}, &(0x7f00000000c0)=0x105) [ 1548.060678] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 17:00:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) mknod$loop(&(0x7f0000000000)='./file0\x00', 0xc000, 0x1) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) lremovexattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="6f73782e7d016370757365742900"]) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffff9c, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000080)="640f0f41e3a7c4c2e502cd400f000348b878c90470000000000f23c80f21f835040090000f23f866b8d5008ed866baf80cb83447bb84ef66bafc0cb800600000ef66baf80cb8b45b5988ef66bafc0c66b8740066ef0f21a3260fc9f30f019a00000100", 0x63}], 0x1, 0x20, &(0x7f0000000100), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:00:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000]}, 0x48) 17:00:19 executing program 1 (fault-call:2 fault-nth:96): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa00000000000000]}, 0x48) 17:00:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) [ 1548.393475] FAULT_INJECTION: forcing a failure. [ 1548.393475] name failslab, interval 1, probability 0, space 0, times 0 [ 1548.463718] CPU: 1 PID: 10634 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1548.471041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1548.480398] Call Trace: [ 1548.483018] dump_stack+0x172/0x1f0 [ 1548.486665] should_fail.cold+0xa/0x1b [ 1548.490593] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1548.495705] ? lock_downgrade+0x810/0x810 [ 1548.499866] ? ___might_sleep+0x163/0x280 [ 1548.504028] __should_failslab+0x121/0x190 [ 1548.508280] ? cancel_delayed_work+0x2d0/0x2d0 17:00:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0xfffffffffffffffe, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000040)={0x1, 0x10001, [{0x100000000, 0x0, 0x8}]}) [ 1548.512873] should_failslab+0x9/0x14 [ 1548.516685] kmem_cache_alloc_trace+0x2d1/0x760 [ 1548.521367] ? lockdep_init_map+0x10c/0x5b0 [ 1548.525707] ? cancel_delayed_work+0x2d0/0x2d0 [ 1548.530298] __kthread_create_on_node+0xf2/0x460 [ 1548.535064] ? kthread_parkme+0xb0/0xb0 [ 1548.539056] ? __lock_is_held+0xb6/0x140 [ 1548.543137] ? check_preemption_disabled+0x48/0x290 [ 1548.548177] ? cancel_delayed_work+0x2d0/0x2d0 [ 1548.552780] kthread_create_on_node+0xbb/0xf0 [ 1548.557288] ? __kthread_create_on_node+0x460/0x460 17:00:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) [ 1548.562321] ? kmem_cache_alloc_node_trace+0x352/0x720 [ 1548.567612] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1548.572468] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1548.577597] init_rescuer.part.0+0x7d/0x190 [ 1548.581937] __alloc_workqueue_key+0xb0e/0xe00 [ 1548.586533] ? up_write+0x1c/0x150 [ 1548.590092] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1548.595117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1548.600663] ? xfs_open_devices+0x14a/0x560 [ 1548.604998] ? xfs_blkdev_put+0x30/0x30 [ 1548.605016] xfs_init_mount_workqueues+0x6d/0x6d0 [ 1548.605029] ? sb_set_blocksize+0xe4/0x110 [ 1548.605048] xfs_fs_fill_super+0x719/0x14f0 [ 1548.605066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1548.605085] mount_bdev+0x307/0x3c0 [ 1548.631565] ? xfs_test_remount_options+0x90/0x90 [ 1548.636426] xfs_fs_mount+0x35/0x40 [ 1548.640067] mount_fs+0x106/0x3ff [ 1548.643536] ? emergency_thaw_all+0x1a0/0x1a0 [ 1548.648046] ? __init_waitqueue_head+0x36/0x90 [ 1548.652645] vfs_kern_mount.part.0+0x6f/0x410 [ 1548.657152] do_mount+0x581/0x2d30 [ 1548.660696] ? copy_mount_options+0x41/0x440 [ 1548.665115] ? copy_mount_string+0x40/0x40 [ 1548.669350] ? kmem_cache_alloc_trace+0x354/0x760 [ 1548.674204] ? _copy_from_user+0xdd/0x150 [ 1548.678360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1548.683902] ? copy_mount_options+0x30e/0x440 [ 1548.688402] ksys_mount+0xdb/0x150 [ 1548.691984] __x64_sys_mount+0xbe/0x150 [ 1548.696317] do_syscall_64+0x103/0x610 [ 1548.700212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1548.705398] RIP: 0033:0x45a89a [ 1548.708596] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1548.727499] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1548.735205] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1548.742474] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1548.749748] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1548.757016] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1548.764281] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 17:00:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 17:00:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f00000000c0)={0x6, 0x5, 0x1}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x8001) ioctl$PIO_FONTX(r3, 0x4b6c, &(0x7f0000000040)="e7803b8c1852b772fbaa416a67b05bd3f62b9781ef958ee5e0a003cc40b0d2959ed8a9980b05f09effab9f2607fa5eef5373") setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text32={0x20, &(0x7f0000000000)="66b877000f00d066b899008ed80f01ca66b81c018ec0660f3882220f01cf2e36f30f219ab9b90300000f320f01cb650f08", 0x31}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:00:21 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:00:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7fffffff, 