w(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0x2, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:08 executing program 2: 06:05:08 executing program 5 (fault-call:0 fault-nth:81): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:08 executing program 3: 06:05:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r3) mq_unlink(&(0x7f0000000140)='eth0\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x400, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}}, [0x80000000, 0x512, 0x1, 0x4, 0xffffffffffffff97, 0x5, 0x9, 0xd6, 0x0, 0x401, 0x1, 0x8, 0x5, 0x0, 0x6]}, &(0x7f0000000040)=0x100) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000100)={r4, 0x6a71, 0x67d8}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000480)='{\x00') r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="4419009a26b7d9b4b7d800100001080000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000008a6564cf70d430f01d64ac5ae57a1c0016001800010014000b001600000000000000000000000000000008001b0000009551"], 0x3}}, 0x0) ioctl$FITRIM(r7, 0xc0185879, &(0x7f0000000000)={0xffffffff, 0xffffffff, 0x80}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000400)={0x1, 0x4, 0x1000, 0xf, &(0x7f0000000340)="a068b94d0028bd2635f3fed114fba3", 0x45, 0x0, &(0x7f0000000380)="241cb470f30cf29db14e497926a2d221d826fc969651597ebef0baa1268ed2fbfb30da2c5279d796caa9ceb8479ba1b4f48bf2556c137b7747e7063ab12da83348f1e7268a"}) 06:05:08 executing program 3: 06:05:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000040)) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x12, 0x7}) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f00000000c0)=0xf2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = mq_open(&(0x7f0000000100)='eth0\x00', 0x42, 0x0, 0x0) close(r4) mq_unlink(&(0x7f0000000140)='eth0\x00') prctl$PR_MCE_KILL_GET(0x22) [ 237.000977] FAULT_INJECTION: forcing a failure. [ 237.000977] name failslab, interval 1, probability 0, space 0, times 0 06:05:08 executing program 2: [ 237.082259] CPU: 1 PID: 11081 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 237.089349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.098814] Call Trace: [ 237.101519] dump_stack+0x172/0x1f0 [ 237.105185] should_fail.cold+0xa/0x1b [ 237.109109] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 237.114256] ? lock_downgrade+0x880/0x880 [ 237.118829] __should_failslab+0x121/0x190 [ 237.123103] should_failslab+0x9/0x14 [ 237.127038] kmem_cache_alloc_trace+0x2cc/0x760 [ 237.131968] ? kasan_unpoison_shadow+0x35/0x50 [ 237.131983] ? kasan_kmalloc+0xce/0xf0 [ 237.132010] __memcg_init_list_lru_node+0x8a/0x1e0 [ 237.132028] __list_lru_init+0x402/0x720 [ 237.141055] sget_userns+0x84a/0xd30 [ 237.141071] ? kill_litter_super+0x60/0x60 [ 237.158125] ? ns_test_super+0x50/0x50 [ 237.162071] ? ns_test_super+0x50/0x50 [ 237.166156] ? kill_litter_super+0x60/0x60 [ 237.170423] sget+0x10c/0x150 [ 237.173734] mount_bdev+0xff/0x3c0 [ 237.177396] ? msdos_mount+0x40/0x40 [ 237.181224] msdos_mount+0x35/0x40 [ 237.184790] mount_fs+0xa8/0x31f [ 237.188211] vfs_kern_mount.part.0+0x6f/0x410 [ 237.193158] do_mount+0x53e/0x2bc0 [ 237.196722] ? copy_mount_string+0x40/0x40 [ 237.201157] ? _copy_from_user+0xdd/0x150 [ 237.205325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.210896] ? copy_mount_options+0x280/0x3a0 [ 237.215499] ksys_mount+0xdb/0x150 [ 237.219054] __x64_sys_mount+0xbe/0x150 [ 237.223047] do_syscall_64+0xfd/0x620 [ 237.226888] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.232101] RIP: 0033:0x45c94a [ 237.235303] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 237.254509] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 237.262426] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a [ 237.269727] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 06:05:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:08 executing program 3: [ 237.277027] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 [ 237.284416] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 237.291700] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:09 executing program 2: 06:05:09 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40200, 0x1647165bed002112) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r2) mq_unlink(&(0x7f0000000180)='proc\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x6, 0x2, 0xee0b6e4a146d75c, 0x7, 0x7, 0x1e0}, &(0x7f0000000040)=0x20) 06:05:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x2, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:09 executing program 3: 06:05:09 executing program 5 (fault-call:0 fault-nth:82): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:09 executing program 2: 06:05:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001100)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\x01\x83Z\xc4\x06S$\ah\x93\xff\xf7Z\xcb\v1\xf2\xc4\x85\x85\xa6\xfa\x15\x10\xa8\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xd5\x12\xc7\x1ee\x86\xcc\xdb/\xc5\x97\xea\x93\xa7\xde\xc9u\xb1\x9f\xce\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|h$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3We\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xfb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xfc\xe1\t]\x84J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17\x85\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?2,\x89\xb1%p\x8a\r\f\xe0,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa[\xa7\x02\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\xd1`\x88\xf4K\xe7\x80\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\t\x91\xa3\"\x85H@\xb9\x97\bZ\xa5(S\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\xbc\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6\xaa`\x88\x8a\xf4u$\x17\xff\xdbR\x02\xe8V\xdc\xb8]F\xdap\xf7\xdf~G\xe1\xe8\xd2\xe6\x1d\x9b/\xd8\x93F\xcf\xae]\xbb\xa6\x85\x1d/\xef\xf8\xfb>\x9e{\\\x1e\xf1i~\xee\xbb\x1e\x93SN\nA\x99\xd8\xa1y\x185\x86\xbe\x1eU\x9b4\xeem\xaa\xae\x1b\xb09\x9f.\xa3\xc0\xe6C\xc8~\xd8\x95f\xfbF\x05\xb9\xbde\n\x82\x91\r\xf0\x16\xbe[\x00H\x96\x7f8\x7fx\x06\xe9\x0fa\xfa\x1eg)\xc1vaG=a\xf10\x04rw\x0f\xbb%\xc6f\x81\xbaEO\x80\xc3Tc\xc4\xc0\x14\t#2\xd8\xe8\xecX4H\xf0\xc3\'\xba[\xd3}\x16\xa3\xf3\n\x00\xdd\xf3\x81\xaa\x99\xcb(\xb2\x19C\xe4\xc9\x87\x9a\x8c\xbd\xa0\x9cW\a\xb6\xc2R\xabn\xf2', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socket$kcm(0x2, 0x0, 0x0) 06:05:09 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x86200, 0x0) [ 237.913783] FAULT_INJECTION: forcing a failure. [ 237.913783] name failslab, interval 1, probability 0, space 0, times 0 [ 237.991958] CPU: 1 PID: 11104 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 237.998956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.008421] Call Trace: [ 238.011066] dump_stack+0x172/0x1f0 [ 238.014814] should_fail.cold+0xa/0x1b [ 238.019211] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 238.024470] ? lock_downgrade+0x880/0x880 [ 238.028650] __should_failslab+0x121/0x190 [ 238.032919] should_failslab+0x9/0x14 [ 238.036739] kmem_cache_alloc_trace+0x2cc/0x760 [ 238.041437] __memcg_init_list_lru_node+0x8a/0x1e0 [ 238.046412] __list_lru_init+0x402/0x720 [ 238.050635] sget_userns+0x84a/0xd30 [ 238.054373] ? kill_litter_super+0x60/0x60 [ 238.058630] ? ns_test_super+0x50/0x50 [ 238.062636] ? ns_test_super+0x50/0x50 [ 238.066539] ? kill_litter_super+0x60/0x60 [ 238.070819] sget+0x10c/0x150 [ 238.073964] mount_bdev+0xff/0x3c0 [ 238.077529] ? msdos_mount+0x40/0x40 [ 238.081264] msdos_mount+0x35/0x40 [ 238.084829] mount_fs+0xa8/0x31f [ 238.088230] vfs_kern_mount.part.0+0x6f/0x410 [ 238.092756] do_mount+0x53e/0x2bc0 [ 238.096329] ? retint_kernel+0x2d/0x2d [ 238.100251] ? copy_mount_string+0x40/0x40 [ 238.104505] ? __sanitizer_cov_trace_const_cmp8+0x1/0x20 [ 238.110079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.115650] ? copy_mount_options+0x280/0x3a0 [ 238.120274] ksys_mount+0xdb/0x150 [ 238.123836] __x64_sys_mount+0xbe/0x150 [ 238.127828] do_syscall_64+0xfd/0x620 [ 238.131654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.136947] RIP: 0033:0x45c94a [ 238.140157] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 238.159511] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 238.167334] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a [ 238.174705] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 [ 238.182189] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 06:05:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r2) mq_unlink(&(0x7f0000000180)='eth0\x00') ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000000)={0x3, 0xca0, 0x200, 0x80}) 06:05:09 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) socket$nl_generic(0x10, 0x3, 0x10) add_key(0x0, 0x0, &(0x7f00000002c0)="174b95989e47eab318b8425dc90f0cf34e747f9dda09bf9735351e7dfee6b154cafe82063ce58e9e0d903efeb1052411030001f9f619f5605c784ebf251a8040062144c22555fbe20a806fa0fcc955d4931cda25d85e0e3542dcf4429eaa9f842e6a67c2ba34445546b7d67d4cc9", 0x6e, 0xfffffffffffffffe) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 238.189466] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 238.197094] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x4, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:09 executing program 5 (fault-call:0 fault-nth:83): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 238.393419] FAULT_INJECTION: forcing a failure. [ 238.393419] name failslab, interval 1, probability 0, space 0, times 0 [ 238.417819] CPU: 1 PID: 11229 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 238.425058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.434605] Call Trace: [ 238.437314] dump_stack+0x172/0x1f0 [ 238.440977] should_fail.cold+0xa/0x1b [ 238.444881] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 238.450097] ? lock_downgrade+0x880/0x880 [ 238.454259] __should_failslab+0x121/0x190 [ 238.458505] should_failslab+0x9/0x14 [ 238.462413] kmem_cache_alloc_trace+0x2cc/0x760 [ 238.467166] ? kasan_unpoison_shadow+0x35/0x50 [ 238.471751] ? kasan_kmalloc+0xce/0xf0 [ 238.475656] __memcg_init_list_lru_node+0x8a/0x1e0 [ 238.480600] __list_lru_init+0x402/0x720 [ 238.484879] sget_userns+0x84a/0xd30 [ 238.488683] ? kill_litter_super+0x60/0x60 [ 238.492926] ? ns_test_super+0x50/0x50 [ 238.496815] ? ns_test_super+0x50/0x50 [ 238.501664] ? kill_litter_super+0x60/0x60 [ 238.505896] sget+0x10c/0x150 [ 238.509001] mount_bdev+0xff/0x3c0 [ 238.512633] ? msdos_mount+0x40/0x40 [ 238.516346] msdos_mount+0x35/0x40 [ 238.519883] mount_fs+0xa8/0x31f [ 238.523260] vfs_kern_mount.part.0+0x6f/0x410 [ 238.527766] do_mount+0x53e/0x2bc0 [ 238.531318] ? retint_kernel+0x2d/0x2d [ 238.535216] ? copy_mount_string+0x40/0x40 [ 238.539469] ? copy_mount_options+0x1ea/0x3a0 [ 238.544057] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 238.548897] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.554437] ? copy_mount_options+0x280/0x3a0 [ 238.558944] ksys_mount+0xdb/0x150 [ 238.562570] __x64_sys_mount+0xbe/0x150 [ 238.566555] do_syscall_64+0xfd/0x620 [ 238.570354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.575548] RIP: 0033:0x45c94a [ 238.578742] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 238.597647] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 238.605489] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a [ 238.612931] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 [ 238.620326] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 [ 238.627940] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 238.635433] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:10 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x8) ioctl$sock_rose_SIOCRSCLRRT(r3, 0x89e4) r4 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r4) mq_unlink(&(0x7f0000000140)='eth0\x00') 06:05:10 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x2000, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:10 executing program 5 (fault-call:0 fault-nth:84): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001100)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\x01\x83Z\xc4\x06S$\ah\x93\xff\xf7Z\xcb\v1\xf2\xc4\x85\x85\xa6\xfa\x15\x10\xa8\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xd5\x12\xc7\x1ee\x86\xcc\xdb/\xc5\x97\xea\x93\xa7\xde\xc9u\xb1\x9f\xce\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|h$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3We\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xfb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xfc\xe1\t]\x84J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17\x85\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?2,\x89\xb1%p\x8a\r\f\xe0,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa[\xa7\x02\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\xd1`\x88\xf4K\xe7\x80\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\t\x91\xa3\"\x85H@\xb9\x97\bZ\xa5(S\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\xbc\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6\xaa`\x88\x8a\xf4u$\x17\xff\xdbR\x02\xe8V\xdc\xb8]F\xdap\xf7\xdf~G\xe1\xe8\xd2\xe6\x1d\x9b/\xd8\x93F\xcf\xae]\xbb\xa6\x85\x1d/\xef\xf8\xfb>\x9e{\\\x1e\xf1i~\xee\xbb\x1e\x93SN\nA\x99\xd8\xa1y\x185\x86\xbe\x1eU\x9b4\xeem\xaa\xae\x1b\xb09\x9f.\xa3\xc0\xe6C\xc8~\xd8\x95f\xfbF\x05\xb9\xbde\n\x82\x91\r\xf0\x16\xbe[\x00H\x96\x7f8\x7fx\x06\xe9\x0fa\xfa\x1eg)\xc1vaG=a\xf10\x04rw\x0f\xbb%\xc6f\x81\xbaEO\x80\xc3Tc\xc4\xc0\x14\t#2\xd8\xe8\xecX4H\xf0\xc3\'\xba[\xd3}\x16\xa3\xf3\n\x00\xdd\xf3\x81\xaa\x99\xcb(\xb2\x19C\xe4\xc9\x87\x9a\x8c\xbd\xa0\x9cW\a\xb6\xc2R\xabn\xf2', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socket$kcm(0x2, 0x0, 0x0) 06:05:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001100)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\x01\x83Z\xc4\x06S$\ah\x93\xff\xf7Z\xcb\v1\xf2\xc4\x85\x85\xa6\xfa\x15\x10\xa8\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xd5\x12\xc7\x1ee\x86\xcc\xdb/\xc5\x97\xea\x93\xa7\xde\xc9u\xb1\x9f\xce\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|h$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3We\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xfb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xfc\xe1\t]\x84J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17\x85\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?2,\x89\xb1%p\x8a\r\f\xe0,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa[\xa7\x02\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\xd1`\x88\xf4K\xe7\x80\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\t\x91\xa3\"\x85H@\xb9\x97\bZ\xa5(S\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\xbc\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6\xaa`\x88\x8a\xf4u$\x17\xff\xdbR\x02\xe8V\xdc\xb8]F\xdap\xf7\xdf~G\xe1\xe8\xd2\xe6\x1d\x9b/\xd8\x93F\xcf\xae]\xbb\xa6\x85\x1d/\xef\xf8\xfb>\x9e{\\\x1e\xf1i~\xee\xbb\x1e\x93SN\nA\x99\xd8\xa1y\x185\x86\xbe\x1eU\x9b4\xeem\xaa\xae\x1b\xb09\x9f.\xa3\xc0\xe6C\xc8~\xd8\x95f\xfbF\x05\xb9\xbde\n\x82\x91\r\xf0\x16\xbe[\x00H\x96\x7f8\x7fx\x06\xe9\x0fa\xfa\x1eg)\xc1vaG=a\xf10\x04rw\x0f\xbb%\xc6f\x81\xbaEO\x80\xc3Tc\xc4\xc0\x14\t#2\xd8\xe8\xecX4H\xf0\xc3\'\xba[\xd3}\x16\xa3\xf3\n\x00\xdd\xf3\x81\xaa\x99\xcb(\xb2\x19C\xe4\xc9\x87\x9a\x8c\xbd\xa0\x9cW\a\xb6\xc2R\xabn\xf2', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 238.884441] FAULT_INJECTION: forcing a failure. [ 238.884441] name failslab, interval 1, probability 0, space 0, times 0 [ 238.957780] CPU: 1 PID: 11339 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 238.966074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.975632] Call Trace: [ 238.975664] dump_stack+0x172/0x1f0 [ 238.975690] should_fail.cold+0xa/0x1b [ 238.986228] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 238.991724] ? lock_downgrade+0x880/0x880 [ 238.995904] __should_failslab+0x121/0x190 [ 239.000194] should_failslab+0x9/0x14 [ 239.004040] kmem_cache_alloc_node_trace+0x274/0x720 [ 239.009252] ? kmem_cache_alloc_trace+0x348/0x760 [ 239.014122] ? kasan_unpoison_shadow+0x35/0x50 [ 239.019057] __kmalloc_node+0x3d/0x80 [ 239.022980] kvmalloc_node+0x68/0x100 [ 239.026835] __list_lru_init+0x4d9/0x720 [ 239.030943] sget_userns+0x84a/0xd30 [ 239.034802] ? kill_litter_super+0x60/0x60 [ 239.039072] ? ns_test_super+0x50/0x50 [ 239.043002] ? ns_test_super+0x50/0x50 [ 239.046907] ? kill_litter_super+0x60/0x60 [ 239.051510] sget+0x10c/0x150 [ 239.054806] mount_bdev+0xff/0x3c0 [ 239.058383] ? msdos_mount+0x40/0x40 [ 239.062123] msdos_mount+0x35/0x40 [ 239.065689] mount_fs+0xa8/0x31f [ 239.069276] vfs_kern_mount.part.0+0x6f/0x410 [ 239.073816] do_mount+0x53e/0x2bc0 [ 239.077483] ? copy_mount_string+0x40/0x40 [ 239.081770] ? _copy_from_user+0xdd/0x150 [ 239.086281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.091865] ? copy_mount_options+0x280/0x3a0 [ 239.096913] ksys_mount+0xdb/0x150 [ 239.100579] __x64_sys_mount+0xbe/0x150 [ 239.104577] do_syscall_64+0xfd/0x620 06:05:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000000)=0x4000000, &(0x7f0000000040)=0x4) r4 = dup(r0) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000000c0)=""/43, &(0x7f0000000100)=0x2b) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r5) mq_unlink(&(0x7f0000000140)='eth0\x00') 06:05:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=@deltclass={0x47c, 0x29, 0x100, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, {0x8, 0x9}, {0xe, 0xf}, {0x3, 0xe421d4fef8097627}}, [@tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x438, 0x2, [@TCA_CBQ_WRROPT={0x10, 0x2, {0xff, 0x3, 0x69, 0x2, 0x3, 0xfffffffe}}, @TCA_CBQ_RTAB={0x404, 0x6, [0x2, 0xd6e, 0x5, 0x9, 0x924b9800, 0x18, 0x9, 0x3ba, 0x101, 0xa3, 0xfffffffc, 0xfffffff7, 0x8000, 0xee5, 0x6, 0x5d6, 0xdf15, 0x7f, 0x2, 0x1, 0x4, 0xef, 0xa383, 0x6, 0x3f, 0x0, 0x5, 0x4, 0x80000000, 0xfffffe01, 0x248, 0x800, 0x8, 0x400, 0x60000, 0x76, 0x87, 0x7, 0x8, 0x10000, 0xffffff81, 0x671, 0x6, 0x3f, 0x9, 0x8, 0x2, 0x2, 0x10001, 0x4, 0x40, 0x2, 0x0, 0x1, 0x2, 0x5, 0x0, 0x2, 0x4, 0xda, 0x9, 0x800, 0x20, 0x4, 0x800, 0x9, 0xff, 0x9f9a, 0x4, 0x4, 0x950, 0x800000, 0x8, 0xed, 0x5, 0x80, 0x3f, 0x4, 0x28, 0x4, 0x5e39, 0x1f, 0xffffffff, 0xfffffffd, 0x2, 0x2040, 0x1, 0x5, 0x5, 0x2, 0x400, 0x8, 0x81, 0x5, 0x7, 0x80000000, 0x9, 0xfff, 0x6, 0x8, 0x603c, 0x7, 0xff, 0x3d30, 0x80a, 0x2, 0x7fffffff, 0x9, 0x7, 0xfffffffa, 0xffff, 0x5, 0x1000, 0x7, 0x3, 0x0, 0x155, 0x6, 0x5, 0xfffff688, 0x80000000, 0x3, 0x100, 0x9, 0x0, 0x484, 0x8, 0x80000001, 0x1, 0x9, 0x6, 0x8, 0x9, 0x3, 0x1ffc0, 0x6, 0xffffffff, 0x9, 0x1, 0x1ff, 0x68, 0xcd5, 0xfffff236, 0xe00000, 0xd3, 0x7, 0x7, 0x3, 0x48, 0x7fff, 0x3, 0x8, 0x7ff, 0x1, 0xa54f, 0x0, 0x0, 0x7, 0x800, 0x5037, 0x800, 0xffffffff, 0xabaf, 0xfffffeff, 0x6, 0x20, 0xa6, 0x9, 0xce0, 0x7, 0x0, 0x5, 0x0, 0x400, 0x9, 0x3, 0x0, 0x40, 0x5, 0x5, 0x9, 0x7ff, 0x80000001, 0x5, 0xfffffffe, 0x7ff, 0x3f, 0xac, 0x6, 0x7ff, 0x2, 0x1000, 0xffffa023, 0x8001, 0x2, 0x0, 0xf0c, 0x100, 0x401, 0xfffffffc, 0x7, 0x0, 0x5, 0x0, 0x4, 0x10001, 0xfffffe00, 0x7, 0x1, 0xc7, 0xfe, 0x8, 0xfffffb89, 0x49, 0x3, 0x8, 0x6, 0x0, 0x9, 0x10001, 0x585, 0x9, 0x1ff, 0x8, 0x7, 0x8001, 0x2, 0x5, 0x7, 0x8, 0xdc4, 0xfffffffb, 0x800, 0x9, 0x1, 0x3, 0x2, 0x7, 0x9, 0xfffffff9, 0x80, 0x96, 0xfffffffe, 0x8, 0x200, 0x7, 0x7, 0x80000001, 0x0, 0x81, 0x8001, 0x4, 0xc, 0x1, 0x400, 0x5]}, @TCA_CBQ_FOPT={0x10, 0x3, {{0x0, 0xffff}, 0x7, 0x1}}, @TCA_CBQ_RATE={0x10, 0x5, {0x7b, 0x0, 0x1, 0x9, 0x3f, 0x2}}]}}, @TCA_RATE={0x8, 0x5, {0x81, 0x7}}, @TCA_RATE={0x8, 0x5, {0x93, 0xcc}}, @TCA_RATE={0x8, 0x5, {0x80, 0x2}}]}, 0x47c}, 0x1, 0x0, 0x0, 0x801}, 0x1) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup(r3) r4 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r3, 0x800443d2, &(0x7f00000006c0)={0x1, &(0x7f00000001c0)=[{}]}) close(r4) mq_unlink(&(0x7f0000000140)='eth0\x00') [ 239.108411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.113613] RIP: 0033:0x45c94a [ 239.116830] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 239.126441] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 239.136006] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:05:10 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 239.136022] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a [ 239.136029] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 [ 239.136036] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 [ 239.136043] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 239.136050] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:10 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYRESHEX, @ANYBLOB="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", @ANYBLOB="8a7cfcb0bd543a07372504167b455ddfd0640764ef04ff46cf47e8137f38ee38898fd565996a1a1f4cd1b86a0e031dff9943c97285"], 0x0, 0x14c}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 239.205270] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 239.226321] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 239.242912] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 06:05:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="240000005a001f", 0x7) close(r7) r8 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) r10 = fcntl$dupfd(r9, 0x0, r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) accept4$packet(r12, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001a80)=0x14, 0x800) setsockopt$packet_drop_memb(r10, 0x107, 0x2, &(0x7f0000001ac0)={r13, 0x1, 0x6, @random="3b287ca967c7"}, 0x10) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r5, 0x0, r7, 0x0, 0x4ffe0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$can_bcm(0x1d, 0x2, 0x2) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x442204f7, 0x8, &(0x7f00000005c0)=[{&(0x7f0000000100)="cf7aa819cd", 0x5, 0x8000}, {&(0x7f0000000180)='Zs[', 0x3, 0x5dd3437a}, {&(0x7f00000001c0)="5fef68c157a9848d19d117f38060427c96d4cda3b83f9e8cee444b75f8347d19cb52240d56f436a7ecd82952ed2f416d70ea6ace8714869e83a435710f1cde4b5b61abd2dc8c9e5ff3c484b230faa64443910a24ac2fab666f4b478a5e1310f123262282b0cef47585b47fc624126a1df800176bba", 0x75, 0x8}, {&(0x7f0000000240)="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", 0xff, 0x2a2}, {&(0x7f0000000340)="46e134d6c625f2a8a0e413cb80eb754c06b8e84ed0a85db8ec0dc01a86f87baf6ec5494b37288f00902d404b7538b6a363627f91e889f8730ad20addb0f0bc61bd8f0c4f34", 0x45, 0x8}, {&(0x7f00000003c0)="2480c26e106f80883792d67c0f2b1d4e2136da19ff09889c68f48bc78796585e2a00372275b384e00dc507f1da869a91ea9e49a7da014618a3fc0cc08877c9ad1a9196c45794a140f034fb1f65b83618381c986b8f889155fd4a11c3c7c8e251377bbc13d5d47f19e6e0f049080ea67c28a3b3f03593af9ec90bfa2b085a5b637fdbebf05e605a6c7e2b", 0x8a, 0x259}, {&(0x7f0000000480)="56fbdc308f66db6613453be92d4f4d02138b955c31c77c2ac2fefcffef18a1c163b5006eae7fb7660e7ce9a8ecc5db32cce565d90c37340f86ec40747752c802eb65acadd283d9585e31515224aaa5aa5ad4349493c286a3118151666df7e98498d8e83410aeae0bde28ca0bf41cab97101ec1fe2e33e43bac2afdb2cc8c8811fcc77af3f4245b6ec62c8e4278b8c70efde298da10d1df125f7e1d8a9aeb95d8a76dda37438eb68d8d3683feb75d764336b6ae00eb2709a040e14f19f61585356ec9ca6630a851f3db3748a8085a9a36d4a7d1a9e85e880c64d8e4fb0b95f20b9076fea20bdf8bf79d728c", 0xeb, 0x4}, {&(0x7f0000000580), 0x0, 0x4}], 0x100000, &(0x7f0000000a40)=ANY=[@ANYBLOB='session=0x0000000000000000,gid=', @ANYRESHEX=r14, @ANYBLOB="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", @ANYRESDEC=r15, @ANYBLOB=',\x00']) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000000)=0x6, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresgid(&(0x7f0000000700), &(0x7f0000001d00), 0x0) 06:05:10 executing program 5 (fault-call:0 fault-nth:85): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 