0x20000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x2, [0x0, 0x0]}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={r2, 0x5}, &(0x7f0000000140)=0x8) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000300)={0x7fff, 0x6}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000200)={0x0, 0x40, 0x20}) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x1) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000280)={0x7fffffff, 0x0, 0x8, 0x4, 0x3}) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 17:00:21 executing program 1 (fault-call:2 fault-nth:97): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1550.864871] FAULT_INJECTION: forcing a failure. [ 1550.864871] name failslab, interval 1, probability 0, space 0, times 0 17:00:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) [ 1550.980095] CPU: 1 PID: 10661 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1550.987407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1550.996762] Call Trace: [ 1550.999362] dump_stack+0x172/0x1f0 [ 1551.003006] should_fail.cold+0xa/0x1b [ 1551.006906] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1551.012013] ? lock_downgrade+0x810/0x810 [ 1551.016167] ? ___might_sleep+0x163/0x280 [ 1551.020320] __should_failslab+0x121/0x190 [ 1551.024563] ? cancel_delayed_work+0x2d0/0x2d0 [ 1551.029149] should_failslab+0x9/0x14 [ 1551.032951] kmem_cache_alloc_trace+0x2d1/0x760 [ 1551.037627] ? lockdep_init_map+0x10c/0x5b0 [ 1551.041954] ? cancel_delayed_work+0x2d0/0x2d0 [ 1551.046563] __kthread_create_on_node+0xf2/0x460 [ 1551.051327] ? kthread_parkme+0xb0/0xb0 [ 1551.055315] ? __lock_is_held+0xb6/0x140 [ 1551.059375] ? check_preemption_disabled+0x48/0x290 [ 1551.064393] ? cancel_delayed_work+0x2d0/0x2d0 [ 1551.068988] kthread_create_on_node+0xbb/0xf0 [ 1551.073491] ? __kthread_create_on_node+0x460/0x460 [ 1551.078513] ? kmem_cache_alloc_node_trace+0x352/0x720 [ 1551.083797] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1551.088640] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1551.093753] init_rescuer.part.0+0x7d/0x190 [ 1551.098079] __alloc_workqueue_key+0xb0e/0xe00 [ 1551.102660] ? up_write+0x1c/0x150 [ 1551.106209] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1551.111229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1551.116774] ? xfs_open_devices+0x14a/0x560 [ 1551.121118] ? xfs_blkdev_put+0x30/0x30 [ 1551.125098] xfs_init_mount_workqueues+0x6d/0x6d0 [ 1551.129939] ? sb_set_blocksize+0xe4/0x110 [ 1551.134184] xfs_fs_fill_super+0x719/0x14f0 [ 1551.138510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1551.144086] mount_bdev+0x307/0x3c0 [ 1551.147738] ? xfs_test_remount_options+0x90/0x90 [ 1551.152581] xfs_fs_mount+0x35/0x40 [ 1551.156215] mount_fs+0x106/0x3ff [ 1551.159919] ? emergency_thaw_all+0x1a0/0x1a0 [ 1551.164418] ? __init_waitqueue_head+0x36/0x90 [ 1551.169010] vfs_kern_mount.part.0+0x6f/0x410 [ 1551.173523] do_mount+0x581/0x2d30 [ 1551.177067] ? copy_mount_options+0x41/0x440 [ 1551.181482] ? copy_mount_string+0x40/0x40 [ 1551.185992] ? kmem_cache_alloc_trace+0x354/0x760 [ 1551.190856] ? _copy_from_user+0xdd/0x150 [ 1551.195037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1551.200591] ? copy_mount_options+0x30e/0x440 [ 1551.205094] ksys_mount+0xdb/0x150 [ 1551.208639] __x64_sys_mount+0xbe/0x150 [ 1551.212622] do_syscall_64+0x103/0x610 [ 1551.216522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1551.221708] RIP: 0033:0x45a89a [ 1551.224911] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1551.243813] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1551.251536] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1551.258815] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1551.266084] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1551.273353] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 17:00:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) 17:00:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1551.280620] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 17:00:22 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:00:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) getsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:00:22 executing program 1 (fault-call:2 fault-nth:98): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:22 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x440, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x5) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x6) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x103000, 0x0) r5 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x3, 0x88302) getsockname$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, &(0x7f0000000240)=0x10) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000000c0)="0f090f06b9550a00000f3266ba410066b8003066ef66baf80cb89e68eb87ef66bafc0c66b82c0066ef66bad10466b8000066ef0f090f00172e670f20e0b8a70000000f23d00f21f835300000050f23f8", 0x50}], 0x1, 0x14, &(0x7f0000000180), 0x0) ioctl$NBD_SET_SOCK(r4, 0xab00, r5) 17:00:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) 17:00:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x3ced9b537896e1db) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1551.589282] FAULT_INJECTION: forcing a failure. [ 1551.589282] name failslab, interval 1, probability 0, space 0, times 0 [ 1551.650235] CPU: 1 PID: 10697 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1551.657548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1551.666902] Call Trace: [ 1551.669512] dump_stack+0x172/0x1f0 [ 1551.673161] should_fail.cold+0xa/0x1b [ 1551.677068] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1551.682185] ? lock_downgrade+0x810/0x810 [ 1551.686342] ? ___might_sleep+0x163/0x280 [ 1551.690512] __should_failslab+0x121/0x190 [ 1551.694758] should_failslab+0x9/0x14 17:00:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 17:00:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000000)={0x1, 0x0, 0x303f, 0x100, 0x7, 0x8000, 0x4ed5475e, 0x1}) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 1551.698566] kmem_cache_alloc_trace+0x2d1/0x760 [ 1551.703244] ? pwq_adjust_max_active+0x3b6/0x5c0 [ 1551.708021] __alloc_workqueue_key+0x79c/0xe00 [ 1551.712609] ? up_write+0x1c/0x150 [ 1551.716164] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1551.721189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1551.726731] ? xfs_open_devices+0x14a/0x560 [ 1551.726750] ? xfs_blkdev_put+0x30/0x30 [ 1551.726766] xfs_init_mount_workqueues+0xe7/0x6d0 [ 1551.739885] ? sb_set_blocksize+0xe4/0x110 [ 1551.744135] xfs_fs_fill_super+0x719/0x14f0 [ 1551.748467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1551.754030] mount_bdev+0x307/0x3c0 [ 1551.757684] ? xfs_test_remount_options+0x90/0x90 [ 1551.762545] xfs_fs_mount+0x35/0x40 [ 1551.766187] mount_fs+0x106/0x3ff [ 1551.769671] ? emergency_thaw_all+0x1a0/0x1a0 [ 1551.774177] ? __init_waitqueue_head+0x36/0x90 [ 1551.778782] vfs_kern_mount.part.0+0x6f/0x410 [ 1551.783287] do_mount+0x581/0x2d30 [ 1551.786839] ? copy_mount_string+0x40/0x40 [ 1551.791103] ? copy_mount_options+0x255/0x440 [ 1551.795610] ? copy_mount_options+0x1d9/0x440 17:00:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) [ 1551.800111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1551.805651] ? copy_mount_options+0x30e/0x440 [ 1551.810174] ksys_mount+0xdb/0x150 [ 1551.813725] __x64_sys_mount+0xbe/0x150 [ 1551.817714] do_syscall_64+0x103/0x610 [ 1551.821615] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1551.826805] RIP: 0033:0x45a89a [ 1551.830022] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1551.848927] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1551.856665] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1551.863936] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1551.871222] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1551.878501] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1551.885779] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 17:00:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 17:00:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x1d6) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) fallocate(r0, 0x46, 0x4, 0x100000000) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:00:22 executing program 1 (fault-call:2 fault-nth:99): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1551.991848] Unknown ioctl 1075883590 [ 1552.007998] Unknown ioctl 1075883590 [ 1552.017325] Unknown ioctl 1075883590 [ 1552.024594] Unknown ioctl 1075883590 [ 1552.046399] Unknown ioctl 1075883590 [ 1552.047448] Unknown ioctl 43776 [ 1552.059266] Unknown ioctl 1075883590 [ 1552.069095] Unknown ioctl 1075883590 [ 1552.077506] Unknown ioctl 1075883590 [ 1552.081676] Unknown ioctl 1075883590 [ 1552.100306] Unknown ioctl 1075883590 [ 1552.108922] Unknown ioctl 1075883590 [ 1552.115656] FAULT_INJECTION: forcing a failure. [ 1552.115656] name failslab, interval 1, probability 0, space 0, times 0 [ 1552.148508] Unknown ioctl 1075883590 [ 1552.152419] Unknown ioctl 1075883590 [ 1552.156526] CPU: 0 PID: 10729 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #80 [ 1552.164331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1552.168623] Unknown ioctl 1075883590 [ 1552.173680] Call Trace: [ 1552.173732] dump_stack+0x172/0x1f0 [ 1552.173756] should_fail.cold+0xa/0x1b [ 1552.173779] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1552.173798] ? lock_downgrade+0x810/0x810 [ 1552.173848] ? ___might_sleep+0x163/0x280 [ 1552.173869] __should_failslab+0x121/0x190 [ 1552.173915] should_failslab+0x9/0x14 [ 1552.180905] Unknown ioctl 1075883590 [ 1552.183833] kmem_cache_alloc_node_trace+0x270/0x720 [ 1552.183866] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1552.183882] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1552.183905] alloc_worker+0x47/0x1c0 [ 1552.183921] init_rescuer.part.0+0x1f/0x190 [ 1552.183941] __alloc_workqueue_key+0xb0e/0xe00 [ 1552.183956] ? up_write+0x1c/0x150 [ 1552.190959] Unknown ioctl 1075883590 [ 1552.193008] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1552.193024] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1552.193042] ? xfs_open_devices+0x14a/0x560 [ 1552.200303] Unknown ioctl 1075883590 [ 1552.201350] ? xfs_blkdev_put+0x30/0x30 [ 1552.201370] xfs_init_mount_workqueues+0xe7/0x6d0 [ 1552.201384] ? sb_set_blocksize+0xe4/0x110 [ 1552.201403] xfs_fs_fill_super+0x719/0x14f0 [ 1552.208796] Unknown ioctl 1075883590 [ 1552.209430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1552.216511] Unknown