239.345586] ptrace attach of "/root/syz-executor.3"[11463] was attempted by "/root/syz-executor.3"[11464] [ 239.372947] FAULT_INJECTION: forcing a failure. [ 239.372947] name failslab, interval 1, probability 0, space 0, times 0 [ 239.385000] CPU: 1 PID: 11468 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 239.392067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.402308] Call Trace: [ 239.405014] dump_stack+0x172/0x1f0 [ 239.408792] should_fail.cold+0xa/0x1b [ 239.412715] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 239.417860] ? lock_downgrade+0x880/0x880 [ 239.422045] __should_failslab+0x121/0x190 [ 239.426310] should_failslab+0x9/0x14 [ 239.430218] kmem_cache_alloc_trace+0x2cc/0x760 [ 239.434909] ? kasan_unpoison_shadow+0x35/0x50 [ 239.439522] ? kasan_kmalloc+0xce/0xf0 [ 239.443531] __memcg_init_list_lru_node+0x8a/0x1e0 [ 239.448858] __list_lru_init+0x402/0x720 [ 239.453048] sget_userns+0x84a/0xd30 [ 239.456807] ? kill_litter_super+0x60/0x60 [ 239.461056] ? ns_test_super+0x50/0x50 [ 239.465151] ? ns_test_super+0x50/0x50 [ 239.469048] ? kill_litter_super+0x60/0x60 [ 239.473557] sget+0x10c/0x150 [ 239.476814] mount_bdev+0xff/0x3c0 [ 239.480381] ? msdos_mount+0x40/0x40 [ 239.484292] msdos_mount+0x35/0x40 [ 239.487919] mount_fs+0xa8/0x31f [ 239.491347] vfs_kern_mount.part.0+0x6f/0x410 [ 239.495962] do_mount+0x53e/0x2bc0 [ 239.499523] ? copy_mount_string+0x40/0x40 [ 239.503876] ? copy_mount_options+0x1ea/0x3a0 [ 239.508391] ? copy_mount_options+0x1f0/0x3a0 [ 239.513071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.518901] ? copy_mount_options+0x280/0x3a0 [ 239.523533] ksys_mount+0xdb/0x150 [ 239.527105] __x64_sys_mount+0xbe/0x150 [ 239.531188] do_syscall_64+0xfd/0x620 [ 239.535094] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.540300] RIP: 0033:0x45c94a [ 239.543617] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 239.562853] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 239.570585] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a [ 239.577927] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 [ 239.585299] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 [ 239.593062] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 239.600353] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:11 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r2) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) mq_unlink(&(0x7f0000000140)='eth0\x00') socket$netlink(0x10, 0x3, 0x14) 06:05:11 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:11 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="240000005a001f", 0x7) close(r7) r8 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) r10 = fcntl$dupfd(r9, 0x0, r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) accept4$packet(r12, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001a80)=0x14, 0x800) setsockopt$packet_drop_memb(r10, 0x107, 0x2, &(0x7f0000001ac0)={r13, 0x1, 0x6, @random="3b287ca967c7"}, 0x10) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r5, 0x0, r7, 0x0, 0x4ffe0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$can_bcm(0x1d, 0x2, 0x2) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x442204f7, 0x8, &(0x7f00000005c0)=[{&(0x7f0000000100)="cf7aa819cd", 0x5, 0x8000}, {&(0x7f0000000180)='Zs[', 0x3, 0x5dd3437a}, {&(0x7f00000001c0)="5fef68c157a9848d19d117f38060427c96d4cda3b83f9e8cee444b75f8347d19cb52240d56f436a7ecd82952ed2f416d70ea6ace8714869e83a435710f1cde4b5b61abd2dc8c9e5ff3c484b230faa64443910a24ac2fab666f4b478a5e1310f123262282b0cef47585b47fc624126a1df800176bba", 0x75, 0x8}, {&(0x7f0000000240)="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", 0xff, 0x2a2}, {&(0x7f0000000340)="46e134d6c625f2a8a0e413cb80eb754c06b8e84ed0a85db8ec0dc01a86f87baf6ec5494b37288f00902d404b7538b6a363627f91e889f8730ad20addb0f0bc61bd8f0c4f34", 0x45, 0x8}, {&(0x7f00000003c0)="2480c26e106f80883792d67c0f2b1d4e2136da19ff09889c68f48bc78796585e2a00372275b384e00dc507f1da869a91ea9e49a7da014618a3fc0cc08877c9ad1a9196c45794a140f034fb1f65b83618381c986b8f889155fd4a11c3c7c8e251377bbc13d5d47f19e6e0f049080ea67c28a3b3f03593af9ec90bfa2b085a5b637fdbebf05e605a6c7e2b", 0x8a, 0x259}, {&(0x7f0000000480)="56fbdc308f66db6613453be92d4f4d02138b955c31c77c2ac2fefcffef18a1c163b5006eae7fb7660e7ce9a8ecc5db32cce565d90c37340f86ec40747752c802eb65acadd283d9585e31515224aaa5aa5ad4349493c286a3118151666df7e98498d8e83410aeae0bde28ca0bf41cab97101ec1fe2e33e43bac2afdb2cc8c8811fcc77af3f4245b6ec62c8e4278b8c70efde298da10d1df125f7e1d8a9aeb95d8a76dda37438eb68d8d3683feb75d764336b6ae00eb2709a040e14f19f61585356ec9ca6630a851f3db3748a8085a9a36d4a7d1a9e85e880c64d8e4fb0b95f20b9076fea20bdf8bf79d728c", 0xeb, 0x4}, {&(0x7f0000000580), 0x0, 0x4}], 0x100000, &(0x7f0000000a40)=ANY=[@ANYBLOB='session=0x0000000000000000,gid=', @ANYRESHEX=r14, @ANYBLOB="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", @ANYRESDEC=r15, @ANYBLOB=',\x00']) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000000)=0x6, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresgid(&(0x7f0000000700), &(0x7f0000001d00), 0x0) 06:05:11 executing program 5 (fault-call:0 fault-nth:86): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 239.800157] FAULT_INJECTION: forcing a failure. [ 239.800157] name failslab, interval 1, probability 0, space 0, times 0 [ 239.801172] audit: type=1400 audit(1571810711.414:48): avc: denied { create } for pid=11575 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_rdma_socket permissive=1 [ 239.831056] CPU: 0 PID: 11576 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 239.843822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.853199] Call Trace: [ 239.855822] dump_stack+0x172/0x1f0 [ 239.859559] should_fail.cold+0xa/0x1b [ 239.863472] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 239.868953] ? lock_downgrade+0x880/0x880 [ 239.873394] __should_failslab+0x121/0x190 [ 239.878286] should_failslab+0x9/0x14 [ 239.882195] kmem_cache_alloc_trace+0x2cc/0x760 [ 239.886897] ? kasan_unpoison_shadow+0x35/0x50 [ 239.891613] ? kasan_kmalloc+0xce/0xf0 [ 239.895568] __memcg_init_list_lru_node+0x8a/0x1e0 [ 239.900623] __list_lru_init+0x402/0x720 [ 239.905093] sget_userns+0x84a/0xd30 [ 239.908930] ? kill_litter_super+0x60/0x60 [ 239.913278] ? ns_test_super+0x50/0x50 [ 239.917560] ? ns_test_super+0x50/0x50 [ 239.921920] ? kill_litter_super+0x60/0x60 [ 239.926326] sget+0x10c/0x150 [ 239.929471] mount_bdev+0xff/0x3c0 [ 239.931107] ptrace attach of "/root/syz-executor.3"[11581] was attempted by "/root/syz-executor.3"[11673] [ 239.933259] ? msdos_mount+0x40/0x40 06:05:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="240000005a001f", 0x7) close(r7) r8 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) r10 = fcntl$dupfd(r9, 0x0, r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) accept4$packet(r12, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001a80)=0x14, 0x800) setsockopt$packet_drop_memb(r10, 0x107, 0x2, &(0x7f0000001ac0)={r13, 0x1, 0x6, @random="3b287ca967c7"}, 0x10) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r5, 0x0, r7, 0x0, 0x4ffe0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$can_bcm(0x1d, 0x2, 0x2) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x442204f7, 0x8, &(0x7f00000005c0)=[{&(0x7f0000000100)="cf7aa819cd", 0x5, 0x8000}, {&(0x7f0000000180)='Zs[', 0x3, 0x5dd3437a}, {&(0x7f00000001c0)="5fef68c157a9848d19d117f38060427c96d4cda3b83f9e8cee444b75f8347d19cb52240d56f436a7ecd82952ed2f416d70ea6ace8714869e83a435710f1cde4b5b61abd2dc8c9e5ff3c484b230faa64443910a24ac2fab666f4b478a5e1310f123262282b0cef47585b47fc624126a1df800176bba", 0x75, 0x8}, {&(0x7f0000000240)="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", 0xff, 0x2a2}, {&(0x7f0000000340)="46e134d6c625f2a8a0e413cb80eb754c06b8e84ed0a85db8ec0dc01a86f87baf6ec5494b37288f00902d404b7538b6a363627f91e889f8730ad20addb0f0bc61bd8f0c4f34", 0x45, 0x8}, {&(0x7f00000003c0)="2480c26e106f80883792d67c0f2b1d4e2136da19ff09889c68f48bc78796585e2a00372275b384e00dc507f1da869a91ea9e49a7da014618a3fc0cc08877c9ad1a9196c45794a140f034fb1f65b83618381c986b8f889155fd4a11c3c7c8e251377bbc13d5d47f19e6e0f049080ea67c28a3b3f03593af9ec90bfa2b085a5b637fdbebf05e605a6c7e2b", 0x8a, 0x259}, {&(0x7f0000000480)="56fbdc308f66db6613453be92d4f4d02138b955c31c77c2ac2fefcffef18a1c163b5006eae7fb7660e7ce9a8ecc5db32cce565d90c37340f86ec40747752c802eb65acadd283d9585e31515224aaa5aa5ad4349493c286a3118151666df7e98498d8e83410aeae0bde28ca0bf41cab97101ec1fe2e33e43bac2afdb2cc8c8811fcc77af3f4245b6ec62c8e4278b8c70efde298da10d1df125f7e1d8a9aeb95d8a76dda37438eb68d8d3683feb75d764336b6ae00eb2709a040e14f19f61585356ec9ca6630a851f3db3748a8085a9a36d4a7d1a9e85e880c64d8e4fb0b95f20b9076fea20bdf8bf79d728c", 0xeb, 0x4}, {&(0x7f0000000580), 0x0, 0x4}], 0x100000, &(0x7f0000000a40)=ANY=[@ANYBLOB='session=0x0000000000000000,gid=', @ANYRESHEX=r14, @ANYBLOB="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", @ANYRESDEC=r15, @ANYBLOB=',\x00']) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000000)=0x6, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresgid(&(0x7f0000000700), &(0x7f0000001d00), 0x0) [ 239.933278] msdos_mount+0x35/0x40 [ 239.933296] mount_fs+0xa8/0x31f [ 239.933315] vfs_kern_mount.part.0+0x6f/0x410 [ 239.933337] do_mount+0x53e/0x2bc0 [ 239.963816] ? copy_mount_string+0x40/0x40 [ 239.968072] ? _copy_from_user+0xdd/0x150 [ 239.972333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.977889] ? copy_mount_options+0x280/0x3a0 [ 239.982496] ksys_mount+0xdb/0x150 [ 239.986157] __x64_sys_mount+0xbe/0x150 [ 239.990598] do_syscall_64+0xfd/0x620 [ 239.994459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.999670] RIP: 0033:0x45c94a [ 240.002973] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 240.022015] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 240.022045] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a [ 240.022055] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 06:05:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = mq_open(&(0x7f0000001380)='eth0\x00', 0x1, 0x230, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) r6 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$TIPC_MCAST_REPLICAST(r6, 0x10f, 0x86) mq_notify(r6, &(0x7f0000000040)={0x0, 0x22, 0x5, @thr={&(0x7f0000000000)="7446a2fc7346515f8850d11bdfa7fc41f946555b21fa0f5a7bcaa53cd1687f8c10c02a984dbdb48098699196eeb795848b", &(0x7f00000000c0)="17ada052d4c44a1df2118efc1a4e95918e8c5f71a6828f08e4aa8fdfbda7ee7f64829561e2d547ad079441031f8f88fa12367a3fd9339fb680cd16316473a666d2cd2cc121c86b93d2bb5d3230c9948081a665a3adc27b5ff887c1838eb74e6ff049b875dfa2413ada799c6ae3f35bccd7f9c2b8afa8415de6d606d8"}}) close(r3) mq_unlink(&(0x7f0000000140)='eth0\x00') ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000180)) 06:05:11 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 240.022063] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 [ 240.022071] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 240.022080] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:11 executing program 5 (fault-call:0 fault-nth:87): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 240.141825] audit: type=1400 audit(1571810711.754:49): avc: denied { create } for pid=11701 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 06:05:11 executing program 2 (fault-call:2 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 240.182236] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 240.242924] audit: type=1400 audit(1571810711.854:50): avc: denied { ioctl } for pid=11701 comm="syz-executor.1" path="socket:[38432]" dev="sockfs" ino=38432 ioctlcmd=0x227d scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 240.248752] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 240.289303] FAULT_INJECTION: forcing a failure. [ 240.289303] name failslab, interval 1, probability 0, space 0, times 0 [ 240.327726] CPU: 0 PID: 11799 Comm: syz-executor.5 Not tainted 4.19.80 #0 06:05:11 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x2000, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 240.334800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.334807] Call Trace: [ 240.334833] dump_stack+0x172/0x1f0 [ 240.334856] should_fail.cold+0xa/0x1b [ 240.334876] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 240.334892] ? lock_downgrade+0x880/0x880 [ 240.334913] __should_failslab+0x121/0x190 [ 240.367991] should_failslab+0x9/0x14 [ 240.371816] kmem_cache_alloc_trace+0x2cc/0x760 [ 240.376597] ? kasan_unpoison_shadow+0x35/0x50 [ 240.381312] ? kasan_kmalloc+0xce/0xf0 [ 240.385310] __memcg_init_list_lru_node+0x8a/0x1e0 [ 240.390252] __list_lru_init+0x402/0x720 [ 240.394365] sget_userns+0x84a/0xd30 [ 240.398080] ? kill_litter_super+0x60/0x60 [ 240.402312] ? ns_test_super+0x50/0x50 [ 240.406205] ? ns_test_super+0x50/0x50 [ 240.410278] ? kill_litter_super+0x60/0x60 [ 240.414641] sget+0x10c/0x150 [ 240.417746] mount_bdev+0xff/0x3c0 [ 240.421283] ? msdos_mount+0x40/0x40 [ 240.424996] msdos_mount+0x35/0x40 [ 240.428617] mount_fs+0xa8/0x31f [ 240.431982] vfs_kern_mount.part.0+0x6f/0x410 [ 240.436494] do_mount+0x53e/0x2bc0 [ 240.440123] ? copy_mount_string+0x40/0x40 [ 240.444481] ? _copy_from_user+0xdd/0x150 [ 240.448637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.454619] ? copy_mount_options+0x280/0x3a0 [ 240.459126] ksys_mount+0xdb/0x150 [ 240.462661] __x64_sys_mount+0xbe/0x150 [ 240.466641] do_syscall_64+0xfd/0x620 [ 240.470632] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.475846] RIP: 0033:0x45c94a [ 240.479055] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 240.498335] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 240.506434] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a [ 240.513783] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 [ 240.521928] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 [ 240.529377] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 240.536641] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:12 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:12 executing program 3 (fault-call:8 fault-nth:0): clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:12 executing program 1: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r2) mq_unlink(&(0x7f0000000140)='eth0\x00') setsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f0000000040)=0x7fffffff, 0x4) 06:05:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:12 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x34000, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xfffffffffffffeff, 0x3, 0x0, 0x12, 0xd, 0x9, "8b2bc6c96e1f5bc61a989c0c4468b799160a01ffdfa04c93dcaca6ca447c3dec1912ae9a2f8bf7b8afd9d6dfc811e3eb0922e04ccba8cb6237b57047b296821d", "945f266aa08230e1a54614930ea92abf3b695d092682da2aba03d2162ba5060d2912dbcdd342b9589cf6f3d49bdedda1d3e2e02486fb5ebbc91ed7c51323edec", "eb2c753d4c83d8f15c00a2358d9519ad5fd0d44e78fde5b89cd01c74ede5efa1", [0x51, 0x49]}) r2 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xa0000, 0x0) close(r2) mq_unlink(&(0x7f0000000140)='eth0\x00') socket$inet6(0xa, 0x1, 0xc0) 06:05:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:12 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x400300, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:12 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:12 executing program 5 (fault-call:0 fault-nth:88): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r2) accept4$rose(r1, &(0x7f0000000000)=@full={0xb, @remote, @null, 0x0, [@netrom, @null, @netrom, @rose, @remote, @default]}, &(0x7f0000000040)=0x40, 0x180800) mq_unlink(&(0x7f0000000140)='eth0\x00') 06:05:12 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x1000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4b47, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 241.186082] FAULT_INJECTION: forcing a failure. [ 241.186082] name failslab, interval 1, probability 0, space 0, times 0 [ 241.199519] CPU: 1 PID: 11945 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 241.206750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.216207] Call Trace: [ 241.218820] dump_stack+0x172/0x1f0 [ 241.222568] should_fail.cold+0xa/0x1b [ 241.226485] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 241.231739] ? lock_downgrade+0x880/0x880 [ 241.235911] __should_failslab+0x121/0x190 [ 241.240164] should_failslab+0x9/0x14 [ 241.243991] kmem_cache_alloc_trace+0x2cc/0x760 [ 241.248670] ? kasan_unpoison_shadow+0x35/0x50 [ 241.253555] ? kasan_kmalloc+0xce/0xf0 [ 241.257476] __memcg_init_list_lru_node+0x8a/0x1e0 [ 241.262598] __list_lru_init+0x402/0x720 [ 241.266677] sget_userns+0x84a/0xd30 [ 241.270397] ? kill_litter_super+0x60/0x60 [ 241.274646] ? ns_test_super+0x50/0x50 [ 241.278553] ? ns_test_super+0x50/0x50 [ 241.282467] ? kill_litter_super+0x60/0x60 [ 241.286712] sget+0x10c/0x150 [ 241.289838] mount_bdev+0xff/0x3c0 [ 241.293538] ? msdos_mount+0x40/0x40 [ 241.297353] msdos_mount+0x35/0x40 [ 241.300998] mount_fs+0xa8/0x31f [ 241.304388] vfs_kern_mount.part.0+0x6f/0x410 [ 241.308918] do_mount+0x53e/0x2bc0 [ 241.312473] ? retint_kernel+0x2d/0x2d [ 241.316460] ? copy_mount_string+0x40/0x40 [ 241.320810] ? copy_mount_options+0x1ea/0x3a0 [ 241.325336] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 241.330200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.335833] ? copy_mount_options+0x280/0x3a0 [ 241.340349] ksys_mount+0xdb/0x150 [ 241.343911] __x64_sys_mount+0xbe/0x150 [ 241.347906] do_syscall_64+0xfd/0x620 [ 241.351724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.357120] RIP: 0033:0x45c94a [ 241.360377] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 241.379494] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 241.387582] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a [ 241.394949] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 [ 241.402400] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 [ 241.409938] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 241.417319] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:13 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:13 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000100)={0x6, 0x81, 0x4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2c0800, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup(r4) clone(0x80000, &(0x7f0000000240)="7377212449051e0923ce74fe69c3990fce5e17991318e38b46447e6be8f195c59b45a484b4dfc04c5e2739794821a799b83d3dd11fe785c9e4ee104c7e90d3f5446a300221703f0786eccc702aeb5736a0c3c2be3ce411adc23065d956895c1af53bb4aa108878447f8006daa58da8dac71f400316e75a3bdc6f8e18fd9795a4438f7c8619129ce10fcc5a1b05c37383", &(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000340)="115411a512798df7a3b0747d2626b3829a37c9eef85f8f0a23548ab02921cf0f2060d2fa82cf68645e0a5ad227cc9712dbb6a633c5b9ca209523263359733822d78f0b10922cb06eb08f9a55413b5d5db78e4162752bb6ce494d8e13eecb441ffff8acae3070ca3bba3eb0bb36") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SCSI_IOCTL_GET_PCI(r7, 0x5387, &(0x7f0000000180)) r8 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xffff, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r10) mq_unlink(&(0x7f0000000140)='eth0\x00') 06:05:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x2000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4b49, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:13 executing program 5 (fault-call:0 fault-nth:89): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 241.527301] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 241.559289] FAULT_INJECTION: forcing a failure. [ 241.559289] name failslab, interval 1, probability 0, space 0, times 0 [ 241.571011] CPU: 1 PID: 12062 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 241.577968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.587628] Call Trace: [ 241.587660] dump_stack+0x172/0x1f0 [ 241.587680] should_fail.cold+0xa/0x1b [ 241.587706] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 241.587737] ? lock_downgrade+0x880/0x880 [ 241.587766] __should_failslab+0x121/0x190 [ 241.587783] should_failslab+0x9/0x14 [ 241.587803] kmem_cache_alloc_trace+0x2cc/0x760 [ 241.587816] ? kasan_unpoison_shadow+0x35/0x50 [ 241.587829] ? kasan_kmalloc+0xce/0xf0 [ 241.587849] __memcg_init_list_lru_node+0x8a/0x1e0 [ 241.607219] __list_lru_init+0x402/0x720 [ 241.607240] sget_userns+0x84a/0xd30 [ 241.624997] ? kill_litter_super+0x60/0x60 [ 241.625018] ? ns_test_super+0x50/0x50 [ 241.650475] ? ns_test_super+0x50/0x50 [ 241.654391] ? kill_litter_super+0x60/0x60 [ 241.658624] sget+0x10c/0x150 [ 241.661746] mount_bdev+0xff/0x3c0 [ 241.665286] ? msdos_mount+0x40/0x40 [ 241.669029] msdos_mount+0x35/0x40 [ 241.672673] mount_fs+0xa8/0x31f [ 241.676131] vfs_kern_mount.part.0+0x6f/0x410 [ 241.680641] do_mount+0x53e/0x2bc0 [ 241.684296] ? copy_mount_string+0x40/0x40 [ 241.688544] ? _copy_from_user+0xdd/0x150 [ 241.693088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.700060] ? copy_mount_options+0x280/0x3a0 [ 241.704666] ksys_mount+0xdb/0x150 [ 241.708223] __x64_sys_mount+0xbe/0x150 [ 241.712212] do_syscall_64+0xfd/0x620 [ 241.716195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.721479] RIP: 0033:0x45c94a [ 241.724669] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 241.743759] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 241.751646] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a [ 241.759006] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 [ 241.766373] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 [ 241.773798] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 241.781162] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x4000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:13 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000000)={0x3ff, 0x38a, 0x6, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r4) mq_unlink(&(0x7f0000000140)='eth0\x00') 06:05:13 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x541b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:13 executing program 5 (fault-call:0 fault-nth:90): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 242.082585] FAULT_INJECTION: forcing a failure. [ 242.082585] name failslab, interval 1, probability 0, space 0, times 0 [ 242.094775] CPU: 1 PID: 12080 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 242.101830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.111401] Call Trace: [ 242.114014] dump_stack+0x172/0x1f0 [ 242.117670] should_fail.cold+0xa/0x1b [ 242.121674] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 242.127235] ? lock_downgrade+0x880/0x880 [ 242.131417] __should_failslab+0x121/0x190 [ 242.135772] should_failslab+0x9/0x14 [ 242.139595] kmem_cache_alloc_trace+0x2cc/0x760 [ 242.144285] ? kasan_unpoison_shadow+0x35/0x50 [ 242.148877] ? kasan_kmalloc+0xce/0xf0 [ 242.152798] __memcg_init_list_lru_node+0x8a/0x1e0 [ 242.157840] __list_lru_init+0x402/0x720 [ 242.162009] sget_userns+0x84a/0xd30 [ 242.165849] ? kill_litter_super+0x60/0x60 [ 242.170110] ? ns_test_super+0x50/0x50 [ 242.174291] ? ns_test_super+0x50/0x50 [ 242.178295] ? kill_litter_super+0x60/0x60 [ 242.182601] sget+0x10c/0x150 [ 242.185727] mount_bdev+0xff/0x3c0 [ 242.189363] ? msdos_mount+0x40/0x40 [ 242.193097] msdos_mount+0x35/0x40 [ 242.196865] mount_fs+0xa8/0x31f [ 242.200369] vfs_kern_mount.part.0+0x6f/0x410 [ 242.204893] do_mount+0x53e/0x2bc0 [ 242.208568] ? copy_mount_string+0x40/0x40 [ 242.212908] ? _copy_from_user+0xdd/0x150 [ 242.217289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.222844] ? copy_mount_options+0x280/0x3a0 [ 242.227371] ksys_mount+0xdb/0x150 [ 