ioctl 1075883590 [ 1552.218222] mount_bdev+0x307/0x3c0 [ 1552.218237] ? xfs_test_remount_options+0x90/0x90 [ 1552.218256] xfs_fs_mount+0x35/0x40 [ 1552.218274] mount_fs+0x106/0x3ff [ 1552.218292] ? emergency_thaw_all+0x1a0/0x1a0 [ 1552.226504] Unknown ioctl 1075883590 [ 1552.228221] ? __init_waitqueue_head+0x36/0x90 [ 1552.228247] vfs_kern_mount.part.0+0x6f/0x410 [ 1552.228268] do_mount+0x581/0x2d30 [ 1552.228285] ? copy_mount_options+0x41/0x440 [ 1552.232157] Unknown ioctl 1075883590 [ 1552.236369] ? copy_mount_string+0x40/0x40 [ 1552.236385] ? kmem_cache_alloc_trace+0x354/0x760 [ 1552.236405] ? _copy_from_user+0xdd/0x150 [ 1552.236424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1552.236440] ? copy_mount_options+0x30e/0x440 [ 1552.236460] ksys_mount+0xdb/0x150 [ 1552.236480] __x64_sys_mount+0xbe/0x150 [ 1552.236501] do_syscall_64+0x103/0x610 [ 1552.236519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1552.250145] Unknown ioctl 1075883590 [ 1552.253328] RIP: 0033:0x45a89a [ 1552.253344] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1552.253353] RSP: 002b:00007fe22d94ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1552.253383] RAX: ffffffffffffffda RBX: 00007fe22d94bb30 RCX: 000000000045a89a [ 1552.253392] RDX: 00007fe22d94bad0 RSI: 00000000200001c0 RDI: 00007fe22d94baf0 [ 1552.253401] RBP: 00000000200001c0 R08: 00007fe22d94bb30 R09: 00007fe22d94bad0 [ 1552.253410] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1552.253418] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000004 [ 1552.410537] Unknown ioctl 1075883590 [ 1552.430986] Unknown ioctl 1075883590 [ 1552.484910] Unknown ioctl 1075883590 [ 1552.520650] Unknown ioctl 1075883590 [ 1552.544078] Unknown ioctl 1075883590 [ 1552.547812] Unknown ioctl 1075883590 [ 1552.551556] Unknown ioctl 1075883590 [ 1552.578460] Unknown ioctl 43776 17:00:25 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:00:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) 17:00:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x101400) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'cpu'}, {0x2f, 'memory'}, {0x2d, 'io'}, {0x2d, 'rdma'}]}, 0x25) 17:00:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair(0x0, 0x6, 0x8, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000140)=0x7fffffff, 0x4) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100, 0x4000) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r3, 0xc040564a, &(0x7f0000000080)={0x7, 0x0, 0x3010, 0x6aee, 0x2, 0x806d, 0x7}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x3, 0x2, 0x0, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 17:00:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000140)) inotify_init1(0x800) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) signalfd4(r5, 0x0, 0x0, 0x800) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001400)='/dev/nullb0\x00', 0x8004, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) preadv(r6, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x8d5af}], 0x10000000000000db, 0x0) ioctl$EVIOCGKEYCODE_V2(r4, 0x80284504, &(0x7f0000000340)=""/155) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x800, 0x0) gettid() fcntl$notify(0xffffffffffffffff, 0x402, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) rt_sigsuspend(0x0, 0x0) tkill(0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) gettid() ioctl$KVM_RUN(r2, 0xae80, 0x0) r7 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r7, 0xc0305602, &(0x7f0000000080)={0x0, 0x101, 0x3012, 0x1}) 17:00:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x48) [ 1554.578901] XFS (loop1): Invalid superblock magic number 17:00:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x48) 17:00:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x81, 0x10882) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000040)=0x8b) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='%fs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000000)={0x9, 0x1b, 0x80000000, 0x5, 0xd55}) 17:00:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x48) 17:00:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x48) 17:00:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='x%s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000240)=0x5000) r4 = creat(&(0x7f0000000080)='./file0\x00', 0xdc8c106b11c09f1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x81, 0x20, 0x6, 0x45}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r5, 0x5}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x204802, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) 17:00:28 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:00:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xffffffffffff47b6, 0x1) ioctl$SCSI_IOCTL_SYNC(r3, 0x4) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U+', 0x7}, 0x28, 0x3) 17:00:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCX25GSUBSCRIP(r2, 0x89e0, &(0x7f0000000080)={'teql0\x00', 0x1ff, 0x5}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:00:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x48) 17:00:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) name_to_handle_at(r1, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)={0x4d, 