242.231133] __x64_sys_mount+0xbe/0x150 [ 242.235229] do_syscall_64+0xfd/0x620 [ 242.239149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.244373] RIP: 0033:0x45c94a [ 242.247765] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 242.267479] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 242.275297] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a 06:05:13 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x4206, r0) 06:05:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x20000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:13 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x5421, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000100)={0xf000000, 0x400, 0x80000001, [], &(0x7f00000000c0)={0x990a76, 0x40, [], @p_u16=&(0x7f0000000040)=0x9}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r3) mq_unlink(&(0x7f0000000140)='eth0\x00') [ 242.282668] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 [ 242.290070] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 [ 242.297539] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 242.304906] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:14 executing program 5 (fault-call:0 fault-nth:91): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:14 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, 0x0, &(0x7f0000000600)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:14 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x80ffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400204) r2 = mq_open(&(0x7f0000000000)='eth0\x00', 0xb0f18a151ee9372c, 0x1416db3cdbc0c44a, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x20000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_dccp_int(r5, 0x21, 0x1, &(0x7f00000000c0)=0x1000, 0x4) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) close(r2) mq_unlink(&(0x7f0000000140)='eth0\x00') [ 242.492690] FAULT_INJECTION: forcing a failure. [ 242.492690] name failslab, interval 1, probability 0, space 0, times 0 [ 242.527278] CPU: 1 PID: 12226 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 242.535169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.544546] Call Trace: [ 242.544576] dump_stack+0x172/0x1f0 [ 242.544600] should_fail.cold+0xa/0x1b [ 242.555009] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 242.560228] ? lock_downgrade+0x880/0x880 [ 242.560259] __should_failslab+0x121/0x190 [ 242.568670] should_failslab+0x9/0x14 [ 242.572592] kmem_cache_alloc_trace+0x2cc/0x760 [ 242.577273] ? kasan_unpoison_shadow+0x35/0x50 [ 242.582155] ? kasan_kmalloc+0xce/0xf0 [ 242.586062] __memcg_init_list_lru_node+0x8a/0x1e0 [ 242.591183] __list_lru_init+0x402/0x720 [ 242.591200] sget_userns+0x84a/0xd30 [ 242.591212] ? kill_litter_super+0x60/0x60 [ 242.591225] ? ns_test_super+0x50/0x50 [ 242.591236] ? ns_test_super+0x50/0x50 [ 242.591252] ? kill_litter_super+0x60/0x60 [ 242.615677] sget+0x10c/0x150 [ 242.618793] mount_bdev+0xff/0x3c0 [ 242.622418] ? msdos_mount+0x40/0x40 [ 242.629981] msdos_mount+0x35/0x40 [ 242.633534] mount_fs+0xa8/0x31f [ 242.636986] vfs_kern_mount.part.0+0x6f/0x410 [ 242.641570] do_mount+0x53e/0x2bc0 [ 242.645458] ? copy_mount_string+0x40/0x40 [ 242.650573] ? copy_mount_options+0x1fb/0x3a0 [ 242.655072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.660610] ? copy_mount_options+0x280/0x3a0 [ 242.665126] ksys_mount+0xdb/0x150 [ 242.668665] __x64_sys_mount+0xbe/0x150 [ 242.672641] do_syscall_64+0xfd/0x620 [ 242.676703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.682061] RIP: 0033:0x45c94a [ 242.685269] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 242.704623] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 242.712333] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a [ 242.719869] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 [ 242.727372] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 [ 242.734638] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 06:05:14 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, 0x0, &(0x7f0000000600)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x30, r4, 0x491, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xa, &(0x7f0000000380)={&(0x7f0000000840)=ANY=[@ANYBLOB="d40000f51364833e6f66a8bdf1caa0a5fb0c01e46429efbcac39d7010770004f7d0a6d3654c8236f1cd503424f09faa9b23b31a99f2f656fc483b67d46e814d9a2a9eb017c86a147ab882be5fb46cf58f620008aa438f3", @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x448c0}, 0x1) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="0000f1d2f2423643713d44c7ff359a0010bb", @ANYRES16=r5, @ANYBLOB="300227bd7000ffdbdf250f0000001400010008000b0073697000080009003f000000640003000800040007d800001400060000000000000000000000ffffac1414aa08000300040000000800040008000000080007004e24000008000400d095000008000500000000000800080020000000140002007465616d5f736c6176655f310000000008000400008000001400020008000e004e24000008000e004e220000080006000000000008000500cbbe0000"], 0xb8}, 0x1, 0x0, 0x0, 0x40810}, 0x24004884) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$P9_RLINK(r7, &(0x7f0000000480)={0x7, 0x47, 0x1}, 0x7) mq_unlink(&(0x7f0000000140)='eth0\x00') getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0x100}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000640)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x81, 0x46, 0x1, 0xcfae, 0x80}, &(0x7f0000000700)=0x98) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000740)={r8, 0x7, 0x2, 0x1, 0x7, 0x7, 0x1f5, 0x7fffffff, {r9, @in6={{0xa, 0x4e24, 0x7, @empty}}, 0x7, 0xffffff00, 0x1000, 0x4, 0xffff7fff}}, &(0x7f0000000800)=0xb0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r14 = dup(r13) ioctl$sock_inet_tcp_SIOCINQ(r14, 0x541b, &(0x7f0000000340)) r15 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r15, r11, 0x5, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) write$P9_RSTAT(r11, &(0x7f0000000400)={0x4a, 0x7d, 0x2, {0x0, 0x43, 0x4, 0x401, {0x24, 0x3, 0x1}, 0x80000, 0x2, 0x10000, 0x6, 0x7, 'TIPCv2\x00', 0x5, 'eth0\x00', 0x0, '', 0x4, 'bdev'}}, 0x4a) [ 242.741920] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:14 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0xffffff7f, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:14 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, 0x0, &(0x7f0000000600)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 242.853021] Started in network mode [ 242.864923] Own node identity , cluster identity 4711 [ 242.914708] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 242.941658] Started in network mode [ 242.951769] Own node identity , cluster identity 4711 [ 242.969890] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 06:05:14 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xffffffff00000000, 0x10000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x4, 0xa86, 0x6, 'queue0\x00', 0x58b}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000001c0)={{0x4, 0x5a}, 'port0\x00', 0x6, 0x20801, 0x6, 0xfffeffff, 0x9, 0x7, 0x3, 0x0, 0x1, 0x8}) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f0000000340)=ANY=[@ANYBLOB="83180000160000000685860f858f0881010b8f0f010604000000000000001f70051c197673be80d8afa1f77f8cfbe020e6954f611f4e6288e25d839bcee539a5b00a630bcdcebd42cf6688d64d02ba3437a3ff57d98b500a2d191d0274c5a63ddacd47741888f1e69b861007fcff29c5a111eb49047c6503f753ab214d423c3dbda0424fe099dba74972605c234b69601695"]) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x5450, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:14 executing program 5 (fault-call:0 fault-nth:92): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:14 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:14 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0xffffff80, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) write$rfkill(r1, &(0x7f0000000040)={0x2, 0x4, 0x3, 0x0, 0x1}, 0x8) close(r2) mq_unlink(&(0x7f0000000140)='eth0\x00') ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x4, 0x5}) [ 243.245112] FAULT_INJECTION: forcing a failure. [ 243.245112] name failslab, interval 1, probability 0, space 0, times 0 [ 243.279338] CPU: 1 PID: 12328 Comm: syz-executor.5 Not tainted 4.19.80 #0 06:05:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f0000000180)='eth0\x00\x9c\x1d\xee\x17\xd5\xbd-\x97\xec\xaa\x9b\x95\xa0\xa4\xfd\x10}\x89\x01\x19\xd4\xee\xdf* \x9cO\xa4\xc7\x03\x1c\xf3\x92Q\xea\x05X]\x90\xeb|\x12U\xae\xcf\xdf\xc4\x9aN7\xf4;\xd4\xadg\xf3\xb5\x9d\xbd\xdc\x0f\x14d\xf3\x13K\xc3p\xb6\xf6\x9f\xc7\x1f#W\v+\xb7\x86\x97`\x13\xadt\x8e\xf5\xe5\t`H|(\xd5I\x80\xe3\xca\xf4\xf2\x1fz\xf7G&\xf0\xbc70\x94n\xbfV\x01DL\x98\x9a\x1f\x10G\x0fQ\n\xef\x9a5\x12t:=\'\x93>\xd2\fK_\x80\xd3\xcb\xb1\x1a\x00\xb2p\x00\x00\x00\x00\x00', 0x0, 0x48, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000a80)='/dev/input/mouse#\x00', 0x5, 0x2400) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, &(0x7f0000000ac0)={0x2c, 0x10000, 0xa, 0xa, 0x5}) r4 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x20840) sendmsg$kcm(r4, &(0x7f0000000940)={&(0x7f00000000c0)=@vsock={0x28, 0x0, 0xffffffff, @reserved}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000240)="0922d2d5c84a1a681ed0df66ee7cfc60f181ae188ae6fb5d8077aa3c990d2105abcdadaa36be3dc23ad923811bb7996e187bfb343732242725180965a673182497af23c5fef30a41509668fe95ea7834594949a458a219cbfe9f6dccc8674cf93ffe8fc2221209b43df78582b8c85fc404b3c8e5e1c6b46f5593bc012ada4bbc59045afa36e6c8a37c6fc755903015a58cda9e69ba89950e31be0cb0a8f843fc55b6455f71eb17bcb17265b5f1842faebb3c58cc616bb5e6cd0bcc210d6b2bd67d4b3f46a186af63a22cd0fbdba296540fdcf97b5bd9110e07dfed6c81845450c6791f55bf31754af2", 0xe9}, {&(0x7f0000000040)="214f10ceb046c52e42cdc2adfe1e93d731212a", 0x13}, {&(0x7f0000000340)="8b6402722a0653d5", 0x8}, {&(0x7f0000000380)="0ad84df322e931eaddbb9a7403f8df50351db57ccb0c305296a4327d8a6dd090357ccdbda044cbfc1760425187fb4621262991ad25b66782d19678200f96eda2dfb8a5ca56c98174195c1277b132eacb2bcce3182c7238f63f176faa9abc5be4c3fb1f87f4d34df0b9feb34fd3982a80c845e8c61d88b6c50be650befa5bbf1e1d6c9da75f5db78a2162dbf92b3fa6192a7f4d9ac7af4bd0ad3e33cb0ecd20149b0b8ebfc66c3bff390a3b14bc9e1d3b88e4425c30cb4eb16acbfe62f6e016a2f03520c99dc5378dc7776b9bd3c13fbb32a3daa0a877198ca3e96218f779227ef6be91775ab7f1620b90f51dbd188913d3bfdb0225", 0xf5}, {&(0x7f0000000480)="e65a74eab91174ca0fa2ce6fd3bd6b40fed32622efc91af182b18a34f8ada1a24594874ae56fd35e019d1fd8e8cb550fb080c6cb6c4db9af7ece3f7932dbcdb2869f41f5745f33fb05b420dfb14faf0b034859b966d8143bcdc8c1c79d2c92cc8f817be257172066c88cbe64c745fc1ff29c97e654d7566905c8a6ec359f090b2e7c388d7354b3e11a375d63c252bfe9e9330c68c85f02333641034dca245cab9563b37261", 0xa5}, {&(0x7f0000000540)="925ed996e36c07edea793cd339da958861954b8d4f898e4e08ed4732993f57e59b4de9f62416ac1466da21921ff80bf0eead8f242397fb1d566af3db62285170d0d82fb53e1131a222b11b2125a7221bc2f21347bdba28dc7ac8426883730a0d42827b175bf25d4e5acd277fb7da1fdff6e61f1aae195ef1ef617552f3eba5bc88d6c0672e74087bb3549c673851f057b2", 0x91}, {&(0x7f0000000600)="f73e8a8785fa722d3a7f6e09bf4d7f863e601d9b75349e5f894b915425905b286b16522236099c2fefd5cd1e131abce4b1ce176f8729f57fdb366755847d098a71f79792c4241a215325688be6d3854731009c216c70cebf88b976da0aabe4831a29d4907f62531cffb501e1ebdb0c5a164c997508a7da64a44bf5005e757705091b6346055924d78f94be5883801c40609c79484cbb3c1b", 0x98}, {&(0x7f00000006c0)="1f2b8314077fdadbb8fbb6991bedde16285d8b54ee82db211c8031641f1a08427bf01e72f76489e2dfe1567d29ee46bcbd2650b2dab3f8b962e7b5dcff07a0ae92f285deace2a9a4c819592f1e60cd7c0f1516afbddfe6a625685bfd491332a6d760637769de4800ac64166d94e05bcfe71644c9bf4fe9a095187b182f46c49242c99a50a482220604f5ea1e5771fe15a1f7f4ff2ee6d75650f55c2c8cf90ac74fcf9e4fb49152705d040e74dbeeaf9569f3a356f155c70748128aef876e0dd5", 0xc0}, {&(0x7f0000000780)="4db823feb323c1ad66421fbbb47b8e2b8b96d2ca35d7d9d91bbaf413f0cfaaada3aa87a918", 0x25}, {&(0x7f00000007c0)="8a317cc4b2bd8d1cda3f4b053b55e39c3f79aee6fec4202a6d52df6aa8a8c58448b06f7ea5da5789e7d6593fc4c4eb071f617bf0114c6a61d91f13de86b68033a4c549ef9ad5d9c9b555636b77cc591e29b60384ce1d5271de01634247c14f2fe8763e5e864adfdb7b02c28fbd0aa23beb4e166bbd6abca53bd354db04fd905c365f71", 0x83}], 0xa}, 0x4801) close(r2) mq_unlink(&(0x7f0000000140)='eth0\x00') r5 = syz_open_dev$radio(&(0x7f0000000980)='/dev/radio#\x00', 0x2, 0x2) r6 = syz_open_dev$adsp(&(0x7f0000000a00)='/dev/adsp#\x00', 0x2, 0x40000) ioctl$SG_SET_KEEP_ORPHAN(r6, 0x2287, &(0x7f0000000a40)=0x8b2) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f00000009c0)=0x5) [ 243.286551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.296091] Call Trace: [ 243.298735] dump_stack+0x172/0x1f0 [ 243.302401] should_fail.cold+0xa/0x1b [ 243.306355] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 243.311483] ? lock_downgrade+0x880/0x880 [ 243.311510] __should_failslab+0x121/0x190 [ 243.311529] should_failslab+0x9/0x14 [ 243.320391] kmem_cache_alloc_trace+0x2cc/0x760 [ 243.320405] ? kasan_unpoison_shadow+0x35/0x50 [ 243.320421] ? kasan_kmalloc+0xce/0xf0 [ 243.338231] __memcg_init_list_lru_node+0x8a/0x1e0 [ 243.343373] __list_lru_init+0x402/0x720 [ 243.347629] sget_userns+0x84a/0xd30 [ 243.351365] ? kill_litter_super+0x60/0x60 [ 243.355626] ? ns_test_super+0x50/0x50 [ 243.359670] ? ns_test_super+0x50/0x50 [ 243.363588] ? kill_litter_super+0x60/0x60 [ 243.367936] sget+0x10c/0x150 [ 243.371221] mount_bdev+0xff/0x3c0 [ 243.374872] ? msdos_mount+0x40/0x40 [ 243.378626] msdos_mount+0x35/0x40 [ 243.382299] mount_fs+0xa8/0x31f [ 243.385795] vfs_kern_mount.part.0+0x6f/0x410 [ 243.390580] do_mount+0x53e/0x2bc0 06:05:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x20, 0x0) close(r2) mq_unlink(&(0x7f0000000140)='eth0\x00') [ 243.394421] ? copy_mount_string+0x40/0x40 [ 243.398796] ? _copy_from_user+0xdd/0x150 [ 243.402965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.408613] ? copy_mount_options+0x280/0x3a0 [ 243.414214] ksys_mount+0xdb/0x150 [ 243.417878] __x64_sys_mount+0xbe/0x150 [ 243.421992] do_syscall_64+0xfd/0x620 [ 243.425950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.431268] RIP: 0033:0x45c94a [ 243.434476] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 243.453394] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 243.461215] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a [ 243.468591] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 [ 243.476422] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 [ 243.483716] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 06:05:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:15 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f0000000100)={[{0x4, 0x6, 0x1, 0xf0, 0x7f, 0x0, 0x1, 0x5, 0x4, 0x8a, 0x0, 0x40, 0xfffffffffffffff8}, {0x0, 0x4, 0x80, 0x0, 0x0, 0x0, 0x1, 0x9, 0x7, 0x48, 0x7, 0x81, 0x7}, {0x3, 0xb680, 0x8, 0x9, 0x4, 0x81, 0x6, 0x2, 0x9, 0x2, 0x4, 0x8c, 0x10000}]}) r3 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r3) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace(0x10, r0) [ 243.491218] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f0000000180)='\x00\x00\x00\x00\x00\x9dG\xb8\xc1^\xef\xccx\xdb\xa9%\xd9\xf8\xc0\x9d\xe2\x8c\x04?\x802\xda\xae\xcf:I\xeb+\xaa\x8ai\x85+\xa1t\xfd\xcb\n\xe5^\x95\x9d\x06\x9fM\xc2~\xd5d\x8d\x1ea\xe7\xdb\x11\xd3\xde\xcc5\x05\xa9\x1cB\xfa\x182\aL|\xaa\xcb!B\x99\x84\xd5J\x12\xe8\x8c\x14\r\xc4\xfd}\x15%\x90\x1a\xc3\xac\x1c\x96\x18e\xf6\xa4\x9fI\x86\xfd|\v\xc1\x91\xa9E\x85P\x18\xc6<\xba1\xe0\xd9\xd5:\xb5\xca<:\xa1b3\xc0\xe0\x9d\xd2\xc9?y\xff|\xd00\xa8', 0x0, 0x22, 0x0) close(r2) mq_unlink(&(0x7f0000000140)='eth0\x00') 06:05:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x5451, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:15 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:15 executing program 5 (fault-call:0 fault-nth:93): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = gettid() tkill(r2, 0x1000000000013) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_DBG_G_CHIP_INFO(r4, 0xc0c85666, &(0x7f0000000180)={{}, "adfea694640278841c212c4f1c89f5ec871ba3734115ff270f2770caee882964"}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1) sched_getattr(r2, &(0x7f0000000000)={0x30}, 0x30, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(0xffffffffffffffff) mq_unlink(&(0x7f0000000140)='eth0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SG_SET_FORCE_PACK_ID(r6, 0x227b, &(0x7f0000000040)=0x1) 06:05:15 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x2], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 243.703120] ptrace attach of "/root/syz-executor.3"[12446] was attempted by "/root/syz-executor.3"[12452] [ 243.732871] FAULT_INJECTION: forcing a failure. [ 243.732871] name failslab, interval 1, probability 0, space 0, times 0 [ 243.768595] CPU: 1 PID: 12525 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 243.775843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.785919] Call Trace: [ 243.788544] dump_stack+0x172/0x1f0 [ 243.792210] should_fail.cold+0xa/0x1b [ 243.796221] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 243.801448] ? lock_downgrade+0x880/0x880 [ 243.806261] __should_failslab+0x121/0x190 [ 243.810705] should_failslab+0x9/0x14 [ 243.814881] kmem_cache_alloc_trace+0x2cc/0x760 [ 243.819741] ? kasan_unpoison_shadow+0x35/0x50 [ 243.824339] ? kasan_kmalloc+0xce/0xf0 [ 243.828258] __memcg_init_list_lru_node+0x8a/0x1e0 [ 243.833309] __list_lru_init+0x402/0x720 [ 243.837584] sget_userns+0x84a/0xd30 [ 243.841449] ? kill_litter_super+0x60/0x60 [ 243.845717] ? ns_test_super+0x50/0x50 [ 243.849638] ? ns_test_super+0x50/0x50 [ 243.853650] ? kill_litter_super+0x60/0x60 [ 243.858009] sget+0x10c/0x150 [ 243.861168] mount_bdev+0xff/0x3c0 [ 243.864725] ? msdos_mount+0x40/0x40 [ 243.868467] msdos_mount+0x35/0x40 [ 243.872291] mount_fs+0xa8/0x31f [ 243.875681] vfs_kern_mount.part.0+0x6f/0x410 [ 243.880485] do_mount+0x53e/0x2bc0 [ 243.884069] ? copy_mount_string+0x40/0x40 [ 243.888414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.894346] ? copy_mount_options+0x280/0x3a0 [ 243.899088] ksys_mount+0xdb/0x150 [ 243.902669] __x64_sys_mount+0xbe/0x150 [ 243.906844] do_syscall_64+0xfd/0x620 [ 243.910674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.915975] RIP: 0033:0x45c94a [ 243.919185] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 243.938401] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 243.946127] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a [ 243.953514] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 [ 243.960882] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 06:05:15 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r2 = socket$vsock_stream(0x28, 0x1, 0x0) recvmsg(r2, &(0x7f0000000640)={&(0x7f0000000140)=@rc, 0x80, &(0x7f0000000040)=[{&(0x7f0000000200)=""/239, 0xef}, {&(0x7f0000000300)=""/148, 0x94}, {&(0x7f00000003c0)=""/194, 0xc2}], 0x3, &(0x7f00000004c0)=""/209, 0xd1}, 0x40000100) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x54, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @multicast1=0xac14140d}}, {0x14, 0x2, @in={0x2, 0x0, @dev}}}}]}]}, 0x54}}, 0x0) creat(0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r3 = getpid() r4 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r4) rt_tgsigqueueinfo(r3, r3, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ptrace(0x10, r3) 06:05:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x5452, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 243.968206] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 243.975668] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:15 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x4], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 244.033217] Started in network mode [ 244.037104] Own node identity ac14140d, cluster identity 4711 [ 244.043427] vcan0: MTU too low for tipc bearer [ 244.058320] Enabling of bearer rejected, failed to enable media 06:05:15 executing program 5 (fault-call:0 fault-nth:94): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 244.194516] FAULT_INJECTION: forcing a failure. [ 244.194516] name failslab, interval 1, probability 0, space 0, times 0 [ 244.231196] CPU: 1 PID: 12640 Comm: syz-executor.5 Not tainted 4.19.80 #0 06:05:15 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 244.238356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.247810] Call Trace: [ 244.247838] dump_stack+0x172/0x1f0 [ 244.247860] should_fail.cold+0xa/0x1b [ 244.247878] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 244.247897] ? lock_downgrade+0x880/0x880 [ 244.254126] __should_failslab+0x121/0x190 [ 244.254145] should_failslab+0x9/0x14 [ 244.254165] kmem_cache_alloc_trace+0x2cc/0x760 [ 244.254177] ? kasan_unpoison_shadow+0x35/0x50 [ 244.254192] ? kasan_kmalloc+0xce/0xf0 [ 244.289547] __memcg_init_list_lru_node+0x8a/0x1e0 [ 244.294575] __list_lru_init+0x402/0x720 [ 244.298723] sget_userns+0x84a/0xd30 [ 244.302433] ? kill_litter_super+0x60/0x60 [ 244.306665] ? ns_test_super+0x50/0x50 [ 244.310657] ? ns_test_super+0x50/0x50 [ 244.314640] ? kill_litter_super+0x60/0x60 [ 244.318882] sget+0x10c/0x150 [ 244.322000] mount_bdev+0xff/0x3c0 [ 244.326864] ? msdos_mount+0x40/0x40 [ 244.330584] msdos_mount+0x35/0x40 [ 244.334191] mount_fs+0xa8/0x31f [ 244.337651] vfs_kern_mount.part.0+0x6f/0x410 [ 244.342265] do_mount+0x53e/0x2bc0 [ 244.345904] ? copy_mount_string+0x40/0x40 [ 244.350310] ? _copy_from_user+0xdd/0x150 [ 244.354459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.360091] ? copy_mount_options+0x280/0x3a0 [ 244.364597] ksys_mount+0xdb/0x150 [ 244.368219] __x64_sys_mount+0xbe/0x150 [ 244.372226] do_syscall_64+0xfd/0x620 [ 244.376126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.381325] RIP: 0033:0x45c94a [ 244.384615] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 244.404945] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 244.412863] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a [ 244.420488] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 [ 244.429905] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 [ 244.437260] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 06:05:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x5460, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:16 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 244.445235] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:16 executing program 5 (fault-call:0 fault-nth:95): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 244.614168] FAULT_INJECTION: forcing a failure. [ 244.614168] name failslab, interval 1, probability 0, space 0, times 0 [ 244.626909] CPU: 1 PID: 12793 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 244.633967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.644302] Call Trace: [ 244.646966] dump_stack+0x172/0x1f0 [ 244.650627] should_fail.cold+0xa/0x1b [ 244.654628] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 244.659840] ? __lock_acquire+0x6ee/0x49c0 [ 244.664104] ? mempool_alloc+0x380/0x380 [ 244.668362] __should_failslab+0x121/0x190 [ 244.672987] should_failslab+0x9/0x14 [ 244.677302] kmem_cache_alloc+0x47/0x700 [ 244.681400] ? mempool_alloc+0x380/0x380 [ 244.685486] mempool_alloc_slab+0x47/0x60 [ 244.689666] mempool_alloc+0x169/0x380 [ 244.693584] ? mempool_destroy+0x40/0x40 [ 244.697756] ? mark_held_locks+0xb1/0x100 [ 244.701928] ? __find_get_block+0x9b8/0xcf0 [ 244.706374] ? __getblk_gfp+0x1b1/0x970 [ 244.710723] ? __find_get_block+0x9b8/0xcf0 [ 244.715246] ? lockdep_hardirqs_on+0x415/0x5d0 [ 244.719935] bio_alloc_bioset+0x3cd/0x690 [ 244.724278] ? __lock_is_held+0xb6/0x140 [ 244.728369] ? bvec_alloc+0x2f0/0x2f0 [ 244.732195] submit_bh_wbc+0x14b/0x790 [ 244.736194] __bread_gfp+0x13d/0x300 [ 244.739923] ? vfat_rename.cold+0x5c/0x5c [ 244.744087] fat_fill_super+0x320/0x3900 [ 244.748253] ? vsnprintf+0x32a/0x19a0 [ 244.752082] ? fat_flush_inodes+0x1a0/0x1a0 [ 244.756416] ? up_write+0x1c/0x150 [ 244.760220] ? snprintf+0xbb/0xf0 [ 244.763849] ? vsprintf+0x40/0x40 [ 244.767498] ? wait_for_completion+0x440/0x440 [ 244.772112] ? ns_test_super+0x50/0x50 [ 244.776100] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 244.781549] ? set_blocksize+0x2bf/0x340 [ 244.785722] msdos_fill_super+0x2f/0x40 [ 244.789813] mount_bdev+0x304/0x3c0 [ 244.793453] ? msdos_mount+0x40/0x40 [ 244.797208] msdos_mount+0x35/0x40 [ 244.800877] mount_fs+0xa8/0x31f [ 244.804350] vfs_kern_mount.part.0+0x6f/0x410 [ 244.808893] do_mount+0x53e/0x2bc0 [ 244.812456] ? copy_mount_string+0x40/0x40 [ 244.816853] ? copy_mount_options+0x198/0x3a0 [ 244.821361] ? copy_mount_options+0x1cd/0x3a0 [ 244.826130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.831697] ? copy_mount_options+0x280/0x3a0 [ 244.836222] ksys_mount+0xdb/0x150 [ 244.839993] __x64_sys_mount+0xbe/0x150 [ 244.843993] do_syscall_64+0xfd/0x620 [ 244.847820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.853023] RIP: 0033:0x45c94a [ 244.856229] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 244.875436] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 244.883160] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a [ 244.890621] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 [ 244.897900] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 [ 244.905383] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 244.912757] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 [ 244.922596] FAT-fs (loop5): bogus number of reserved sectors [ 244.928642] FAT-fs (loop5): Can't find a valid FAT filesystem [ 244.938965] ptrace attach of ""[12571] was attempted by "/root/syz-executor.3"[12795] 06:05:18 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:18 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x2], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0xae03, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:18 executing program 3: r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e20, 0x8, @ipv4={[], [], @local}, 0x46c9}}, 0x0, 0x3, 0x0, "00a65cb5086e6fb2860595073d6f0806eb80c662d4465fa9a2ac020755ec7684a471018e7319793ee29a5359de2cd03c16b0c81a183fee5ef53f56e34c4614b0b6d43db8a9e8487543f3976bea2dd4b3"}, 0xd8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getpid() ptrace(0x10, r0) 06:05:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r2) mq_unlink(&(0x7f0000000140)='eth0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r4, 0xc0485630, &(0x7f0000000180)={0x8, "7c06803e2bc7494d654d3ef9fc16dee14ec2dd7d245c57de428039ef77ac6020", 0x3, 0xdb, 0x0, 0x400, 0x4}) r5 = request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)='{#vboxnet0nodev%\x00', 0xfffffffffffffff9) keyctl$revoke(0x3, r5) 06:05:18 executing program 5 (fault-call:0 fault-nth:96): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 246.812657] FAULT_INJECTION: forcing a failure. [ 246.812657] name failslab, interval 1, probability 0, space 0, times 0 [ 246.849415] CPU: 1 PID: 12806 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 246.856763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.866645] Call Trace: [ 246.869245] dump_stack+0x172/0x1f0 [ 246.872875] should_fail.cold+0xa/0x1b [ 246.876941] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 246.882048] ? lock_downgrade+0x880/0x880 [ 246.886210] __should_failslab+0x121/0x190 [ 246.890793] should_failslab+0x9/0x14 [ 246.894877] kmem_cache_alloc_trace+0x2cc/0x760 [ 246.899642] ? kasan_unpoison_shadow+0x35/0x50 [ 246.904495] ? kasan_kmalloc+0xce/0xf0 [ 246.908472] __memcg_init_list_lru_node+0x8a/0x1e0 [ 246.913409] __list_lru_init+0x402/0x720 [ 246.917571] sget_userns+0x84a/0xd30 [ 246.921368] ? kill_litter_super+0x60/0x60 [ 246.925686] ? ns_test_super+0x50/0x50 [ 246.929570] ? ns_test_super+0x50/0x50 [ 246.933549] ? kill_litter_super+0x60/0x60 [ 246.937982] sget+0x10c/0x150 [ 246.941135] mount_bdev+0xff/0x3c0 [ 246.944847] ? msdos_mount+0x40/0x40 [ 246.948597] msdos_mount+0x35/0x40 [ 246.952135] mount_fs+0xa8/0x31f [ 246.955501] vfs_kern_mount.part.0+0x6f/0x410 [ 246.960004] do_mount+0x53e/0x2bc0 [ 246.963629] ? copy_mount_string+0x40/0x40 [ 246.967863] ? _copy_from_user+0xdd/0x150 [ 246.972005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.977681] ? copy_mount_options+0x280/0x3a0 [ 246.982190] ksys_mount+0xdb/0x150 [ 246.985736] __x64_sys_mount+0xbe/0x150 [ 246.989738] do_syscall_64+0xfd/0x620 [ 246.993543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.998731] RIP: 0033:0x45c94a [ 247.001924] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 247.021472] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 247.029299] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a [ 247.036859] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 [ 247.044296] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 [ 247.051563] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 06:05:18 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 247.058915] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:18 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x1000000000013) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x3, 0x1, 0x7fff, 0x599, 0x7, 0xa6ed, 0xad}, 0x0) r2 = getpgrp(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000100)={[], 0x869b, 0x7, 0x5d9b, 0x1, 0x8, 0xffffffffffffffff}) prctl$PR_SET_PTRACER(0x59616d61, r2) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/load\x00', 0x2, 0x0) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_EVENTS(r7, 0x84, 0xb, &(0x7f0000000500), &(0x7f0000000540)=0xb) r8 = dup(r5) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="27d5bb9d574e9a042f76ca54f5872dc40d97f802f055c5f7562599e15fea4b1fbd8d8fd81f5cb76d5434563594596dfc9dd4c19de4e371672728130cb44a81f8d7ab2959", 0x44, 0xfff}], 0x102004, &(0x7f0000000400)={[{@noquota='noquota'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@barrier_none='barrier=none'}, {@usrjquota_file='usrjquota=syz'}, {@errors_continue='errors=continue'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@user_xattr='user_xattr'}], [{@appraise_type='appraise_type=imasig'}, {@smackfshat={'smackfshat'}}, {@fowner_gt={'fowner>', r9}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:18 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x4], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:18 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000180)={0x1, 0x2}, 0x59c032a7097e0be5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r3) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x5ca57a2d81e07cdf}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xb8, r4, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x200}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x611e}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x28}}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vxcan1\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}]}, 0xb8}, 0x1, 0x0, 0x0, 0x200000a4}, 0x8000) getdents64(r2, &(0x7f00000000c0)=""/22, 0x16) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet6_mreq(r8, 0x29, 0x1c, &(0x7f0000000440)={@mcast1, 0x0}, &(0x7f0000000480)=0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)={r9, @remote, @empty}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000500)=@assoc_value={0x0, 0x81}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000580)={r10, 0x5b, "8df48a5596d2e77b43037f4c1373f0fff86a134e40140316faae244054464c767265efebfd642d70ee27c6b1e0a1b395109d72ab52d1aebb243f6940b851bea913659b87ce9f83de1d71ff58c96b9b86886506f0a11ab7472e6fc1"}, &(0x7f0000000600)=0x63) getsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f00000003c0)={0x0, 0x8ca, 0x0, 0x0, 0x7f, 0x9}, &(0x7f0000000400)=0x14) openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x2, 0x0) getsockopt$llc_int(r6, 0x10c, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) mq_unlink(&(0x7f0000000140)='eth0\x00') 06:05:18 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:18 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 247.260138] ptrace attach of "/root/syz-executor.3"[12817] was attempted by "/root/syz-executor.3"[12824] 06:05:18 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000340)=@abs, &(0x7f0000000140)=0x6e) openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) socket$caif_stream(0x25, 0x1, 0x1) socket$unix(0x1, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/qat_adf_ctl\x00', 0x90000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$media(&(0x7f0000000480)='/dev/media#\x00', 0x4, 0x408000) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f00000004c0)) dup(r1) socket$tipc(0x1e, 0x5, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x28) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000000)={0x0, 0x100000, 0x1, 0x3, 0x6}) r5 = mq_open(&(0x7f0000000180)='eth0\x00\x002\xf0L\xeb\xeb\xafu\xd3\xe1\xa4%\xb2P\x17\xcdD\xda\xa2u\xb7\x1b\xbd\xb4*_\x7fbH\xb2`\xe7\xac!\xce\xaf\x8b\x83\x84\xba\x8f\x1a)}\xc4C\f\xf7=,FW\xe2\x8bH\x8e\x87\x99\x9cC\xf6\xd7\xcc\xca\x9a\x05\x910\xea\xfcx\xd5g\nA\xf4\xfd\xaa\xfb\xc0>\xd4\xbd\x00J\xfama\xd5*\x8bKn\x10\xf8\x03\xd8A\x8d\xa6#(\xa7\xa3Y]\n\f\xea\x8f\r\x0f\xadm\xd0\'\x00\x16\t\x1fYM\xae\xae R\xf8\x95\x1a?#\xaf\f\xe22\\\xaa\xfa\x9fI\x17-\xf1 W\x8f\xed\x9a\xbd1\xabOv3\x1a\xd1l\x92+O?\xc4o\xa2R\x86\x10\xdd\x8e\x9cz0\xad\\\xf1\a\x8c\xd4\x02<\xce\xc1\x9d\xca\xdb:\xbb\x11\x85.}\xeb\xfb\xff2\x99\xde\x0f\x93\xb4\xbe\x00\xd1\xd1\x9c\x1f\xf4u\xc4\xfe\x87v\xbdj\xdd&\xf6\x9fv\xb6g=\xef\xcb4\xf6\xb5\xa2\t\x8dp1\xd6\xc6\\\x82\xf1us\x18 \x99\xd4\xb7\xb9\xbfH\x8ag\x0fxK\x8b\xd0\x18\xe7\x82\xbe\x15y\x93\xd7\xf1,\xb92)\x80\xfc\x11h\xf2R\x86z\xf2\xf0\xf2\xd4T\x12\xa9\x88\xf5\x9c.\xba\xa4', 0x2, 0x84, 0x0) close(r5) 06:05:19 executing program 5 (fault-call:0 fault-nth:97): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 247.424427] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 06:05:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0xae41, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:19 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x2], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 247.521580] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 247.540664] FAT-fs (loop5): bogus number of reserved sectors [ 247.549445] FAT-fs (loop5): Can't find a valid FAT filesystem [ 247.599057] FAULT_INJECTION: forcing a failure. [ 247.599057] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 247.611730] CPU: 1 PID: 12935 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 247.618908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.628461] Call Trace: [ 247.631108] dump_stack+0x172/0x1f0 [ 247.634776] should_fail.cold+0xa/0x1b [ 247.638690] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 247.643907] ? mark_held_locks+0x100/0x100 [ 247.648173] __alloc_pages_nodemask+0x1ee/0x750 [ 247.652972] ? __irq_work_queue_local+0xaf/0x170 [ 247.657866] ? __alloc_pages_slowpath+0x2870/0x2870 [ 247.662922] cache_grow_begin+0x91/0x8c0 [ 247.667022] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 247.672590] ? check_preemption_disabled+0x48/0x290 [ 247.677944] kmem_cache_alloc_trace+0x685/0x760 [ 247.682843] kobject_uevent_env+0x387/0x101d [ 247.687379] kobject_uevent+0x20/0x26 [ 247.691212] __loop_clr_fd+0x4ee/0xd70 [ 247.695162] lo_ioctl+0x373/0x20e0 [ 247.698898] ? __save_stack_trace+0x99/0x100 [ 247.703438] ? lo_rw_aio+0x1470/0x1470 [ 247.707744] blkdev_ioctl+0xc38/0x1ab6 [ 247.711649] ? blkpg_ioctl+0xa90/0xa90 [ 247.715643] ? save_stack+0xa9/0xd0 [ 247.719299] ? __fget+0x340/0x540 [ 247.722781] block_ioctl+0xee/0x130 [ 247.726422] ? blkdev_fallocate+0x410/0x410 [ 247.730855] do_vfs_ioctl+0xd5f/0x1380 [ 247.734968] ? selinux_file_ioctl+0x46f/0x5e0 [ 247.739488] ? selinux_file_ioctl+0x125/0x5e0 [ 247.744009] ? ioctl_preallocate+0x210/0x210 [ 247.748629] ? selinux_file_mprotect+0x620/0x620 [ 247.753601] ? iterate_fd+0x360/0x360 [ 247.757597] ? kfree+0x170/0x220 [ 247.761161] ? kfree+0x170/0x220 [ 247.764543] ? lockdep_hardirqs_on+0x415/0x5d0 [ 247.769328] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 247.774975] ? security_file_ioctl+0x8d/0xc0 [ 247.779582] ksys_ioctl+0xab/0xd0 [ 247.783192] __x64_sys_ioctl+0x73/0xb0 [ 247.787229] do_syscall_64+0xfd/0x620 [ 247.791053] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.796694] RIP: 0033:0x459d67 [ 247.799906] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.818838] RSP: 002b:00007f9b288aea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 247.827125] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 0000000000459d67 [ 247.834815] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 247.842364] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 06:05:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000109000000000000008973f20000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0016001800010014000b000000000000000000000000000000000008001b0000000000"], 0x44}}, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = mq_open(&(0x7f0000001380)='eth0\x00', 0x40, 0xfb, 0x0) close(r3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f0000000180)) mq_unlink(&(0x7f0000000140)='eth0\x00') [ 247.850166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 247.857473] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:19 executing program 5 (fault-call:0 fault-nth:98): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:19 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x4], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 248.007502] FAT-fs (loop5): bogus number of reserved sectors [ 248.014379] FAT-fs (loop5): Can't find a valid FAT filesystem [ 248.088051] FAULT_INJECTION: forcing a failure. [ 248.088051] name failslab, interval 1, probability 0, space 0, times 0 [ 248.117840] CPU: 1 PID: 13050 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 248.125436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.135256] Call Trace: [ 248.137876] dump_stack+0x172/0x1f0 [ 248.141616] should_fail.cold+0xa/0x1b [ 248.145626] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 248.150777] ? lock_downgrade+0x880/0x880 [ 248.155052] __should_failslab+0x121/0x190 [ 248.159616] should_failslab+0x9/0x14 [ 248.163631] kmem_cache_alloc_trace+0x2cc/0x760 [ 248.168435] kobject_uevent_env+0x387/0x101d [ 248.172869] kobject_uevent+0x20/0x26 [ 248.176687] __loop_clr_fd+0x4ee/0xd70 [ 248.180683] lo_ioctl+0x373/0x20e0 [ 248.184325] ? __save_stack_trace+0x99/0x100 [ 248.188846] ? lo_rw_aio+0x1470/0x1470 [ 248.192777] blkdev_ioctl+0xc38/0x1ab6 [ 248.196694] ? blkpg_ioctl+0xa90/0xa90 [ 248.200712] ? save_stack+0xa9/0xd0 [ 248.204361] ? __fget+0x340/0x540 [ 248.207935] block_ioctl+0xee/0x130 [ 248.211595] ? blkdev_fallocate+0x410/0x410 [ 248.216039] do_vfs_ioctl+0xd5f/0x1380 [ 248.219946] ? selinux_file_ioctl+0x46f/0x5e0 [ 248.224610] ? selinux_file_ioctl+0x125/0x5e0 [ 248.229146] ? ioctl_preallocate+0x210/0x210 [ 248.233672] ? selinux_file_mprotect+0x620/0x620 [ 248.238539] ? iterate_fd+0x360/0x360 [ 248.242354] ? kfree+0x170/0x220 [ 248.245851] ? kfree+0x170/0x220 [ 248.249508] ? lockdep_hardirqs_on+0x415/0x5d0 [ 248.254201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 248.259759] ? security_file_ioctl+0x8d/0xc0 [ 248.264217] ksys_ioctl+0xab/0xd0 [ 248.267688] __x64_sys_ioctl+0x73/0xb0 [ 248.271823] do_syscall_64+0xfd/0x620 [ 248.275642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.281015] RIP: 0033:0x459d67 [ 248.284256] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.303476] RSP: 002b:00007f9b288aea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 248.311304] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 0000000000459d67 [ 248.318672] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 248.326214] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 [ 248.333578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 248.341812] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:21 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)={0x28}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x40049409, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="00e69600fca9e69643cbe284b2"], 0xd) fallocate(r3, 0x3, 0x0, 0x8020003) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYBLOB], 0x2}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={0xfffffffffffffffe, 0x0, &(0x7f00000005c0)={&(0x7f00000003c0)={0xa8, 0x0, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xce43}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000000}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x380}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER={0x4}]}, 0xa8}}, 0x4000021) close(r2) mq_unlink(&(0x7f0000000140)='eth0\x00') 06:05:21 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:21 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:21 executing program 5 (fault-call:0 fault-nth:99): syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 250.195389] FAULT_INJECTION: forcing a failure. [ 250.195389] name failslab, interval 1, probability 0, space 0, times 0 06:05:21 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x2], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 250.278777] CPU: 1 PID: 13059 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 250.285853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.295404] Call Trace: [ 250.298031] dump_stack+0x172/0x1f0 [ 250.301696] should_fail.cold+0xa/0x1b [ 250.305618] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 250.310843] ? lock_downgrade+0x880/0x880 [ 250.315039] __should_failslab+0x121/0x190 [ 250.319296] should_failslab+0x9/0x14 [ 250.319315] kmem_cache_alloc_trace+0x2cc/0x760 [ 250.319333] ? enable_ptr_key_workfn+0x30/0x30 [ 250.319350] ? reacquire_held_locks+0xb7/0x3e0 [ 250.319363] ? sget_userns+0x208/0xd30 [ 250.319379] ? vfat_rename.cold+0x5c/0x5c [ 250.332607] fat_fill_super+0xcf/0x3900 [ 250.332624] ? vsnprintf+0x32a/0x19a0 [ 250.332644] ? pointer+0x970/0x970 [ 250.332657] ? fat_flush_inodes+0x1a0/0x1a0 [ 250.332674] ? up_write+0x1c/0x150 [ 250.364935] ? snprintf+0xbb/0xf0 [ 250.368385] ? vsprintf+0x40/0x40 [ 250.371986] ? wait_for_completion+0x440/0x440 [ 250.376655] ? ns_test_super+0x50/0x50 [ 250.380540] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 250.386781] ? set_blocksize+0x2bf/0x340 [ 250.390936] msdos_fill_super+0x2f/0x40 [ 250.394910] mount_bdev+0x304/0x3c0 [ 250.398536] ? msdos_mount+0x40/0x40 [ 250.402264] msdos_mount+0x35/0x40 [ 250.405821] mount_fs+0xa8/0x31f [ 250.409280] vfs_kern_mount.part.0+0x6f/0x410 [ 250.413886] do_mount+0x53e/0x2bc0 [ 250.417449] ? copy_mount_string+0x40/0x40 [ 250.421792] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.427421] ? copy_mount_options+0x280/0x3a0 [ 250.431952] ksys_mount+0xdb/0x150 [ 250.435507] __x64_sys_mount+0xbe/0x150 [ 250.439493] do_syscall_64+0xfd/0x620 [ 250.443308] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.448585] RIP: 0033:0x45c94a [ 250.451775] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 250.471120] RSP: 002b:00007f9b288aea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:05:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x40086602, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 250.478915] RAX: ffffffffffffffda RBX: 00007f9b288aeb40 RCX: 000000000045c94a [ 250.486280] RDX: 00007f9b288aeae0 RSI: 0000000020000100 RDI: 00007f9b288aeb00 [ 250.493747] RBP: 0000000000000000 R08: 00007f9b288aeb40 R09: 00007f9b288aeae0 [ 250.501197] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 250.508548] R13: 00000000004c94e4 R14: 00000000004e0bf0 R15: 0000000000000003 06:05:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x4], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:22 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = semget$private(0x0, 0x3, 0x9) semctl$GETALL(r4, 0x0, 0xd, &(0x7f0000000180)=""/92) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fec000/0x14000)=nil, &(0x7f0000000200)="21d3ab98b554f232a956dee21e54f6d9dfce134e7fbdbb0558ccdaccf9d5ec245d49", 0x22, r5}, 0x4f) mq_unlink(&(0x7f00000000c0)='wlan0%.s\x00\x00\x00\x00\x01\x00\x00\x00rtrusted\x00') syz_open_procfs(0x0, &(0x7f0000000040)='net/udplite\x00') 06:05:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c001600180001001400020e000000000000000000000000000000de9b9ae2221c054100"], 0x44}}, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000000c0)=0x3, 0x4) r3 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r3) mq_unlink(&(0x7f0000000140)='eth0\x00') [ 250.687363] FAT-fs (loop5): bogus number of reserved sectors [ 250.724482] FAT-fs (loop5): Can't find a valid FAT filesystem [ 250.766008] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 250.798982] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 06:05:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x40087602, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:22 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='\nsdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) mq_unlink(&(0x7f0000000140)='eth0\x00') r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$rose(r2, 0x104, 0x4, &(0x7f0000000040)=0x3b16, 0x4) 06:05:22 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:22 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x3, 0x3f, 0x2, 0x8, 0x0, 0x0, 0x108c0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x2000, 0x7fff, 0x2, 0x8, 0x3ff, 0x2, 0x4}, r1, 0xb, r3, 0x0) r4 = gettid() tkill(r4, 0x1000000000013) getpgid(r4) r5 = gettid() tkill(r5, 0x1000000000013) rt_tgsigqueueinfo(r5, r0, 0x18, &(0x7f0000000080)={0x0, 0x0, 0x6}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_DIRTY_TLB(r9, 0x4010aeaa, &(0x7f00000001c0)={0x3c78, 0x4}) r10 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0xc0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="7e382d7f72e5f9ca99df5f2333ce4070e173bb2f82543c5e9dbe57317261af15af44df91b8f3937704e0a965638fd099e9daaeb6599c9ae84ae366e24b9fa6227e87dd645d38334d2e0bd4f117a9034fda579ddfa3d4cabfdca49a47004eb83e77bf4f09", 0x64, 0xfffffffffffffff9) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate(0xc, r2, &(0x7f0000000180)=ANY=[@ANYBLOB="75706461746520656372797074667320747275737465643a6e6f6465762e3670726f63637075736574657468302acf385d372700"], 0x34, r3) r4 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r4) read$rfkill(r1, &(0x7f0000000240), 0x8) mq_unlink(&(0x7f0000000140)='eth0\x00') 06:05:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4008ae61, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:22 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='%sdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:23 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4008ae6a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:23 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='m\ndos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:23 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:23 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:23 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, 0x0, &(0x7f00000000c0)) 06:05:25 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000040)={0x1, 0xb673}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:25 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='m\"dos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:25 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x44000, 0x0) r2 