0x401, "1e06f8ac7496bf41ad948d54047a724a463e83c6baf6a85d2ef18471797a1943c267ed42018e8e68392330b6de81332615078886a85846a04ba9d1d5aac37de6e59957cbc8"}, &(0x7f00000003c0), 0x1000) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[]}, 0x1, 0x0, 0x0, 0x11}, 0x24000895) r3 = accept4(r0, 0x0, 0x0, 0x0) eventfd2(0x2, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r3, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) setxattr$security_ima(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="044399241706feb7a0bd7374b8b76d8d"], 0xe, 0x2) 17:00:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x48) 17:00:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='x.s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x48) 17:00:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x3, 0x3, 0x0, 0x1000, &(0x7f000000a000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000000c0)={[{0x0, 0xe6e, 0xb7, 0x8, 0x80, 0x7, 0x9, 0x9, 0xbb, 0x6, 0x1c, 0x2, 0x98}, {0x6, 0xfffffffffffffffb, 0x4, 0x9, 0x4, 0x6, 0xb761, 0xffffffffffffffff, 0x7, 0x65f, 0x6, 0x2987, 0x101}, {0xfffffffffffffffb, 0x3, 0x8, 0x4, 0x4, 0x5, 0x1ff, 0x0, 0x8, 0x59e5, 0x77, 0x200, 0x6d0}], 0xffffffffffff8001}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:00:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:00:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa]}, 0x48) 17:00:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) 17:00:31 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:00:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='x/s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) 17:00:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ip6gretap0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x3b, 0x6, [{0x3, 0x1}, {0x2840, 0x1}, {0x0, 0xffff}, {0x2, 0x3}, {0x7, 0x7}, {0x4, 0x5}]}}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="985bf5ad", 0x4) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:00:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000001c0)={0x0, 0x7, 0x200, 0x759c, 0x1, 0x5, 0x9d3e, 0x9, 0x0}, &(0x7f0000000300)=0x20) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r3, 0x9}, &(0x7f0000000380)=0x8) r4 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x5, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40880, 0x0) bind$bt_sco(r5, &(0x7f0000000080)={0x1f, {0x3, 0x4, 0x80, 0x5, 0x6}}, 0x8) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) accept4$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14, 0x80000) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text16={0x10, &(0x7f0000000240)="66b84b57ffff0f23d80f21f86635400000400f23f80fc71f6766c74424001dd397966766c74424020864cc2e6766c744240600000000670f01142465670f01cb0f320f080f005100827c92002ef20f1b060300baa10066b80040000066ef"}], 0x1, 0xffffffffffffffff, 0x0, 0xfffffffffffffdc8) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) 17:00:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) 17:00:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xf\n\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) r2 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, r3, r4) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) 17:00:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0xffffffff7fffffff, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x7d9c, @rand_addr="f961322cb4dca2428726c552b02123b7", 0x321e}}, 0x811, 0xd90a, 0x919b, 0x100, 0x30ac}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000200)={r5, 0x6, 0x9}, 0x8) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:00:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x19328) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40000, 0x100) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x1ff}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000300)={r4, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, [0x8000, 0x80000001, 0x1, 0x19, 0x0, 0x6, 0x65075f36, 0x5, 0xff, 0x4, 0xfffffffffffffff9, 0x3ff, 0x5, 0x6, 0x72]}, &(0x7f0000000180)=0x100) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000080)={[0x5000, 0xd000, 0x2000], 0x0, 0xe9}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:00:34 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:00:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) 17:00:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xf#\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1, 0x0) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f00000000c0)=0x9e) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000000)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="42f549135b936df8140a7a9399df59c9e0841b5c01000000000000ff43aaaf0416b6578d7fd577f3b9023cf7452e683bcf7a60bf783aa69dbb9f65fe79551f8621a868a1861c3c5eb22c4feab3d015493d04f113f06346105f3e0c35c45fb64b2be06d1af64668a525a5654c28bc43f4b98fc684aeb3dbbded2c506f15ba81a0fd9461b46f8e17ac5681f1b6f3a49734b8695d9e43019407f17b74aabd7b5cb71078cea6a60578788b9a21e4f36b4c04596195f79bd1902b2f0dd4bde8d951dbcc8a6271622a874a973e9adebd6c0f40f4f6939a42f5ea2b74427beceba18ab5a65396276a72c6b19a4078e0df8e338f7fc06e267b66304fa69f78d4b5db1d450efe8b1408f4956328f83034044925214f5df4da5439cb1f51e7f4c069bea8817f92e14d017ac93406f4c296b457d752ad37aff0272f7583fffdd521bf5d93c724e98b6bbc2c9afdb48b8b1699f8fa86f6eb5ee079fdcd11c09aa648d077774e56bbbb3a3a77df40de87f223e3802b8e6bff1f13b370d1bf44cf", 