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x2bd, 0x628001) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/s\xe8\xffinux/poli\xcf\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r4, 0xc0585609, &(0x7f00000001c0)={0x400, 0x0, 0x4, 0x800, {0x77359400}, {0x2, 0x8, 0x0, 0x81, 0x7, 0x6, "05e1cfd0"}, 0xfffffa5b, 0x4, @fd=r5, 0x4}) r6 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r6) mq_unlink(&(0x7f0000000140)='eth0\x00') socket$inet6(0xa, 0x3, 0x6) 06:05:25 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, 0x0, &(0x7f00000000c0)) 06:05:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xffffffff) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) mq_unlink(&(0x7f0000000140)='eth0\x00') 06:05:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4010ae68, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:26 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='m#dos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000080)={0x8, 0x9, 0x4, 0x400000, {0x77359400}, {0x1, 0x2, 0x7a, 0x19, 0x4, 0x2, "f03a954e"}, 0xfffffc01, 0x1, @fd=r2, 0x4}) r3 = dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r3, 0x110, 0x4, &(0x7f0000000100)=0x2, 0x4) recvfrom$x25(r5, &(0x7f0000000180)=""/179, 0xb3, 0x41, &(0x7f0000000000)={0x9, @remote={[], 0x2}}, 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r8 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r8) mq_unlink(&(0x7f0000000140)='eth0\x00') 06:05:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4020940d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:26 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='m%dos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000280)={0x2}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) wait4(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='oom_score_adj\x00') unshare(0x8020000) setns(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mq_unlink(&(0x7f0000000140)='eth0\x00') 06:05:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:26 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, 0x0, &(0x7f00000000c0)) 06:05:26 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = msgget$private(0x0, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_G_AUDOUT(r9, 0x80345631, &(0x7f0000000280)) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r10, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r10}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r11 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r12, 0x0, 0x0) fchown(r6, r10, r12) msgsnd(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000011ac58d0cafec4cdf08b78e63b8b3529ae2f7d7109fdaf66b43546f95f537428ef900b89a95392022dcddff232e5b9440d6e836b5a015ac789ca652739798bb92421525f2b7c7aeb96349783e559a29c7c1b4199ab5d7f4f929a73d20a38ec1927d8f03460b23302a6a92755eafc8edb5ae7af6d792b698f3e6dd402327bc872371f68c492b3ff35c225fc7db1573ac3bd2318d1af58aa291518096ed"], 0x93, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:26 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='m*dos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:26 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:27 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4020ae76, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00009, 0x0, 0x0, 0x0, 0x2000000000002) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) 06:05:27 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='m+dos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:27 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, 0x0) 06:05:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) mlockall(0x2) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) r3 = creat(&(0x7f0000001380)='./file0\x00', 0x0) r4 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) ftruncate(r4, 0x2081ff) getsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00000001c0)=""/155, &(0x7f0000000040)=0x9b) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) fcntl$setstatus(r5, 0x4, 0x46600) r7 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, r7) r8 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x7f, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r10, &(0x7f0000000400)={0x2000}) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000300)="323e8cf8a3a3ab6c717388187b22e3338a7dd2ec85c8e3e2e7b8f9b2fc8d14b6faed7d6eddacf420eef4", 0x2a, r7) io_submit(r6, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000000380)=0x80, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000000)={0x0, r3}) 06:05:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4020aea5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:27 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='m,dos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:27 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) rt_tgsigqueueinfo(0x0, 0x0, 0xf, &(0x7f0000000080)={0xfffffffe}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40100, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r4, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={r4, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x0, 0xc809, 0xf4, 0xa4}, 0x98) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0xd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, &(0x7f0000000100)=""/236) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ptrace(0x10, 0x0) 06:05:27 executing program 1: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = msgget$private(0x0, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_G_AUDOUT(r9, 0x80345631, &(0x7f0000000280)) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r10, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r10}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r11 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r12, 0x0, 0x0) fchown(r6, r10, r12) msgsnd(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000011ac58d0cafec4cdf08b78e63b8b3529ae2f7d7109fdaf66b43546f95f537428ef900b89a95392022dcddff232e5b9440d6e836b5a015ac789ca652739798bb92421525f2b7c7aeb96349783e559a29c7c1b4199ab5d7f4f929a73d20a38ec1927d8f03460b23302a6a92755eafc8edb5ae7af6d792b698f3e6dd402327bc872371f68c492b3ff35c225fc7db1573ac3bd2318d1af58aa291518096ed"], 0x93, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x80086601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:27 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='m-dos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:28 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='m.dos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:28 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, 0x0) 06:05:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x80087601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:28 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='m0dos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:28 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) bind$can_raw(0xffffffffffffffff, &(0x7f0000000000), 0x10) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x1ac97adbd61d8d6d) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000001c0)={@local, 0x70}) socketpair$unix(0x1, 0x9, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0xc0045878, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:28 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='mXdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 257.099420] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:28 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='mcdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 257.348328] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0xc0045878, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:29 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='mddos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:29 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, 0x0) 06:05:29 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r2 = getpid() r3 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r3) rt_tgsigqueueinfo(r2, r2, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace(0x10, r2) 06:05:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 257.852316] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0xc008ae67, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:29 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='midos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 258.079105] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:29 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='mldos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0xc00caee0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 258.466420] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:30 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='modos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0xc0189436, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:30 executing program 4 (fault-call:6 fault-nth:0): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:30 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r2) r3 = gettid() tkill(r3, 0x1000000000013) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) epoll_create1(0x180000) ioprio_set$pid(0x2, r3, 0x200) keyctl$get_keyring_id(0x0, r2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ptrace(0x10, r0) [ 258.764798] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0xc020660b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:30 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='mpdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 258.864066] ptrace attach of "/root/syz-executor.3"[15257] was attempted by "/root/syz-executor.3"[15302] 06:05:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 258.966060] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x80ffff, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:30 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x2, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:30 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='mudos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 259.218917] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x4, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:31 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:31 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='mxdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0xffff8000, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:31 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x10001, 0x2000) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) [ 259.690951] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:31 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='ms\nos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x80ffff00000000, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 259.943915] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:31 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 260.134630] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:32 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x2, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:32 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='ms%os\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2000}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:32 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 260.501444] cgroup: fork rejected by pids controller in /syz3 06:05:32 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) syz_mount_image$nfs(&(0x7f0000000200)='nfs\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000280)="5e08da6b850c901f30446fec60d285253ad02cfd46abb4c6f89b491a98e88c905a", 0x21, 0x9}, {0x0, 0x0, 0x371}, {&(0x7f00000002c0)="ae27afcb15a03179ee5e2e01540b1e353cdbfe5a2f94d892e49f9b4373de50d6da70ac6f2e17eb142577e527b1570704c3c09afff292f2ded07ac4a5a703a2744a08145695b68679d4a49173dfd4e8f0bf02f363d9d7f8a20b7f27918848b4acc89f075e7aaaf7d652d6656b952586af40dcd69fd0b7f3654130b65080774161480bd62a3486ae4b084be774667986757d4fc9fd517224d60ed81603f4c3f3f5ef1608c5f9186003c48b89ab1699c1216597964c5e5519911615a1d43ca13a3f1a6a0bc1d383da397188c1", 0xcb, 0xc6}, {&(0x7f00000003c0)="aaaa35c7c06b2d9e8bb55ec6a20e3679177aabaefba872568374ea057217450a2fc2fbf07338eae3ac5a75bb6dc4314c4f2d124c0c0917", 0x37, 0x20}, {&(0x7f0000000400)="ea1fc26ae9a7b3112c5f9d6dcf2d76f4cb1b5571be9a8aa1ee6a338efb3c286ab4b75964c9986da59db7b5cc5a31482152fe5f1c4bc691095e0783aaa4ad6995e8cb97b600256b5c2aa49067408363a1da73622c44893caa93cc5eb9def43aa846435d3b8b5781a0a083edc4216c39ba88cbfe2ab249d56a23e4249000b58768ccb12fda72903f0d4dad0d707f06ae3f2c2aa33a37a939b478fda19f2aae5bbbc35bd5b4f58ced0139986b8b4a45c168ab84a85cb151c611cc191ce8225d03f60190057eda1b411211", 0xc9, 0x7ff}, {&(0x7f0000000500)="248e90cab678f576f261266ee699a42443ac99f38a57c4962e5addbdc7771e", 0x1f, 0x9}, {&(0x7f0000000540)="4c5d89dca5", 0x5, 0x401}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="e52b2ed6961d94c2ddbf708ea147c9a6fa7667ca15c134d6724bce7372920e7a45d84660bacd879563306f9bbcbb848f1bd96b8438", 0x35, 0x5}, {&(0x7f00000015c0)="fd80f87c5af26d67adbcecd191c384c5c3ffefd1cc744939a1b879f3fafecbb3e415f9fe351a1fc850e8595da2c131f1c94e01da0b936a8a9327ba1940907e492a4cef3560dbe31b202ea0d71f18fd58d9ba3e69e44893cc39a01e647f3b6bbae3db2ec84068654691cf482ebd1420627357ca0240856982096669f835f7aa5ac1b0b1d427caf0821b862d2bf0a3c1ce550a88c383353d5ac5e63df39ba00b5725b634a67af50f33c26abe8f6f5e84f4ce7aaa355a8ac862e6b64d387026437a19b1f8ff9342fba6e1b65b7a84a26ed3e5b3a08abb404f965109b3ce7a43656f9f7997c16555d44f0b7ed6ae52a4642f5577e890466c", 0xf6, 0x7f}], 0x2000, &(0x7f00000017c0)='(([)-#selfGPL,\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_tcp_buf(r2, 0x6, 0x1a, &(0x7f0000000100)=""/223, &(0x7f0000000040)=0xdf) r3 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r3) rt_tgsigqueueinfo(r0, r0, 0x17, &(0x7f0000001800)={0x0, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace(0x10, r0) [ 260.576118] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:32 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x34000}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:32 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='ms.os\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x80ffff, 0xffffffffffffffff, 0xd}) 06:05:32 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4000, 0x0) ioctl$EVIOCSABS20(r4, 0x401845e0, &(0x7f0000000100)={0xb3, 0x40, 0x4, 0x226, 0x3a, 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) [ 260.824983] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 261.032496] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:33 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() getpgrp(0xffffffffffffffff) r1 = gettid() tkill(r1, 0x1000000000013) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x400300}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0xffff8000, 0xffffffffffffffff, 0xd}) 06:05:33 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='ms/os\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:33 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x3, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 261.467024] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1000000}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:33 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msd\ns\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) write$FUSE_LK(r1, &(0x7f0000000040)={0x28, 0x0, 0x3, {{0x6, 0x5, 0x3, 0xffffffffffffffff}}}, 0x28) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 261.702431] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2000000}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:33 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msd\"s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:36 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000040)) ptrace(0x10, r0) 06:05:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x7000, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:36 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4000000}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:36 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msd%s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:36 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x4, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 264.513716] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:36 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x20000000}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:36 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msd,s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:36 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) clock_getres(0x6, &(0x7f0000000040)) 06:05:36 executing program 3: clone(0x80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:36 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80ffffff}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 264.788193] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:36 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ptrace(0x10, r0) 06:05:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r5, 0xc0a85322, &(0x7f0000000180)) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:36 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffffff7f}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:36 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdo\n\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 265.053645] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:36 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x6, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:36 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = gettid() tkill(r2, 0x1000000000013) rt_tgsigqueueinfo(r0, r2, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:36 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffffff80}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x211000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x2800, 0x0, 0x0, 0xffffffffffffffff, 0xe}) 06:05:36 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdo\"\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:37 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) r7 = dup3(0xffffffffffffffff, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, &(0x7f0000000200)=0xe8) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f0000000380)={r10, 0x1, 0x6, @remote}, 0x10) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r6}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x1, 0x8}, {0xe3, 0x7b}], r6}, 0x18, 0x1) prctl$PR_GET_SECCOMP(0x15) r11 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) getsockopt$inet6_tcp_int(r11, 0x6, 0x9, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 265.386222] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:37 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdo#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:37 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x7, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 265.643099] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:37 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x7, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:39 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xfffffffffffffff9, 0x2000) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x2}) ptrace(0x10, r0) 06:05:39 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdo%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:39 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x8, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000100)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) r8 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r9, 0x0, 0x0) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r11, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r11}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r13, 0x0) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r13}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r14 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r15, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r15}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x100048, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, r9}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4f0c}}, {@default_permissions='default_permissions'}], [{@fowner_lt={'fowner<', 0xee00}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', r11}}, {@uid_eq={'uid', 0x3d, r13}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@hash='hash'}, {@uid_lt={'uid<', r15}}, {@fsname={'fsname', 0x3d, '/em1'}}]}}) r16 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r16, 0xd}) 06:05:39 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x8, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:40 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x9, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 268.441818] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:40 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x8040, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) execveat(r3, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000180)='/dev/urandom\x00', &(0x7f00000001c0)='/dev/urandom\x00', &(0x7f0000000200)='/dev/urandom\x00'], &(0x7f0000000300)=[&(0x7f0000000280)='/dev/urandom\x00', &(0x7f00000002c0)='/dev/urandom\x00'], 0x1000) r4 = dup(r2) socket$inet6(0xa, 0x6, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents64(r2, &(0x7f0000000000)=""/18, 0x12) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 06:05:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:40 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdo*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:40 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x17, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 268.672185] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:40 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000200)={{0x7f, 0x8}, {0x5, 0x7}, 0x7f, 0x5, 0x6}) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000100)={0xf, 0x5, 0x2, 0xfff80000, 0x4, [{0x100, 0x81, 0x6641, 0x0, 0x0, 0x802}, {0x7d000000, 0x4, 0x3ff, 0x0, 0x0, 0x2}, {0x1, 0x10000, 0x1}, {0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x18d083a347074b7d}]}) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r5, 0x4008af00, &(0x7f0000000040)=0x100000000) ptrace(0x10, r0) 06:05:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)={0xfffffc27}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x10000, 0x0, 0x0, r3, 0xd}) 06:05:40 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x18, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:40 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdo+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 268.936944] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:40 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:40 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2010000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x2c, r2, 0x400, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'ipddp0\x00'}}}, ["", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000900}, 0x400) r3 = getpid() r4 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r4) r5 = gettid() tkill(r5, 0x1000000000013) rt_tgsigqueueinfo(r3, r5, 0x10000000016, &(0x7f0000000080)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x3, 0x9, 0x5, 0x2}, &(0x7f00000001c0)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x2bc}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r3, r9, 0x0, 0x4, &(0x7f0000000040)='$*^\x00', r10}, 0x30) ptrace(0x10, r3) 06:05:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:40 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x1a, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x100, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) kcmp$KCMP_EPOLL_TFD(r2, 0x0, 0x7, r3, &(0x7f00000000c0)={r4, r5, 0x7}) 06:05:40 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdo,\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 269.285928] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 269.314233] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:41 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r3, 0xd}) 06:05:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:41 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdo-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:41 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:41 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0xa, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:43 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x1001f, &(0x7f0000000080)={0xfffffffd, 0x0, 0x4}) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4, 0x1, &(0x7f0000000280)=[{&(0x7f0000000240)="5d5fb858ca4cd5aa00879707f0e6d17cd7dd107148855d1122ce6b41612dd4e88b4aabfb588787ad7ce40cfae3bfc146c2b58634892f4add821eda", 0x3b, 0x6}], 0x8000, &(0x7f00000002c0)={[{@part={'part', 0x3d, 0x17}}, {@quiet='quiet'}], [{@fsmagic={'fsmagic', 0x3d, 0x7}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x1) 06:05:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x4, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/kvm\x00', 0x80000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:43 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdo.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:43 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0xb, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 272.394831] hfs: unable to parse mount options 06:05:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:44 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdo0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:44 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) r1 = getpid() r2 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) rt_tgsigqueueinfo(r1, r1, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r1) 06:05:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x2, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 272.671040] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 06:05:44 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000040)=0x80) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000180)={0xeef, 0x713b2a79b169dbf, 0x5, 0x6, 0x6}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:44 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdoX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x4, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @host}, 0x10) 06:05:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:44 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0xc, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:44 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) ptrace(0x10, r0) 06:05:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6d718d3, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f00000000c0)={0x0, 0x0, 0x300, 0x4, {0x0, 0x8, 0x7}}) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/seli\t\x00\x00\x00status\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0xf000, 0x0, 0x0, r3, 0x1}) 06:05:44 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdoc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:05:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x2, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:44 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x5, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) r2 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) epoll_create(0x800) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:45 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdod\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 273.389253] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x4, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:45 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_pts(r4, 0x2000) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace(0x10, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) r7 = dup2(r4, r6) ioctl$sock_inet_SIOCRTMSG(r7, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e21, @local}, 0x100, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000100)='batadv0\x00', 0x6554807e, 0x5, 0xab}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000040)={0x2}, 0x1) 06:05:45 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0xd, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:45 executing program 1: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000200)={{0x7f, 0x8}, {0x5, 0x7}, 0x7f, 0x5, 0x6}) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000100)={0xf, 0x5, 0x2, 0xfff80000, 0x4, [{0x100, 0x81, 0x6641, 0x0, 0x0, 0x802}, {0x7d000000, 0x4, 0x3ff, 0x0, 0x0, 0x2}, {0x1, 0x10000, 0x1}, {0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x18d083a347074b7d}]}) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r5, 0x4008af00, &(0x7f0000000040)=0x100000000) ptrace(0x10, r0) 06:05:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) fsetxattr(r2, &(0x7f0000000000)=@random={'trusted.', 'n/\'\x00'}, &(0x7f0000000040)='/dev/kvm\x00', 0x9, 0x1) 06:05:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x2000, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:45 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdoi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:45 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) r2 = accept4$rose(0xffffffffffffffff, &(0x7f0000000380)=@full={0xb, @dev, @bcast, 0x0, [@default, @netrom, @rose, @netrom, @rose, @default]}, &(0x7f00000003c0)=0x40, 0x1c1800) r3 = gettid() tkill(r3, 0x1000000000013) fcntl$setown(r2, 0x8, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0xcc, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0x6, @rand_addr="6d3088a4d6595f724c1763033fcb3c1b", 0x2}, @in6={0xa, 0x4e23, 0xffffff3c, @empty, 0x3}, @in6={0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, [], 0x15}, 0x8}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e23, 0xb7, @local, 0x4}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}, @in6={0xa, 0x4e20, 0x0, @rand_addr="cf786353677b5db070a9d790a190fe5b", 0x8}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000300)={r6, 0x7c, &(0x7f0000000280)=[@in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e21, 0x8, @empty, 0x6000000}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e21, @rand_addr=0x20}]}, &(0x7f0000000340)=0x10) ptrace(0x10, r0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200000, 0x0) 06:05:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0xa, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:45 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdol\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000000)={0x0, 0x0, 0x2, 0xffffffffffffffff, 0xd}) 06:05:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:05:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x2, @multicast1}}]}, 0x50}}, 0x0) 06:05:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x802, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, &(0x7f0000000040)={0x40, 0x8, &(0x7f00000000c0)="6618fe5601d5b3ad7d12bdab24723116e40dd6b5cacc912470faa852f5531aff7320865257485c9a8c16a5da84369f94186e27f497169afda0bea33e9f79de689e72feffc1ef008708841b88a42994189f32794d7aca0bcddd7ec29020a0", {0x81, 0x4, 0x0, 0x12, 0x80, 0x10000, 0xb, 0x9}}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:46 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0xe, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:46 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdoo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4, @multicast1}}]}, 0x50}}, 0x0) 06:05:46 executing program 2: r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e, 0x80000) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x28100, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/Z\xd3\xd8\xa5!\xa1I]\x84vc\x95b\xdd&mJj\xe7at\x9f\xa6', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000180)={0x0, 0x0, 0x0, r3, 0xd}) 06:05:46 executing program 1: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000200)={{0x7f, 0x8}, {0x5, 0x7}, 0x7f, 0x5, 0x6}) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000100)={0xf, 0x5, 0x2, 0xfff80000, 0x4, [{0x100, 0x81, 0x6641, 0x0, 0x0, 0x802}, {0x7d000000, 0x4, 0x3ff, 0x0, 0x0, 0x2}, {0x1, 0x10000, 0x1}, {0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x18d083a347074b7d}]}) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r5, 0x4008af00, &(0x7f0000000040)=0x100000000) ptrace(0x10, r0) 06:05:48 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) rt_tgsigqueueinfo(0x0, 0x0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x10, 0x0) 06:05:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/vm\x00\x00\xf1B\x83\x04', 0x140003, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000040)) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x7, 0x20d, 0x9, 0x5, r4}, &(0x7f00000001c0)=0x10) r5 = creat(&(0x7f0000000200)='./file0\x00', 0x8) fcntl$notify(r5, 0x402, 0x8000002c) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x8, 0x0, 0x1, 0xffffffffffffffff, 0xd}) 06:05:48 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x2000, @multicast1}}]}, 0x50}}, 0x0) 06:05:48 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdop\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:48 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 06:05:48 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0xf, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 277.161045] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_NMI(r2, 0xae9a) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:48 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000002}}]}, 0x50}}, 0x0) 06:05:48 executing program 1 (fault-call:3 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:05:49 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdou\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:49 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x101080, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000140)=0x2, 0x4) r2 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) umount2(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000008}}]}, 0x50}}, 0x0) 06:05:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in6=@mcast2, 0x0, 0x4, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xffffffffffffffc6, 0x6000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x9, 0x5}, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0xd, 0x200, 0x7fff}, &(0x7f0000000200)=0x9bd, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x5}}, 0x10) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000000c0)={0x2, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="000400"}, {0x2, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}}}, 0x48) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r5, 0x4040ae79, &(0x7f0000000540)={0x10002, &(0x7f0000000500), 0x2, r1, 0x1}) r6 = request_key(&(0x7f0000000580)='id_resolver\x00', &(0x7f00000005c0)={'syz', 0x1}, &(0x7f0000000600)='/dev/kvm\x00', 0xfffffffffffffffb) keyctl$invalidate(0x15, r6) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 277.476693] FAULT_INJECTION: forcing a failure. [ 277.476693] name failslab, interval 1, probability 0, space 0, times 0 [ 277.531189] CPU: 1 PID: 20255 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 277.538347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.547812] Call Trace: [ 277.550521] dump_stack+0x172/0x1f0 [ 277.554189] should_fail.cold+0xa/0x1b [ 277.558208] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 277.563448] ? lock_downgrade+0x880/0x880 [ 277.567641] __should_failslab+0x121/0x190 [ 277.571913] should_failslab+0x9/0x14 [ 277.576094] __kmalloc+0x2e2/0x750 [ 277.579661] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 277.585223] ? fput+0x128/0x1a0 [ 277.588736] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 277.594300] ? strnlen_user+0x15f/0x1e0 [ 277.598399] ? __x64_sys_memfd_create+0x13c/0x470 [ 277.603306] __x64_sys_memfd_create+0x13c/0x470 [ 277.608621] ? memfd_fcntl+0x1a50/0x1a50 [ 277.612724] ? do_syscall_64+0x26/0x620 [ 277.616741] ? lockdep_hardirqs_on+0x415/0x5d0 [ 277.621355] ? trace_hardirqs_on+0x67/0x220 [ 277.625847] do_syscall_64+0xfd/0x620 [ 277.629778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.634994] RIP: 0033:0x459ef9 [ 277.638518] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.658188] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 277.666191] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459ef9 [ 277.673482] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bef97 06:05:49 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0xff) r1 = getpid() r2 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) rt_tgsigqueueinfo(r1, r1, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r1) [ 277.680776] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 277.688338] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fae6b80c6d4 [ 277.696249] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:05:49 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdox\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000300}}]}, 0x50}}, 0x0) 06:05:49 executing program 1 (fault-call:3 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:05:49 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000500)=0xe8) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="c40000001200020027bd7000fcdbdf2500000000", @ANYRES32=r5, @ANYBLOB="b3835f47000101000c000200e45e7ad4677b00000800050078e723440c0002000180c200000e000050001900080001000400000014000400054665af285e31813ac517827eecd61708000100fcffffff1400040053581c8f42712fef259d247d3e7dd3b3140002006272696467655f736c6176655f31000008002e000200000008001300", @ANYRES32, @ANYBLOB="080011000100000008000f00ffff000000000000000000000000000008000e001d000000"], 0xc4}}, 0x0) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f0000000040)={'bridge_slave_1\x00', 0x56d}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:49 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x10, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0xf}}, 0x0) [ 277.964258] FAULT_INJECTION: forcing a failure. [ 277.964258] name failslab, interval 1, probability 0, space 0, times 0 [ 278.058213] CPU: 0 PID: 20581 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 278.065284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.075353] Call Trace: [ 278.078088] dump_stack+0x172/0x1f0 [ 278.081743] should_fail.cold+0xa/0x1b [ 278.085668] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 278.090807] ? lock_downgrade+0x880/0x880 [ 278.095083] __should_failslab+0x121/0x190 [ 278.099450] should_failslab+0x9/0x14 [ 278.103368] kmem_cache_alloc+0x2ae/0x700 [ 278.107546] ? __alloc_fd+0x44d/0x560 [ 278.111408] ? shmem_destroy_callback+0xc0/0xc0 [ 278.116105] shmem_alloc_inode+0x1c/0x50 [ 278.120200] alloc_inode+0x64/0x190 [ 278.123855] new_inode_pseudo+0x19/0xf0 [ 278.127950] new_inode+0x1f/0x40 [ 278.131351] shmem_get_inode+0x84/0x780 [ 278.135455] __shmem_file_setup.part.0+0x7e/0x2b0 [ 278.140332] shmem_file_setup+0x66/0x90 [ 278.144341] __x64_sys_memfd_create+0x2a2/0x470 [ 278.149042] ? memfd_fcntl+0x1a50/0x1a50 [ 278.153140] ? do_syscall_64+0x26/0x620 [ 278.157141] ? lockdep_hardirqs_on+0x415/0x5d0 [ 278.161835] ? trace_hardirqs_on+0x67/0x220 [ 278.166195] do_syscall_64+0xfd/0x620 [ 278.170021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.175236] RIP: 0033:0x459ef9 [ 278.178441] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.197457] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 06:05:49 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 278.205190] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459ef9 [ 278.212476] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bef97 [ 278.219761] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 278.227043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fae6b80c6d4 [ 278.234506] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:05:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) write$binfmt_elf32(r2, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x2, 0x9, 0x3, 0x80, 0x2, 0x3, 0x7, 0x3d7, 0x38, 0x1c6, 0x5, 0x0, 0x20, 0x2, 0x2, 0x6, 0x4}, [{0x5, 0x7fffffff, 0x2, 0x2, 0x6, 0x2, 0x7fffffff, 0x6}], "8c4357adaa63779c81a065e8adb7f65876355064efdcbba989c1c17a07bb3fdf", [[], [], [], [], [], []]}, 0x678) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000000c0)=0x4, 0x4) r5 = socket(0x3, 0x2, 0x5) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r5, 0x800443d2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 06:05:49 executing program 1 (fault-call:3 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 278.397102] FAULT_INJECTION: forcing a failure. [ 278.397102] name failslab, interval 1, probability 0, space 0, times 0 [ 278.408951] CPU: 1 PID: 20723 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 278.415920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.425942] Call Trace: [ 278.428569] dump_stack+0x172/0x1f0 [ 278.432423] should_fail.cold+0xa/0x1b [ 278.436432] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 278.441846] ? percpu_ref_put_many+0x94/0x190 [ 278.446399] __should_failslab+0x121/0x190 [ 278.450795] should_failslab+0x9/0x14 [ 278.454673] kmem_cache_alloc+0x2ae/0x700 [ 278.459026] ? map_id_range_down+0x1ee/0x370 [ 278.463549] ? __put_user_ns+0x70/0x70 [ 278.467603] selinux_inode_alloc_security+0xb6/0x2a0 [ 278.472727] security_inode_alloc+0x8a/0xd0 [ 278.477695] inode_init_always+0x56e/0xb40 [ 278.482050] alloc_inode+0x81/0x190 [ 278.485787] new_inode_pseudo+0x19/0xf0 [ 278.489787] new_inode+0x1f/0x40 [ 278.493176] shmem_get_inode+0x84/0x780 [ 278.497177] __shmem_file_setup.part.0+0x7e/0x2b0 [ 278.502040] shmem_file_setup+0x66/0x90 [ 278.506136] __x64_sys_memfd_create+0x2a2/0x470 [ 278.510828] ? memfd_fcntl+0x1a50/0x1a50 [ 278.514913] ? do_syscall_64+0x26/0x620 [ 278.518904] ? lockdep_hardirqs_on+0x415/0x5d0 [ 278.523502] ? trace_hardirqs_on+0x67/0x220 [ 278.527850] do_syscall_64+0xfd/0x620 [ 278.531672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.536870] RIP: 0033:0x459ef9 [ 278.540077] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.560474] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 278.568307] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459ef9 [ 278.575681] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bef97 [ 278.583781] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 06:05:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0xc0}}, 0x0) 06:05:50 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() get_thread_area(&(0x7f0000000040)={0x9, 0x20000000, 0xffffffffffffefff, 0x0, 0x0, 0x1, 0x1}) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000100)={0x23, 0x80, 0x7}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$rds(r5, &(0x7f0000000080)={0x2, 0x4e22, @multicast1}, 0x10) r6 = shmget(0x1, 0x2000, 0x20, &(0x7f0000ffd000/0x2000)=nil) shmat(r6, &(0x7f0000ffc000/0x4000)=nil, 0x2000) ptrace(0x10, r0) [ 278.591163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fae6b80c6d4 [ 278.598709] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:05:50 executing program 1 (fault-call:3 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:05:50 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x1, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) select(0x40, &(0x7f00000000c0)={0x1000, 0x1, 0xba2d, 0x1, 0x200, 0x1000}, &(0x7f0000000100)={0x1, 0xe1, 0x4, 0x401, 0x5, 0xf3c, 0xfffffffffffffff4, 0x1}, &(0x7f0000000140)={0x8, 0x23f, 0x80000001, 0x0, 0x6, 0xcc, 0x4, 0x4}, &(0x7f0000000180)={0x77359400}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x448000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:50 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x03', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:50 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x3) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) [ 278.781119] FAULT_INJECTION: forcing a failure. [ 278.781119] name failslab, interval 1, probability 0, space 0, times 0 [ 278.807824] CPU: 1 PID: 20935 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 278.814815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.824564] Call Trace: [ 278.824594] dump_stack+0x172/0x1f0 [ 278.824617] should_fail.cold+0xa/0x1b [ 278.824634] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 278.824655] ? percpu_ref_put_many+0x94/0x190 [ 278.844748] __should_failslab+0x121/0x190 [ 278.849002] should_failslab+0x9/0x14 [ 278.849020] kmem_cache_alloc+0x2ae/0x700 [ 278.849033] ? map_id_range_down+0x1ee/0x370 [ 278.849050] ? __put_user_ns+0x70/0x70 [ 278.849069] selinux_inode_alloc_security+0xb6/0x2a0 [ 278.849088] security_inode_alloc+0x8a/0xd0 [ 278.876607] inode_init_always+0x56e/0xb40 06:05:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x33fe0}}, 0x0) [ 278.880865] alloc_inode+0x81/0x190 [ 278.884513] new_inode_pseudo+0x19/0xf0 [ 278.888857] new_inode+0x1f/0x40 [ 278.892257] shmem_get_inode+0x84/0x780 [ 278.896299] __shmem_file_setup.part.0+0x7e/0x2b0 [ 278.901183] shmem_file_setup+0x66/0x90 [ 278.901204] __x64_sys_memfd_create+0x2a2/0x470 [ 278.901221] ? memfd_fcntl+0x1a50/0x1a50 [ 278.901235] ? do_syscall_64+0x26/0x620 [ 278.901253] ? lockdep_hardirqs_on+0x415/0x5d0 [ 278.909915] ? trace_hardirqs_on+0x67/0x220 [ 278.909938] do_syscall_64+0xfd/0x620 [ 278.909958] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.909970] RIP: 0033:0x459ef9 [ 278.909983] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.909991] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 278.910005] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459ef9 [ 278.910012] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bef97 [ 278.910024] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 278.918084] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fae6b80c6d4 [ 278.918094] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:05:50 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x11, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x8, 0x6}]}, 0xc, 0x2) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getpeername$unix(r3, &(0x7f0000000200), &(0x7f0000000280)=0x6e) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x10100, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) accept4$x25(r6, &(0x7f0000000440)={0x9, @remote}, &(0x7f0000000480)=0x12, 0x80800) getpeername$netrom(r4, &(0x7f0000000140)={{0x3, @rose}, [@bcast, @default, @rose, @bcast, @remote, @default, @null, @rose]}, &(0x7f00000001c0)=0x48) pselect6(0x40, &(0x7f00000002c0)={0xfffffffffffffc00, 0x6, 0x3f, 0xffffffff, 0x20, 0x7, 0x3f, 0x4}, &(0x7f0000000300)={0x6, 0x6, 0x2, 0x80000001, 0x4, 0x7f, 0x8, 0x80000000}, &(0x7f0000000340)={0x9, 0x4, 0x2, 0x401, 0x2, 0x8, 0x401, 0x52}, &(0x7f0000000380), &(0x7f0000000400)={&(0x7f00000003c0)={0x3}, 0x8}) 06:05:50 executing program 3: clone(0x6056c8fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x20002, 