0x17a) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000100), 0x4) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000040)) 17:00:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 17:00:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:00:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1018]}, 0x48) 17:00:34 executing program 2: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x1, 0x800) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x18100}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="fc000000", @ANYRES16=r1, @ANYBLOB="000228bd7000fbdbdf250940000020000200140001007f00000100000000000000000800746f5f7465616d000000080004000300000014000200677265300000000000000000000000000800030000000000080001000000000014000200626f6e645f736c6176655f310000000008000500e0000001140002006e7230000000000000000000000000001f00010008000800550d00000c0007000400000000000000080001f201000000000000080006006f766600080006006f766600140000080001000a000000000000000000000000000000000000002b9447d22f80c00802803f8660e000000000000000000000000000000000"], 0xfc}}, 0x800) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x1ff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/hci\x00') ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000080)={r3}) r5 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x1) sendmmsg$unix(r5, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:34 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:00:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000300)={0x0, 0x1000, "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"}, &(0x7f0000000140)=0x1008) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000180)={r2, 0x8001}, &(0x7f0000000200)=0x8) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 17:00:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1810]}, 0x48) 17:00:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xf%\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x608000, 0x0) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000040)={0x85f9, 0xffffffffffff7d96}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)={0x78, 0x0, 0x1, [{0x5, 0x3, 0x9, 0x4, 'skcipher\x00'}, {0x5, 0x1, 0x0, 0x1}, {0x2, 0x2, 0x9, 0x8, '/dev/vcs\x00'}]}, 0x78) 17:00:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x400, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/166, 0xa6}, {&(0x7f0000000700)=""/152, 0x98}, {&(0x7f00000007c0)=""/244, 0xf4}, {&(0x7f00000008c0)=""/203, 0xcb}], 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, &(0x7f0000000300)={"32a8e69b9e60e483c9507f45397e26ff70cd74f6cce06847a6e8313998e46b677b450b847f21512e4e4f18e8e092b94288764074346870d49f69827c8415defb0ef2ccdd41243b309e8b5d804c659a9afcdb80fa86df33e787d0d873da07533462ef9bc61689f31167b85e50b1b1d9f95055187dbda35861cc1855b93193850ce064ae0edc3e4702aca663a8c84ac9482841460f6584fae43e45af3d84ca99d5837a568af2bb5435196e1c42428b422eb310a03e123ab137f3cb019b2fa62c42ab5979525950c0381689c1fbc96623bc081c41cce7d7b46fd67fc968620cc78cab83e6d6b9369373faa3c88aeff0c5abeac098e03c78d5832ce1dd1acf7f3f53a210e1c8c4bf0d8c3611b9b14f2b576e2c0f51f38cf14997cf7edc214d4737c37171b3c55ddb89b70385c6b20da66b37d510abac0426dffc3c12da6aca6baa0609c83408ef63856f19eb778f6937cf3d765f1201557f4032fd4d9cf7c09d197cd17a8536c5a224fd7bf105a862fa14c03b15436130287912983a7460f91b0d66a679578a42fa1025653ff3d13b94f132cd4b109b73c19a4063ded317856a8c516fee93f730883bf2e7e59b1f42ca16fcf0516c51231e68e33715da6cf0ef9e05776ce5a3845b771b63e568dc16503617fa771682911e6ee505db5f55ff0fc04b0aeaea57083756035a15f8cb292e34daa16087a543bf2d46f65325443a00e1224f9ecadd5b0055bd5a124ea360eae23f5d051e79a83731b5eb5828f860c455d5b29ed29cd045e5c49c342b6e6f371ab94c25b6ef2039e8377bbbe24d3b37f5debe5f5c7592ec3b7619be13d4059a2a2cd94d6205163274ea8422448eb9953001e65dfab0613a0209827c92d675e79d8a4a457051172eeacbe6ac2b9d8ccd6290054699c3838257c761b12355f2b25e95dde7ee8cf3b2ceaf8fe8bc77e61a9000249a2951c0aff238ccc15f1f7d1f05892cf0e919d66470c3c3c059762795ff78eb8c1783da172fd09b95668c1dc9e8ee5a8fe9a346dcbd4433b99e9a6f9b5c167ba986f2c0d9201a8c6983289fc958e98c51f950dc021c944909527c95c303b854f8ea7a6198f447b5129568cf7c2e9532efdcdc180d3749885cae7d498c2d8d98d65777c96870473eac54f25f84805ef1f46aba7384b4bb43669c8d7b36c3c63c33fc6f25b4ade2da4446d13e00e3df9f574099ee686f6857f7d8e35345edcc3cba1626c524beaafc3dd393b910045d10375187a2abd1d1885e9edf1dadab0efcfe0bcd2ca1e5ee51ad5f3843f80537a0b1f29eea637e93da3c1bedc09db8675e11f0ddf07822e89b067825afb657075f379b7ed000e1f08568b920bc979cd603b227aebcfb61ecb5c868bb713b563a8e2fed48ab5429c80a0ff55fa72a308f68b21a2c9d57022384278bd92f61ce2a628c44f9b45a1a84f95f8109932c1ac8"}) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) fsetxattr$trusted_overlay_upper(r5, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x7a, 0x4, 0x5, "cf8a48dc4c73f1ca880fd03b31c6bbb0", "26c3d83f2e53fba336008881d21f23327e6a359b994425ca7ba59a38ce35844ad15b33be5ef7d9a903243634580fe6b6fce3d321cc876f6e06b3cd0d173866f733b2ed2c0614d861aa33fa9b7039d6c496fd26858a25d99852ee102188eac992b5c117060f"}, 0x7a, 0x2) 17:00:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 17:00:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xf*\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) write(r0, &(0x7f0000000300)="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", 