0x0) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f0000000140)) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x40841, 0x0) 06:05:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x20000050}}, 0x0) 06:05:50 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:50 executing program 1 (fault-call:3 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 279.237453] FAULT_INJECTION: forcing a failure. [ 279.237453] name failslab, interval 1, probability 0, space 0, times 0 [ 279.285852] CPU: 0 PID: 21034 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 279.293036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.302409] Call Trace: [ 279.305024] dump_stack+0x172/0x1f0 [ 279.308685] should_fail.cold+0xa/0x1b [ 279.312612] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 279.317837] ? lock_downgrade+0x880/0x880 [ 279.322200] __should_failslab+0x121/0x190 [ 279.326454] should_failslab+0x9/0x14 [ 279.330281] kmem_cache_alloc+0x2ae/0x700 [ 279.334481] __alloc_file+0x27/0x330 [ 279.338224] alloc_empty_file+0x72/0x170 [ 279.342303] alloc_file+0x5e/0x4d0 [ 279.345872] alloc_file_pseudo+0x189/0x280 [ 279.350621] ? alloc_file+0x4d0/0x4d0 [ 279.354442] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 279.360002] ? kasan_check_write+0x14/0x20 [ 279.364268] __shmem_file_setup.part.0+0x108/0x2b0 [ 279.369331] shmem_file_setup+0x66/0x90 [ 279.373373] __x64_sys_memfd_create+0x2a2/0x470 [ 279.378083] ? memfd_fcntl+0x1a50/0x1a50 [ 279.382157] ? do_syscall_64+0x26/0x620 [ 279.386530] ? lockdep_hardirqs_on+0x415/0x5d0 [ 279.391157] ? trace_hardirqs_on+0x67/0x220 [ 279.395527] do_syscall_64+0xfd/0x620 [ 279.399354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.404591] RIP: 0033:0x459ef9 [ 279.407810] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.426728] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 06:05:51 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @dev}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x16}, 0x5, r7}) ptrace(0x10, r0) [ 279.434726] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459ef9 [ 279.442205] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bef97 [ 279.449494] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 279.456877] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fae6b80c6d4 [ 279.464262] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:05:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x7ffff000}}, 0x0) 06:05:51 executing program 1 (fault-call:3 fault-nth:5): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:05:51 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x05', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x503ac1, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) msgget$private(0x0, 0x100) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000300)=0xffffffff, 0x4) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000440)='trusted.overlay.redirect\x00', &(0x7f0000000480)='./file0\x00', 0x8, 0x1) recvfrom(r2, &(0x7f0000000200)=""/74, 0x4a, 0x200, &(0x7f0000000280)=@l2={0x1f, 0x3ff, {0x37, 0x1, 0x64, 0x0, 0xff}, 0x7f, 0x7d}, 0x80) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd836071b9a688929}) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000340)={0x1, 0x0, [0x3ff, 0x4ee789ed, 0x30, 0x8, 0x0, 0x81, 0x150, 0x2]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$FUSE_LSEEK(r6, &(0x7f0000000500)={0x18, 0x0, 0x6, {0xd16}}, 0x18) r7 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video35\x00', 0x2, 0x0) r8 = syz_open_dev$adsp(&(0x7f0000000180)='\x05\x00\x94\x00\xd3\xba\xa9\x02\xcaDv', 0x20000000087, 0xdf2109b921b9e6b4) ioctl$VIDIOC_EXPBUF(r7, 0xc0405610, &(0x7f00000001c0)={0x1, 0x2, 0x1, 0x8c400, r8}) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000003c0)=0x20, &(0x7f0000000400)=0x2) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x401, 0x0) accept4$nfc_llcp(r9, &(0x7f00000000c0), &(0x7f0000000040)=0x60, 0x800) 06:05:51 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$getown(r3, 0x9) rt_tgsigqueueinfo(r4, r1, 0x24, &(0x7f0000000100)={0x38, 0x80000000, 0x3f}) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x80004001fe) ioctl$VHOST_NET_SET_BACKEND(r8, 0x4008af30, &(0x7f0000000040)={0x0, r10}) ptrace(0x10, r0) [ 279.630477] FAULT_INJECTION: forcing a failure. [ 279.630477] name failslab, interval 1, probability 0, space 0, times 0 [ 279.669167] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 279.693871] CPU: 0 PID: 21248 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 279.700852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.701473] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 279.710227] Call Trace: [ 279.710259] dump_stack+0x172/0x1f0 [ 279.710281] should_fail.cold+0xa/0x1b [ 279.710298] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 279.710315] ? lock_downgrade+0x880/0x880 [ 279.710336] __should_failslab+0x121/0x190 [ 279.710350] should_failslab+0x9/0x14 [ 279.710363] kmem_cache_alloc+0x2ae/0x700 [ 279.710382] __alloc_file+0x27/0x330 [ 279.710400] alloc_empty_file+0x72/0x170 [ 279.766056] alloc_file+0x5e/0x4d0 [ 279.769637] alloc_file_pseudo+0x189/0x280 [ 279.773903] ? alloc_file+0x4d0/0x4d0 [ 279.777741] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 279.783661] ? kasan_check_write+0x14/0x20 [ 279.788045] __shmem_file_setup.part.0+0x108/0x2b0 [ 279.793013] shmem_file_setup+0x66/0x90 [ 279.797026] __x64_sys_memfd_create+0x2a2/0x470 [ 279.801737] ? memfd_fcntl+0x1a50/0x1a50 [ 279.805926] ? do_syscall_64+0x26/0x620 [ 279.810019] ? lockdep_hardirqs_on+0x415/0x5d0 [ 279.814729] ? trace_hardirqs_on+0x67/0x220 [ 279.819182] do_syscall_64+0xfd/0x620 [ 279.823019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.828231] RIP: 0033:0x459ef9 [ 279.831475] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.850701] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 279.858432] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459ef9 [ 279.865731] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bef97 [ 279.873117] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 279.880674] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fae6b80c6d4 [ 279.887969] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:05:51 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x12, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0xfffffdef}}, 0x0) 06:05:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x5a8e093615a56dc5) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000000c0)={{0x1, 0x93}, {0x9, 0xde}, 0xffff3075, 0x2, 0x1}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:51 executing program 1 (fault-call:3 fault-nth:6): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:05:51 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 280.229107] FAULT_INJECTION: forcing a failure. [ 280.229107] name failslab, interval 1, probability 0, space 0, times 0 [ 280.270238] CPU: 0 PID: 21471 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 280.277600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.286975] Call Trace: [ 280.289605] dump_stack+0x172/0x1f0 [ 280.293281] should_fail.cold+0xa/0x1b [ 280.297317] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 280.302455] ? lock_downgrade+0x880/0x880 [ 280.306660] __should_failslab+0x121/0x190 [ 280.310937] should_failslab+0x9/0x14 [ 280.314775] kmem_cache_alloc+0x2ae/0x700 [ 280.318955] ? notify_change+0x6d5/0xfb0 [ 280.323045] ? do_sys_ftruncate+0x41e/0x550 [ 280.327801] getname_flags+0xd6/0x5b0 [ 280.331638] getname+0x1a/0x20 [ 280.334980] do_sys_open+0x2c9/0x550 [ 280.338740] ? filp_open+0x80/0x80 [ 280.342310] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 280.347206] ? do_syscall_64+0x26/0x620 [ 280.351249] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.356661] ? do_syscall_64+0x26/0x620 [ 280.360680] __x64_sys_open+0x7e/0xc0 [ 280.364523] do_syscall_64+0xfd/0x620 [ 280.368374] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.373612] RIP: 0033:0x413c91 [ 280.376988] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 280.396003] RSP: 002b:00007fae6b80ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 280.403913] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413c91 [ 280.411205] RDX: 00007fae6b80bb0a RSI: 0000000000000002 RDI: 00007fae6b80bb00 [ 280.418531] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 280.425938] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 280.433321] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:05:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x2}, 0x0) 06:05:52 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:52 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$rxrpc(r1, &(0x7f0000000000)="a79f0230a6cef4979df2a67399542d48c793b1bb4998d58fd1b89b1ee9574628d684d70db25fd4b15801f362105f44fd864c52029bbbed0de080f7dc82b98c36", 0x40, 0x8001, &(0x7f0000000180)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @rand_addr=0x7fffffff}}, 0x24) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000000c0)=""/174) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket(0xd, 0x4, 0x9) ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f0000000500)=""/4096) 06:05:52 executing program 1 (fault-call:3 fault-nth:7): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:05:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x8}, 0x0) [ 280.772768] FAULT_INJECTION: forcing a failure. [ 280.772768] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 280.785184] CPU: 1 PID: 21689 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 280.792135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.801601] Call Trace: [ 280.804259] dump_stack+0x172/0x1f0 [ 280.807937] should_fail.cold+0xa/0x1b [ 280.811973] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 280.817123] ? mark_held_locks+0x100/0x100 [ 280.821399] __alloc_pages_nodemask+0x1ee/0x750 [ 280.826138] ? __alloc_pages_slowpath+0x2870/0x2870 [ 280.831190] ? find_held_lock+0x35/0x130 [ 280.835422] cache_grow_begin+0x91/0x8c0 [ 280.839562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.845143] ? check_preemption_disabled+0x48/0x290 [ 280.850380] kmem_cache_alloc+0x63b/0x700 [ 280.854644] ? notify_change+0x6d5/0xfb0 [ 280.859021] ? do_sys_ftruncate+0x41e/0x550 [ 280.863379] getname_flags+0xd6/0x5b0 [ 280.867219] getname+0x1a/0x20 [ 280.870446] do_sys_open+0x2c9/0x550 [ 280.873634] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 280.874192] ? filp_open+0x80/0x80 [ 280.892267] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 280.897062] ? do_syscall_64+0x26/0x620 [ 280.901158] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.906693] ? do_syscall_64+0x26/0x620 [ 280.910306] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 280.910703] __x64_sys_open+0x7e/0xc0 [ 280.928924] do_syscall_64+0xfd/0x620 [ 280.932782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.937999] RIP: 0033:0x413c91 [ 280.939397] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 06:05:52 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r12, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r14 = gettid() tkill(r14, 0x1000000000013) r15 = geteuid() fstat(r3, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0xc0, 0x0) r18 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r19, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r19}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r21 = dup(r20) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r23 = dup(r22) ioctl$PERF_EVENT_IOC_ENABLE(r23, 0x8912, 0x400200) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000300)={0x3, 0x7, 0x1b55, 0x4000, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r26 = dup(r25) ioctl$PERF_EVENT_IOC_ENABLE(r26, 0x8912, 0x400200) r27 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r27, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r28 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r29 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r29, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r30 = accept(r29, &(0x7f0000000680)=@pptp={0x18, 0x2, {0x0, @multicast2}}, &(0x7f0000000700)=0x80) r31 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r31, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r33 = dup(r32) ioctl$PERF_EVENT_IOC_ENABLE(r33, 0x8912, 0x400200) r34 = gettid() tkill(r34, 0x1000000000013) r35 = geteuid() r36 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r36, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r37, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r38) r39 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000740)='/proc/capi/capi20\x00', 0x301000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r40) r41 = gettid() tkill(r41, 0x1000000000013) r42 = getpgrp(r41) r43 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r43, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r44, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r44}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r45 = getgid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r47 = dup(r46) ioctl$PERF_EVENT_IOC_ENABLE(r47, 0x8912, 0x400200) r48 = gettid() tkill(r48, 0x1000000000013) r49 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r49, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r50, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r50}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r51 = getgid() r52 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/context\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r54 = dup(r53) ioctl$PERF_EVENT_IOC_ENABLE(r54, 0x8912, 0x400200) pipe2$9p(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r56 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000800)='/selinux/policy\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r57) lstat(0xfffffffffffffffd, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000008c0), &(0x7f0000000900)=0x0, &(0x7f0000000940)) r60 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r60, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r61) r62 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980)='/dev/hwrng\x00', 0x20201, 0x0) r63 = gettid() tkill(r63, 0x1000000000013) r64 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r64, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r65, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r65}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r66 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r66, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r67, 0x0, 0x0) stat(&(0x7f0000004100)='./file0\x00', &(0x7f0000004140)={0x0, 0x0, 0x0, 0x0, 0x0}) r69 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r69, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r70, 0x0, 0x0) r71 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r71, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r72 = mq_open(&(0x7f00000041c0)='.systemppp1\x00', 0x844, 0x2d8, &(0x7f0000004200)={0x2, 0x3162562f, 0x4, 0x6, 0x6, 0x6d, 0xbc, 0xffffffff}) r73 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000004240)='/dev/qat_adf_ctl\x00', 0x101800, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r75 = dup(r74) ioctl$PERF_EVENT_IOC_ENABLE(r75, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r76) r77 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r77, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r78, 0x0, 0x0) getgroups(0x1, &(0x7f0000004280)=[r78]) r80 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r80, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r81) r82 = socket$inet6_udp(0xa, 0x2, 0x0) r83 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r83, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r84 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r84, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r85 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r85, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r86) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r87) r88 = gettid() tkill(r88, 0x1000000000013) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004740)={{{@in6=@ipv4={[], [], @multicast2}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000004840)=0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r91 = dup(r90) ioctl$PERF_EVENT_IOC_ENABLE(r91, 0x8912, 0x400200) fstat(r91, &(0x7f0000004880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r93 = fcntl$getown(0xffffffffffffffff, 0x9) r94 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r94, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r95, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r95}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r96 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r96, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r97, 0x0, 0x0) r98 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000004900)='/dev/ashmem\x00', 0x9c040, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r100 = dup(r99) ioctl$PERF_EVENT_IOC_ENABLE(r100, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r101) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r103 = dup(r102) ioctl$PERF_EVENT_IOC_ENABLE(r103, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r105 = dup(r104) ioctl$PERF_EVENT_IOC_ENABLE(r105, 0x8912, 0x400200) r106 = accept$ax25(0xffffffffffffffff, &(0x7f0000004940)={{0x3, @null}, [@null, @remote, @netrom, @remote, @bcast, @rose, @default, @netrom]}, &(0x7f00000049c0)=0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r108 = dup(r107) ioctl$PERF_EVENT_IOC_ENABLE(r108, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r109) r110 = syz_init_net_socket$x25(0x9, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r111) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004b00)=[{&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000000180)="6c22a5025cddb82074896b34e7baecafa455913590f5031bb894e32b323b60abb124fae6b74a47564240b82fab5f4c3d43cc6c9f4b0a5fa16e3f779a9320013438a7b794b735b5c9931b881255bfcb49998e2c96d9b3361b19046c8ef9379543f51d5c166b59aee60a97a61e9f816680447e3f7d503b3b8629846c4d359854503b6e132f9d8f48029c8d5de0da", 0x8d}], 0x1, &(0x7f0000000340)=[@rights={{0x38, 0x1, 0x1, [r5, r7, r3, r8, r9, r3, r11, 0xffffffffffffffff, r12, r13]}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r16}}}, @rights={{0x18, 0x1, 0x1, [r3, r17]}}, @cred={{0x1c, 0x1, 0x2, {r1, r19, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r21, r23, r24]}}], 0xb0, 0x24040000}, {&(0x7f0000000400)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000480)="5787288129ef75541fa97a77e26ddd49066f8fb8c5d63f2dc06f2933ced97298ab2fd6430de94518b1e8b6eaa8ec7d4a26f533b33cc776be90b13fd20bdecbc98ece75396107c0d96fd2b6af0dddc2f04f7dbe1816afd42e462852bf947af9b13563673c0c4e06de3f475730bacaf460439a3a9ab5d184612ba6fcc9a83cb6c9e450c567138f24fd8f3e1d0f548fe4c17e56d7a4d239c9e245ef75aa902ce824638e03675fbd8b0a9190da973278d80fe80315648e58d3ced479abe78528d8d95c3771aecee583", 0xc7}, {&(0x7f0000000580)="e81e887103c6927a6d593ad24b19049c3439c5677af1b905015aed2813b20f63b9e39ed0fada25837772b4f3cf1ce1", 0x2f}, {&(0x7f00000005c0)="d30a9f9f60c07254a03e8b6b6b65294a8f036b01734f4f59fd", 0x19}], 0x3, &(0x7f00000009c0)=[@rights={{0x38, 0x1, 0x1, [r26, r27, 0xffffffffffffffff, r2, r28, r30, r2, r31, r33, r2]}}, @cred={{0x1c, 0x1, 0x2, {r34, r35, r37}}}, @rights={{0x28, 0x1, 0x1, [r38, r39, r3, r3, r2, r40]}}, @cred={{0x1c, 0x1, 0x2, {r42, r44, r45}}}, @rights={{0x18, 0x1, 0x1, [r47, r2]}}, @cred={{0x1c, 0x1, 0x2, {r48, r50, r51}}}, @rights={{0x28, 0x1, 0x1, [r2, r52, r54, r55, r56, r57]}}, @cred={{0x1c, 0x1, 0x2, {r0, r58, r59}}}, @rights={{0x24, 0x1, 0x1, [r60, r61, 0xffffffffffffffff, 0xffffffffffffffff, r62]}}, @cred={{0x1c, 0x1, 0x2, {r63, r65, r67}}}], 0x168, 0x4058084}, {&(0x7f0000000b40)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000004040)=[{&(0x7f0000000bc0)="7cac38083634b484633df747b448b95f62909247a658a5ba4c4df7f774faa35ecb0b726c99d0fdccb834706a0b49df8bc82aea10ba9e9d24b33dd63d4e939e4a802520185ba5892b99322b36ab4a194e8c1b372d980ff4f67d66eaeacd780b5d204ba8db9b0b39a6285dfa208672", 0x6e}, {&(0x7f0000000c40)="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", 0x1000}, {&(0x7f0000001c40)="334d20a0ded0ab93f657388842e002e149f8d4a0", 0x14}, {&(0x7f0000001c80)="1a964052040f9271fb1deb06d02ed6a064a881faeb4fff9f720a7ea52022f3d5e188db61b348afafd26a234470a635b09303f2232c25e277d8903cc371de2b28272a559528abb9fd684438cbdd90cd3f208a208859d18fb5b79ef6dd07ecdb5095f6f636054c830730623139775ecb505d3d802f4cc14baabc6a6fd236e88f10769123d0d56d28275adf6d1b469dbb80acd55d3b59c1002efaa798d3d5c4e6579669c93ae480340723a0ac04c27e2c8b2877ea5c8751c7ddceeaa797b37c1a58bd92c0bde2", 0xc5}, {&(0x7f0000001d80)="e59180ee0e35d5df949e46c2e50850b838830a4f7b50ddbe7a09be9195491491f73b56007e", 0x25}, {&(0x7f0000001dc0)="d26f212e5051edba1aab8ebbff87b381b2767b20116d2a703b5d302474e3c4efa5419202f70a43c2fa7b33cd209ba94f74c003dc9c4b8038675ce6c3ea164dd9bdbd06f7f5fe9a7d9012153e73bcf0e55adc53fac556f122ed74a8d68d8f47e99e386d294f0a9a8a8a05036ad9543d61cb9417e0ff9226dfc3c643b91bcc82e0c09b4407103c0e59f703ebdbe5d27587c6bb42147a4dbf8da7a749346488bf9111aeda8212db", 0xa6}, {&(0x7f0000001e80)="fc84e6a7dab640fd11b788509e93d1005464c501ae8a33369e09eaf0a285c7038b37d6ccce01a1701df2e19669fa5831ab68f00b1e236d00350c73d8c542dcd45f4a166cbbb8a541b0d132516379a29b9f4dae8cc331890596549ee1061634c7c8d7467aacc309da280b51c0d7982061352ba93f42f545a1f4315c16f995e5158b1574e112404c6e6f96be12b174a4d65f1df70ab12e0b81af1080fe7a809d583de83e5289f7803e4dadd25787bbafb0de33b51c446884dcb114db3da558d36ce64948e4695461", 0xc7}, {&(0x7f0000001f80)="7138e17c96a7750cd498aff5a20a4c8f032ffe3298e9416b64db0ea164689bfdf850c0ece0c41b485c821b83098bb9df6e3a5cc4981de46bbb138fb1e6bb6743032ecbd9788fffc86277741ad7cb1e99115adf544a6ff6326bb2dcfe20292dd50f3673aab62935c4ae35981e5fdef04c3fa2e214b6c2a07e9ed89a2e9aff2405e1e001ed9cbb427a91b3", 