0x1000) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) write$smack_current(r3, &(0x7f0000000140)='$\x00', 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VT_RELDISP(r0, 0x5605) ioctl$SIOCGSTAMP(r3, 0x8906, &(0x7f0000000180)) 17:00:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) uname(&(0x7f0000001340)=""/4096) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = signalfd(r1, &(0x7f0000000000)={0x5}, 0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) sendmsg$xdp(r1, &(0x7f0000000480)={&(0x7f00000001c0)={0x2c, 0x4, r3, 0x2b}, 0x10, &(0x7f0000000200)=[{&(0x7f00000002c0)="4f2055b9d8f3eb639707fbb55120d98331ea62b7aa7c9a8b4ba8fa42013f04d8fb22ea74401b1d1c2f33aa82fce8a3d6af9694180832749d36a8163988abd3d54de45c941288ef44ae5321ed639898e23e863b493c32dd5e9da537ce9b55c66b4e5dd3a3b8bcac765b803e4a5c608829f6f695f0a61190879d88909ed1c165d1806b96007c8e93cda91333ea9c58cf38005b42c06f815669f03a11fabe8bf38e8f3e77b377e1d768eee7b9537bc56232", 0xb0}, {&(0x7f0000000380)="9a2eb601b3774baded86cb9cb4119154ee6b68ffa5b73f08f4565e8d17386545e2861f3069237dbdff8460f55771d9f6a477419cabcef1485dfd2e01481130b693327a089112c441398d1e748d3c07dba118c8db21aa6ebc285267b58e423a978e6c20bca2decc7cddcbec001e099d6364bef7b36d2bf2d8ea11842b9991a894e0a0234989397dd285007194a695d153acf64e65995c99baa50a9e55ab5a90450129ba64bc05ecc501e75fd65f6174052a78c85d72a66fd5b88fa35746aad5beb467a9018855c04787616ce93c6d21f5af04a23417579d15c3eb38e3a2688e1c5d1a", 0xe2}], 0x2, 0x0, 0x0, 0x24000894}, 0x0) 17:00:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 17:00:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x48) 17:00:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x48) 17:00:37 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:00:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0/file0\x00', 0x110) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000040)={[0x10f000, 0x1005, 0xd004, 0x100004], 0x994, 0x1, 0x8}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xdebf, 0x800) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r4, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffffc}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8045}, 0x40044) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:00:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xf+\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$llc(r3, &(0x7f0000000300)=""/220, 0xdc, 0x40002002, &(0x7f0000000200)={0x1a, 0x0, 0x9, 0x8, 0x4, 0x1ff, @remote}, 0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) write(r4, &(0x7f00000000c0)="7f21452425c89a16c0c31b9b4e415cdc35ebbbda3df6d45c55cc8ca8602a961fd18aa119c3b651dbdfa7c7a11c5a095bdc422d28750e5ed11922b8c78abf68655d103d39d7239bb0b5cb6957fd00b555225b474da9d18dae262923e3c5fbc31d2129d2fd26ce3f1856571795b8d96dd8aa679d47a68143b2d4a3414943dbfea32a302113e0b4f7b3a5f105399b5318761bd69615edf98d31902ad2636675b6064dcbe8dd2bcd0f5fe3de74", 0xab) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7fff, 0x10000) ioctl$UI_SET_EVBIT(r6, 0x40045564, 0x10) ioctl$KVM_RUN(r5, 0xae80, 0x0) 17:00:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x48) 17:00:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xf-\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:00:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x48) 17:00:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}, 0x48) 17:00:38 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x101000, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCCONS(r3, 0x541d) setxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)=@known='trusted.overlay.origin\x00', &(0x7f0000000080)='skcipher\x00', 0x9, 0x3) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = getpgid(0x0) r5 = getuid() ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f00000000c0)={0x3aa, 0x1, r4, 0x0, r5, 0x0, 0xfffffffffffffffe, 0x100}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1567.584666] QAT: Invalid ioctl [ 1567.694757] QAT: Invalid ioctl [ 1567.751370] QAT: Invalid ioctl [ 1567.778585] QAT: Invalid ioctl 17:00:40 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x3, 0x0) chdir(&(0x7f0000000080)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:00:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}, 0x48) 17:00:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xf.\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:00:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x508ffe, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3e) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:00:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) fcntl$addseals(r0, 0x409, 0xa) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x7ffc, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:00:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x48) 17:00:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x0, 0x40001) getresuid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) ioctl$SIOCAX25ADDUID(r4, 0x89e1, &(0x7f00000003c0)={0x3, @null, r5}) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x8004, 0x0, 0x0) getsockopt(r2, 0x7fffffff, 0x3, &(0x7f0000000200)=""/129, &(0x7f0000000100)=0x81) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f00000000c0), 0x10) r6 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x101, 0x400000) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r6, 0x118, 0x1, &(0x7f0000000400)=0x6, 0x2) 17:00:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$KVM_GET_REG_LIST(r3, 0xc008aeb0, &(0x7f0000000080)={0x6, [0x9, 0x1f, 0x100000000, 0x7fffffff, 0x48b, 0x8000]}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f00000000c0)) 17:00:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad", 0x1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0xa2000, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 17:00:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000000)={0x3, 0x7, 0x6, 0x0, 0x1, 0x40, 0x5, 0x9, 0xbd, 0xffffffff80000000, 0xffff, 0x3, 0x0, 0x3, 0x4, 0x5, 0x3, 0xfffffffffffff001, 0x9}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x1, 0x12000, 0x2000, &(0x7f000000f000/0x2000)=nil}) 17:00:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f0000000100)='xf0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1570.441941] QAT: Invalid ioctl [ 1570.544954] ------------[ cut here ]------------ [ 1570.549765] kernel BUG at arch/x86/kvm/x86.c:357! [ 1570.560607] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1570.561262] QAT: Invalid ioctl [ 1570.566004] CPU: 0 PID: 11168 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #80 [ 1570.566016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1570.566041] RIP: 0010:kvm_spurious_fault+0x9/0x10 [ 1570.566058] Code: e8 9c ce 65 00 41 bd 03 00 00 00 5b 44 89 e8 41 5c 41 5d 5d c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 e8 77 ce 65 00 <0f> 0b 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 49 89 d6 41 55 41 54 [ 1570.566066] RSP: 0018:ffff888057ea7790 EFLAGS: 00010212 [ 1570.566079] RAX: 0000000000040000 RBX: ffff88803eb6f810 RCX: ffffc90005ff4000 [ 1570.566088] RDX: 00000000000004d6 RSI: ffffffff810a1309 RDI: 0000000000000007 [ 1570.566103] RBP: ffff888057ea7790 R08: ffff8880544aa040 R09: ffff8880a9be1000 [ 1570.570619] kobject: 'kvm' (000000003469e39d): kobject_uevent_env [ 1570.576546] R10: ffffed101537c3ff R11: ffff8880a9be1fff R12: 1ffff1100afd4ef5 [ 1570.576556] R13: ffff8880a9be1000 R14: ffff888057ea7808 R15: 000000000000ae41 [ 1570.576568] FS: 00007f9b338f0700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1570.576578] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1570.576587] CR2: 00007ff17d440000 CR3: 0000000087b0c000 CR4: 00000000001426f0 [ 1570.576598] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1570.597515] kobject: 'kvm' (000000003469e39d): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1570.609665] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1570.609670] Call Trace: [ 1570.609692] loaded_vmcs_init+0x95/0x250 [ 1570.609706] ? find_msr_entry+0x170/0x170 [ 1570.609725] ? memset+0x32/0x40 [ 1570.624389] ------------[ cut here ]------------ [ 1570.629602] alloc_loaded_vmcs+0x81/0x170 [ 1570.636852] downgrading a read lock [ 1570.636948] WARNING: CPU: 1 PID: 11167 at kernel/locking/lockdep.c:3553 lock_downgrade+0x478/0x810 [ 1570.643079] vmx_create_vcpu+0x24e/0x24dd [ 1570.650330] Kernel panic - not syncing: panic_on_warn set ... [ 1570.657599] ? mutex_trylock+0x1e0/0x1e0 [ 1570.752059] ? try_to_wake_up+0xc6/0xff0 [ 1570.756120] ? vmx_exec_control+0x210/0x210 [ 1570.760443] ? wait_for_completion+0x440/0x440 [ 1570.765035] kvm_arch_vcpu_create+0x80/0x120 [ 1570.769446] kvm_vm_ioctl+0x5ce/0x1900 [ 1570.773336] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1570.778457] ? kvm_unregister_device_ops+0x70/0x70 [ 1570.783401] ? migrate_swap_stop+0x920/0x920 [ 1570.787837] ? lock_downgrade+0x810/0x810 [ 1570.791997] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1570.797192] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 1570.802212] ? __lock_acquire+0x53b/0x4700 [ 1570.806446] ? get_futex_key+0x1690/0x1690 [ 1570.810695] ? __lock_acquire+0x53b/0x4700 [ 1570.814965] ? mark_held_locks+0x100/0x100 [ 1570.819216] ? __might_fault+0x12b/0x1e0 [ 1570.823279] ? __fget+0x340/0x540 [ 1570.826745] ? find_held_lock+0x35/0x130 [ 1570.830833] ? __fget+0x340/0x540 [ 1570.834290] ? kvm_unregister_device_ops+0x70/0x70 [ 1570.839220] do_vfs_ioctl+0xd6e/0x1390 [ 1570.843110] ? ioctl_preallocate+0x210/0x210 [ 1570.847516] ? __fget+0x367/0x540 [ 1570.850979] ? iterate_fd+0x360/0x360 [ 1570.854782] ? nsecs_to_jiffies+0x30/0x30 [ 1570.858933] ? security_file_ioctl+0x93/0xc0 [ 1570.863352] ksys_ioctl+0xab/0xd0 [ 1570.866804] __x64_sys_ioctl+0x73/0xb0 [ 1570.870690] do_syscall_64+0x103/0x610 [ 1570.874578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1570.879764] RIP: 0033:0x457e29 [ 1570.882954] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1570.901863] RSP: 002b:00007f9b338efc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1570.909569] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 1570.916834] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000009 [ 1570.924099] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1570.931367] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b338f06d4 [ 1570.938633] R13: 00000000004c0924 R14: 00000000004d2698 R15: 00000000ffffffff [ 1570.945900] Modules linked in: [ 1570.950168] Kernel Offset: disabled [ 1570.953793] Rebooting in 86400 seconds..