0x8a}, {&(0x7f0000002040)="7b9eec2af35192734a33732273731ac8f2ced0391f160d3ad474cc9ac5a738eb81c58493a388b5660b08cdde265a9bb3d862b2133f671e7b77967924a9b7f1d5eab5327bc76269ad28e0ae9948e76fa8144041a5c9130c77d8ae3e6748b830caef5f7cfe244541d55a3f9a323dd0c51bfa57d12649671694319c0bbe2ca958f9a313e1827c7ca47711db432d7041ff6a630e292b4eb03699f5cf04567b29e75f216f93f3f7ea3d7df3d959bb197201dde5deb4a5c52b7fb20dc6baf94a5a794f1e2890930dc855637e9369a1b7b4d6e66be2fe99a380be1710b3af4d3835bdbfbb6e34e54c45cda2b91410a981aa20e51a2004c68c626fbc5e0cd5e227982b3f49daa717bdf04cb4994028226c6a693a7632273cc9862393c8aff974d1fea65166fcb9c1dca4dd10c50c4a9968c748a80973a61bfd9de1e61273f9d8fc4ac79ce8e4d58bd88244f3dac2ade6e0625d3386bce783df4005054d758f3b5c7971753f69de22ace047d43fb0f5b8130bc20af2fab13dd6bc65a30b85e8d975331667102bb4e720de4d2c204711ecd16df5c66939d2f333f1207bd62ed34dde9e4d8119738e28a6cf4d8fd7dd0e57e073a926accf42ea7ab29aee5b268f75ff81f6dd8ffabaf14a1efeeb99560f9f629fbcfa2ea99ac874895efdd88b670251ac57e132fae62e97d519a7597c188b5bd999265bb96784a6382591bd017192c504b4ab9ef98f3f2351fa8da0c9c7e872d87ee7a78dddd5e39669dbb361a29f97864134581043811b1dd19289fa1aac51cf1ed07e3c0cf035875b064589ba7f328726279955b348fd1154a3879112d2732be4c6c0edc6b68dc51e00365453610e1cc7d8d272e6dad571b45039c09802ae7742634410a2fe39ba1a1c480b4bbb5f4cf743cf778e54c58b2370acd8640f3311e6eecac23ef44f3f59c4c29a6cbaa4c242e07b9bb499569d9e485b84c81c354e4662c15a19583bb246263e1544570f103d988629cd662fbb87f42df558cc46c59df0356121045861b33088a4153b48bb985f0d0f2b164519016fd91bb8d8445016baef5c2634dfce6f0e775ed393b44338bb95eeac5e6fe3b5196b17bd8a04c6e19a8a539e556aa20307535ac31243eb289d0f3720eb9d39f9e76f1d0359546d6cad1756a9e702d935e146394752e20e8fd93fb32258350229151b56333b2a526c41479e1c40aa6dcdb3af5d74396a9e6a2ea1670583a6d97ab8405f77c0cb77563e0bfaaeb061f8047cff33346a0055c9a860fdd17fa216cae02892a5b482a8f500b775938bf2a67235e3a6b06159fbadced29f4e1776943233866f804c1d01f6c89d631e93da5ca2ecbeebc02596a6c385cba07dc539838686d733ce5863d21a2f933766a423955e927a16cfce005c2cad1ce94841e3a58dd4779991e6a83e820198df035e086594d79eac69977691d1302e7d85cc042c5d46eb85b5b3065d69e58bd7d9261009d1113ffb8cbd0cfaa371954544e974698e9c5e62fa25b100e55746aa009475fc37d172d7205506ac4e9fa8fd8540bd1b818f5e5ec4a22c7c34ea92a638c8905b94e7178ce8f83fdffe0b3bd7dd4091a4fa6e7d7746e611e98612bb7e3ce81a0fb52d1ae3ff0e470dabaf4e4f7bc9ce328b8e771ae085391f2648e56ced0606fe1d106ae312d73ba9cf8e566bbe919c474af9c7f578238c3dc26ebc9955dbdd95946988dad08f69e5dac83b843ef4058eacdcac57ee6e9cd80a07966e9eb67f54a0ce9223ef2da45a16eaa7218c2c2f46050b6adf2502dfe64af6705add98803d694f6ee35435a9eb1ffe9c4d795afba7aef05b67c89ee5bdf4938b47d6c17e4a539b5c30dcc5c443f6ef0f593e09e298feff0798c8d383a9ebd9d2b6499c4a28991641739e42e0495ff36772c145ad766c10ed2baf64a61d673dfcce32640f2c29f8ed32f279e56537cad93e04a8ab4674fffed517edbf2179885eda2d47e395ac4ec9408989d23a879549db69da2113f7244b1d3d547cb4bac305f8377ea30414d1c8be6dc294c9f865fb07c42208301339679d1f3c29a7eb172c73ab69fe6afafa563b2fe3c2f76c63d6c11dfcb5574dd5c8ff9b9b07bf23e6c2e934a0ec090bac0fe1c1efc466806a0467ed41cd4a34c96137d772d69a5bcd603aac7ed3a17ce9b11b407efe8db41d96be72532db371f0beef2f71379fb4bc61bbe153b69e936ddb1c8c5e45a843bf34080d0f4404d02acf2a883f97df738a2676fd619e412a7915d666c82faf5607c21bf82d42d8fc10b0d2594681624bf8d36ad0c9ab424d0abc56c225f6784d95bb819a36906d73157ea3e5f9d74f4bc3a1b26515b17d57b3fb8b9223e863920fcea2c3a1b171320ab1c3663b89b791cd404970ded658e56afb6c734400ca5462c08a38f499249373308d61993ec8b38b0b33cf557d9d172ac64f965f1c27b326ef09b33d0ef9d978719c2141cd480927e112aa370c6b8567b9c70ee2a8b36f72353eb302d2789882c6ef67fb0eeaae65d6f26ef43fea5b9ead730e131ca628b1381ecb49c61e9b43df2a3fccbcc0fb71b6ec9a4fe8c21cf9cb8f7e98571268ef409fafe6e2637a40c5c98a293650afd92ed3bf8d63e5d3624ebe582d9aaec91babb3a32da7a44c95583ad946ae79a6c7629fb3796aac276bf404080332a060e8464cc4cc705a32a97285f5a7e2ea0cd8dd92421880e408cf455b69aa3dcd3e5b1cdfbb47adb07c5e4bc35e15ccd33c65c6183f0eca4a87737d4f064685e9aaf83f018f1e544369d295aad0196167085031f2ef4820c21d81a5220647ff76928dca10db7b9cf29d16ffdd3d568095b011011c5196d3ba48a2b8fb26f47b54de52024bedcc4a0390d185f71b8a966376746a6cbc5707e749604133b2fbc5074fa96c9b1477245323c23cccb038bb07be5525e487cab4c118f27e0e0d01c42824d132d4e950a73697e5f9662b86587af82bd974409cf0ed0f8a2187b84f8fb7bab4401c158cd798ae349a25302ec7f57b2a56583176ce238dfdb098b9d7d363963d86d4f3e12cdb9ce65a237640a2e65cc2a327a07b6b04c80dc5fee33b5025aa40e1eaa2871d510fd8f9cd9b0189b05765d11a415988d8299135b28b8ec523daff80be4581e6c65b3846d79687a9d0e27d6310cb3b60a24e252958d0c792affdc4d2cb297fb594d79c258b1bdd964a3a343f2f258df8f3a598a2920125b913a47eb3c5be020705c4f9661e37b0ab0d221e9c7329c425306e8b3df83b1c54eac636ffa361567b9b5b79eda2cdf0c479925bdd3cf092143c7eea12d32bcc606e2ead5ed82296c48e398a8ea04fdb4acd4f05e4dc0bf5bb2c9d51ad0748d439c7ed2e698d7713148870d6798883c7393e1d91a6ae10557733365ba7a9384cd4f0a7b44921a2f8946a676d27ef657598ced44d292024dca349d56875d9bccd520bd59c62530e83dee5448dd750271a8bffffd814a177066df0b45d9751fb36af53cc03187447e8fed56d81cc0ef83a076cea3c9f3337af2d0e314f3c4edac8270ab929ca28dd3c95924bc0ab1effb3b29e88da5715e4aa64be631df78e3558abd5a55614fb77d33e7552f15b01a8cef8f6786a96f3d3884c8f7942496c65bc9a560562202c917e078e0203360e129d835d3bf729eeeb8218991c009cf4eacc6756065d6bb9b78c85b1537ec74f29ab62107f2fcaaf6ff5500c30f285b594cb2f28205250d1a956f94bfd2348c891df37af3c589b26e47ffa5ee9b1092b8448ce88e88a2cbb2534a89bf5732858e1f3549345cd99d1ec57b9ad5ce57b35f1299ebca007221371cb123a2fcecea05f15484a36af11a2f0ff70ed6f6615909fb7d246b440f5292d4f9e1c244e83c880c32c2b7d225c4aeb160c8cd21d1a86e5cb9d9ea970119215648bcaf48c73b28e7dae84cc5d516ba349405da010be8f5a4fd95cdf6ac5f99d01fb73965cea938fbf09033b7771555500ab670787a3e78f6ef1d3f5f829db75ba4fa8c8bf19e0f30e8d7cd46972ec67f22155b42c5c07d6a54c81220dc2536ea116f035428cb8d28017a18a468d9147b0802a49f510c875e3bf078f33f488b177fb14069610bd6540d85247bdc67a95ce8667d73b1b83e5e6c9fde63cfbfc7c601a55d8d654d71c48c161e4c5c61d4e3a7126850846532441618240a3a6bc67b0e5f337eb86cb103bf6eec184e42d082df8b08cdcd6177598dd3578a03c89b50587e1c3e9ef9957d8f5efd85aee057ea582d578ccf7bc1555b3d4dfc644fe43808073f9fa0c7ffb7d9a72ecd391356fb8ae60326a663080e08884212fb05fee822f85eb7761e6a9e54fd835f40b3dff0af2b0d02eaee6c93e12d50654ecb83d53d518e9d4969c2197dadc10942c618ba3c980f7040df3a81b1946a59f915028fd856c155f4b5cba8843d55b7922a7fdd35f790d2dd0c2107d56bdf89f4104658526d31ca5f7b9966dd938722526c811fe0774564f037579ff97ddb468ea58f99d5c896b0e492e20694404f4102be77e95f9365674ca3ea4849ec7be4f7f7eaad3ebc4a44d586fff8652e1b20a5315b1b7bc16e5bda01b964064174112568d840179f5d3d4a568f6ac481a8d13c72008b0647092cd1573e12661dd790516143a27407848a024d9af69e8f8a179983056fd2ddc597530fda89a3a3b7a0ee6030081f3de2f010bc645c82bbf3332d1a15e5e6f9eec0108009d7b2c03182a1d388c9e2617fe53f62ea9f56a90f7639fd8cf4adfa836035a7b68bf36844d212641c6166dbd0d6ab79c70579fe6a3f60a3599695a257dd4eea5ab94e5233f2173bfa8f846f6d6f8c060811a81923569f4960510ed2d5bc08c87288841ce319b019b8360a6cf347030f684067c6b462754514a1af210b6c7161fd36dea6712b7639a8894862f79e32c9cbfbc25290d4be1c72f2bfe34bab515cd52be8de114a793058dadccc3adf57a065c6e93acd5078dec5b0b685131ef588a4fbfa92e568910448022063c47e7a531bca38745a34022644eab4ec6808ef3491b11ec289c4735ffe03bf065c8e04041399f88fcc05e3cee30f8317fba0518805f23fda45f6fbb87a7e6403388dc9a60d9936b045e07309cde0f739ee3f60f0b845cc94a573c61e2584fbdd8a3428355f903312357df5695fa7477a028749b377df9dcc0155456f8b7c8ef469ddeba988afb6c1b174a5e73ca9ba8172485de899f94ef88e6212232eada29d701f15cad1f026551625efc8c3f4ce19ed44263d9129e4c220ad8777d4ed087086f0123d0a8174246e0355e606de70e945c49a53d1a167a1ec94f50464c55fe1ad9b16fac3a2bf700073b6fa40394222212b06bf306f34c4714bf5f8789b795d35f7a1d79f393c49e3e82708eda7a595db112264ab55b6b469523bfcd383a6ff313d8fef2d06ef39f33f05de7b69d52d62268fbd6829db7c90e16ebc0f0aaee0553606e0e2ca73e8bb82790c4370b57d2019d507b863a70e509741c6ac31f87bb3e08d0bf756c556ac3ef6cb8df862c164dd3402bf0343eab313de25717ed52a6a2333ae0ffa9b810f3e7f5b5572667db47a6df5813b7ff85453582eb11f0b2a76b1ab4887e0924e7eb85faf17cc9835fda5b6dc56d5587b27289a0c2a3ad0aee098bded430b184ef19150d11e6a9f505dc5ea6cf648d3a816754f40758b3dde58d1caa27579ba8af87bde655573a825adb663997357bfa289b09d7f305aa64569343a7f0fa835f936e6910aaa27bc84b9b759af1e6defad656a11cf82360a9d240deafe506db85799177eaeef8366e29a829a551b15e500746c7", 0x1000}, {&(0x7f0000003040)="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", 0x1000}], 0xa, &(0x7f00000042c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r68, r70}}}, @rights={{0x24, 0x1, 0x1, [r71, r3, r72, 0xffffffffffffffff, r73]}}, @rights={{0x1c, 0x1, 0x1, [r75, r76, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r79}}}, @rights={{0x18, 0x1, 0x1, [r80, r81]}}, @rights={{0x30, 0x1, 0x1, [r2, r82, r83, r84, r85, r86, r87, r2]}}], 0xd0, 0x80}, {&(0x7f00000043c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000046c0)=[{&(0x7f0000004440)="c2c5d02cef39a19b38713779363a3c91af927e1533c24a85de7d668b09ba53c896dcc431cd21c08b01d2077eb486233bcb31dc9de268d1bd3f8f24c05a8fb205ffe829a247d04e8833be98e030b955b24dc0a0308058583a3d0d0ab71325564b29db56ba3d13ef675c234a65ce71", 0x6e}, {&(0x7f00000044c0)="12f3d95566ddb61dcf169f41cfe3b6d2cce7a9ba3397433f79632b9b470c2d1dd4", 0x21}, {&(0x7f0000004500)="1d20396602ba9eab", 0x8}, {&(0x7f0000004540)="35fb35ab7169c518027b8d07b6742d7ca3697e5a0ca1b5ddbb8759a498f9277756583731d3ee289fe8565444e0c041a628bfb3dabb0cb68f0fcb29aeeecf4fda4e87b777143583657e767767fe786101780e8421ab2d2a3da9e6913fd8b0ad51637c2555f0d2514a3a525c20f1ee8a02f7013b513fee98c602cfe4ca029c50839c97dba08d3f1aefe74a41b533f7372f8986b91f43ebf9", 0x97}, {&(0x7f0000004600)="b1ab49122e0173efd9d0562d67ffc3b82fe933c9ddb0cd939c87a88e6790628535684cb1191a47e3dbd361384e1142ae7c52c8f109a4a5223ddf5908f4edc7cfa50e3791d7b2402e242135ac4c67c426fb84b38e87e71da267731ca882acbb10fc8b6f59fdd9b27d68c2a0cc", 0x6c}, {&(0x7f0000004680)="120d170dfcd8d6d3bcbe71287d70a8e14255ca44fec3f7f8d3c467df38f8a488f94eab91c1", 0x25}], 0x6, &(0x7f0000004a00)=[@cred={{0x1c, 0x1, 0x2, {r88, r89, r92}}}, @cred={{0x1c, 0x1, 0x2, {r93, r95, r97}}}, @rights={{0x14, 0x1, 0x1, [r3]}}, @rights={{0x30, 0x1, 0x1, [r2, r2, r2, r98, r100, r101, r3, r103]}}, @rights={{0x30, 0x1, 0x1, [r3, r105, r106, r108, r109, r3, 0xffffffffffffffff, r3]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r2, r110, r3, r2, r111, r2, r3, r3, 0xffffffffffffffff]}}], 0xf0, 0x10}], 0x4, 0x11) r112 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r112, 0x8912, 0x400200) ptrace(0x10, r0) 06:05:52 executing program 2: socketpair(0x10, 0x1, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000040)=0x9, 0xffffffffffffff84) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_timedreceive(r4, &(0x7f00000000c0)=""/8, 0x8, 0x7, &(0x7f0000000100)={0x77359400}) [ 280.941207] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 280.941216] RSP: 002b:00007fae6b80ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 280.941230] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413c91 [ 280.941244] RDX: 00007fae6b80bb0a RSI: 0000000000000002 RDI: 00007fae6b80bb00 [ 280.997463] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 281.004743] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 281.012197] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:05:52 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x13, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:52 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\b', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 281.066724] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:52 executing program 1 (fault-call:3 fault-nth:8): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:05:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x300}, 0x0) 06:05:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000000)) [ 281.224691] FAULT_INJECTION: forcing a failure. [ 281.224691] name failslab, interval 1, probability 0, space 0, times 0 [ 281.236165] CPU: 1 PID: 21807 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 281.243136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.243144] Call Trace: [ 281.243174] dump_stack+0x172/0x1f0 [ 281.243195] should_fail.cold+0xa/0x1b [ 281.243213] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 281.243230] ? lock_downgrade+0x880/0x880 [ 281.243251] __should_failslab+0x121/0x190 [ 281.243266] should_failslab+0x9/0x14 [ 281.243280] kmem_cache_alloc+0x2ae/0x700 [ 281.243292] ? __save_stack_trace+0x99/0x100 [ 281.243312] __alloc_file+0x27/0x330 [ 281.243327] alloc_empty_file+0x72/0x170 [ 281.243349] path_openat+0xef/0x45e0 [ 281.258961] ? __lock_acquire+0x6ee/0x49c0 [ 281.258976] ? getname+0x1a/0x20 [ 281.258990] ? do_sys_open+0x2c9/0x550 [ 281.259002] ? __x64_sys_open+0x7e/0xc0 [ 281.259017] ? do_syscall_64+0xfd/0x620 [ 281.259029] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.259051] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 281.285954] ? __lock_is_held+0xb6/0x140 [ 281.306143] ? __alloc_fd+0x44d/0x560 [ 281.306166] do_filp_open+0x1a1/0x280 [ 281.306182] ? may_open_dev+0x100/0x100 [ 281.306201] ? lock_downgrade+0x880/0x880 [ 281.351660] ? kasan_check_read+0x11/0x20 [ 281.355829] ? do_raw_spin_unlock+0x57/0x270 [ 281.360242] ? _raw_spin_unlock+0x2d/0x50 [ 281.364387] ? __alloc_fd+0x44d/0x560 [ 281.368218] do_sys_open+0x3fe/0x550 [ 281.372053] ? filp_open+0x80/0x80 [ 281.375606] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 281.380795] ? do_syscall_64+0x26/0x620 [ 281.384766] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.390141] ? do_syscall_64+0x26/0x620 [ 281.394129] __x64_sys_open+0x7e/0xc0 [ 281.398113] do_syscall_64+0xfd/0x620 [ 281.401916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.407120] RIP: 0033:0x413c91 06:05:53 executing program 1 (fault-call:3 fault-nth:9): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 281.410327] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 281.429235] RSP: 002b:00007fae6b80ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 281.437148] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413c91 [ 281.444545] RDX: 00007fae6b80bb0a RSI: 0000000000000002 RDI: 00007fae6b80bb00 [ 281.451835] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 281.459113] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 281.466380] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:05:53 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 281.518748] FAULT_INJECTION: forcing a failure. [ 281.518748] name failslab, interval 1, probability 0, space 0, times 0 [ 281.533748] CPU: 1 PID: 21834 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 281.540730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.550124] Call Trace: [ 281.552846] dump_stack+0x172/0x1f0 [ 281.556507] should_fail.cold+0xa/0x1b [ 281.560474] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 281.565910] ? lock_downgrade+0x880/0x880 [ 281.570110] __should_failslab+0x121/0x190 [ 281.574385] should_failslab+0x9/0x14 [ 281.578346] kmem_cache_alloc+0x2ae/0x700 [ 281.582560] ? rcu_read_lock_sched_held+0x110/0x130 [ 281.587616] selinux_file_alloc_security+0xb4/0x190 [ 281.592660] security_file_alloc+0x63/0xa0 [ 281.596934] __alloc_file+0xcf/0x330 [ 281.600682] alloc_empty_file+0x72/0x170 [ 281.604857] path_openat+0xef/0x45e0 [ 281.608711] ? __lock_acquire+0x6ee/0x49c0 [ 281.612980] ? getname+0x1a/0x20 [ 281.616359] ? do_sys_open+0x2c9/0x550 [ 281.620268] ? __x64_sys_open+0x7e/0xc0 [ 281.624265] ? do_syscall_64+0xfd/0x620 [ 281.628270] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.633673] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 281.638590] ? __lock_is_held+0xb6/0x140 [ 281.642681] ? find_held_lock+0x35/0x130 [ 281.646779] ? __alloc_fd+0x44d/0x560 [ 281.650613] do_filp_open+0x1a1/0x280 [ 281.654638] ? may_open_dev+0x100/0x100 [ 281.658907] ? lock_downgrade+0x880/0x880 [ 281.663077] ? kasan_check_read+0x11/0x20 [ 281.667244] ? do_raw_spin_unlock+0x57/0x270 [ 281.671676] ? _raw_spin_unlock+0x2d/0x50 [ 281.676111] ? __alloc_fd+0x44d/0x560 [ 281.680063] do_sys_open+0x3fe/0x550 [ 281.683898] ? filp_open+0x80/0x80 [ 281.687465] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 281.692331] ? do_syscall_64+0x26/0x620 [ 281.696404] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.702010] ? do_syscall_64+0x26/0x620 [ 281.706041] __x64_sys_open+0x7e/0xc0 [ 281.710405] do_syscall_64+0xfd/0x620 [ 281.714228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.719519] RIP: 0033:0x413c91 [ 281.722728] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 281.742359] RSP: 002b:00007fae6b80ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 281.750204] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413c91 [ 281.757577] RDX: 00007fae6b80bb0a RSI: 0000000000000002 RDI: 00007fae6b80bb00 06:05:53 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0xffffff1f}, 0x0) [ 281.765079] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 281.772834] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 281.780582] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:05:53 executing program 1 (fault-call:3 fault-nth:10): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:05:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x800, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000ff03f0dd11dc29a98260f8ac5ca096f3070e629bb24209088a56a543"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r7, {}, {0xfff1, 0xffff}, {0xb}}, [@qdisc_kind_options=@q_cbs={{0x8, 0x1, 'cbs\x00'}, {0x1c, 0x2, @TCA_CBS_PARMS={0x191, 0x1, {0x0, [], 0x0, 0xfffffffc}}}}]}, 0x48}}, 0x10) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x48, 0x24, 0x509, 0x0, 0x0, {0x0, r7, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8, 0x1, 'cbs\x00'}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18}}}]}, 0x3d8}}, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x122) r8 = socket(0x9, 0x2, 0x5) r9 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001540)=ANY=[@ANYBLOB="00511be63d8d35e5fcf0795b6956931215ac530000003c66ac243fbd616d706ab7e22c99385055e4993bef714eb1d82e425b1fffaee9f1347f29691df05219896aa2e7ff10f6da687371ab74f426b00e4785c65f96e44d6bb7d456d989d00c8342402117ed1bbb9ded2eac6d9b0e28eab247eaac68363a581b388e2d6c4b56ee6019099397d8cdf68d1c1cf5a424d13dc4c2bb0af5112a89f802de7c50b141bc1c0edcc23a3cafc183fb2429251beb7f19440af63cb3bb3c397886f0", @ANYRES16=r9, @ANYBLOB], 0x3}}, 0x4000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x470040}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x6c, r9, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xfffffffffffffffe}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xfffffffffffffc01}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x6ba81747a7aef671}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r11}, {0x8, 0x1, r13}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000004}, 0x400e048) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000040)={r7, 0x1, 0x6, @remote}, 0x10) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 281.903633] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 281.930615] FAULT_INJECTION: forcing a failure. [ 281.930615] name failslab, interval 1, probability 0, space 0, times 0 [ 281.954905] CPU: 1 PID: 21926 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 281.961895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.971272] Call Trace: [ 281.975299] dump_stack+0x172/0x1f0 [ 281.979235] should_fail.cold+0xa/0x1b [ 281.983153] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 281.988373] ? lock_downgrade+0x880/0x880 [ 281.992685] __should_failslab+0x121/0x190 [ 281.997544] should_failslab+0x9/0x14 [ 282.001473] kmem_cache_alloc_trace+0x2cc/0x760 [ 282.006282] ? __lockdep_init_map+0x10c/0x5b0 [ 282.010830] ? loop_info64_to_compat+0x6d0/0x6d0 [ 282.015730] __kthread_create_on_node+0xf2/0x460 [ 282.020599] ? lock_acquire+0x16f/0x3f0 [ 282.024602] ? __kthread_parkme+0x1b0/0x1b0 [ 282.029053] ? lo_ioctl+0x1c4/0x20e0 [ 282.032890] ? lock_downgrade+0x880/0x880 [ 282.037091] ? mutex_trylock+0x1e0/0x1e0 [ 282.042319] ? loop_info64_to_compat+0x6d0/0x6d0 [ 282.047183] kthread_create_on_node+0xbb/0xf0 [ 282.051717] ? __kthread_create_on_node+0x460/0x460 [ 282.056838] ? __lockdep_init_map+0x10c/0x5b0 [ 282.061367] ? __lockdep_init_map+0x10c/0x5b0 [ 282.065949] lo_ioctl+0xaf2/0x20e0 [ 282.069627] ? lo_rw_aio+0x1470/0x1470 [ 282.073625] blkdev_ioctl+0xc38/0x1ab6 [ 282.077701] ? blkpg_ioctl+0xa90/0xa90 [ 282.081689] ? find_held_lock+0x35/0x130 [ 282.085766] ? debug_check_no_obj_freed+0x200/0x464 [ 282.090803] ? __fget+0x340/0x540 [ 282.094282] block_ioctl+0xee/0x130 [ 282.097924] ? blkdev_fallocate+0x410/0x410 [ 282.103821] do_vfs_ioctl+0xd5f/0x1380 [ 282.107724] ? selinux_file_ioctl+0x46f/0x5e0 [ 282.112412] ? selinux_file_ioctl+0x125/0x5e0 [ 282.116929] ? ioctl_preallocate+0x210/0x210 [ 282.121356] ? selinux_file_mprotect+0x620/0x620 [ 282.126159] ? iterate_fd+0x360/0x360 [ 282.130084] ? do_sys_open+0x31d/0x550 [ 282.134003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.139644] ? security_file_ioctl+0x8d/0xc0 [ 282.144182] ksys_ioctl+0xab/0xd0 [ 282.147656] __x64_sys_ioctl+0x73/0xb0 [ 282.151742] do_syscall_64+0xfd/0x620 [ 282.155566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.160766] RIP: 0033:0x459d67 [ 282.163973] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.183146] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 282.190971] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459d67 [ 282.198635] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 282.205963] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 282.213331] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 282.220617] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:05:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x2}, 0x0) 06:05:55 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x14, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:55 executing program 1 (fault-call:3 fault-nth:11): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:05:55 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\n', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x4000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:05:55 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = gettid() r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x9, 0x12, 0x7, 0x34, "3b5ca7ccfe91031447963ccb0c0297e9b747fac402bd9a659ef1f7a345d0ad2e306fe5731791706112c33fe0057e1f48ac312d48857e66c24e5c3a64d79ef668", "2ce0237855c82c0a7627bd12d68d965b0e7a2698241fbd709d72c581381b6407", [0xdb99, 0x4]}) tkill(r2, 0x1000000000013) rt_tgsigqueueinfo(r0, r2, 0x5a, &(0x7f0000000080)={0x40}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace(0x10, r0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f00000001c0)={0x2, 0x4e22, @rand_addr=0x81}, 0x10) [ 283.924076] FAULT_INJECTION: forcing a failure. [ 283.924076] name failslab, interval 1, probability 0, space 0, times 0 [ 283.935945] CPU: 0 PID: 22034 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 283.943072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.943084] Call Trace: [ 283.955234] dump_stack+0x172/0x1f0 [ 283.958937] should_fail.cold+0xa/0x1b [ 283.963688] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 283.968989] ? lock_downgrade+0x880/0x880 [ 283.973326] __should_failslab+0x121/0x190 [ 283.977745] should_failslab+0x9/0x14 [ 283.977762] kmem_cache_alloc+0x2ae/0x700 [ 283.977776] ? _raw_spin_unlock_irq+0x28/0x90 [ 283.977790] ? finish_task_switch+0x146/0x7c0 [ 283.977802] ? _raw_spin_unlock_irq+0x28/0x90 [ 283.977816] ? lockdep_hardirqs_on+0x415/0x5d0 [ 283.977834] __kernfs_new_node+0xef/0x680 [ 284.008637] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 284.013510] ? __lock_acquire+0x6ee/0x49c0 [ 284.017909] ? __schedule+0x86e/0x1dc0 [ 284.021824] ? __lock_is_held+0xb6/0x140 [ 284.026044] kernfs_new_node+0x99/0x130 [ 284.030044] kernfs_create_dir_ns+0x52/0x160 [ 284.034573] internal_create_group+0x1cb/0xc30 [ 284.039170] ? bd_set_size+0x89/0xb0 [ 284.042932] ? remove_files.isra.0+0x190/0x190 [ 284.047812] sysfs_create_group+0x20/0x30 [ 284.047827] lo_ioctl+0xf8f/0x20e0 [ 284.047844] ? lo_rw_aio+0x1470/0x1470 [ 284.047860] blkdev_ioctl+0xc38/0x1ab6 [ 284.047876] ? blkpg_ioctl+0xa90/0xa90 [ 284.056181] ? find_held_lock+0x35/0x130 [ 284.056202] ? debug_check_no_obj_freed+0x200/0x464 [ 284.077250] ? __fget+0x340/0x540 [ 284.080719] block_ioctl+0xee/0x130 [ 284.084369] ? blkdev_fallocate+0x410/0x410 [ 284.088796] do_vfs_ioctl+0xd5f/0x1380 [ 284.092689] ? selinux_file_ioctl+0x46f/0x5e0 [ 284.097277] ? selinux_file_ioctl+0x125/0x5e0 [ 284.101946] ? ioctl_preallocate+0x210/0x210 [ 284.106438] ? selinux_file_mprotect+0x620/0x620 [ 284.111198] ? iterate_fd+0x360/0x360 [ 284.115010] ? do_sys_open+0x31d/0x550 [ 284.118900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.124531] ? security_file_ioctl+0x8d/0xc0 [ 284.129142] ksys_ioctl+0xab/0xd0 [ 284.132594] __x64_sys_ioctl+0x73/0xb0 [ 284.136480] do_syscall_64+0xfd/0x620 [ 284.140285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.146098] RIP: 0033:0x459d67 [ 284.149285] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.168271] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 284.175985] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459d67 [ 284.183248] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 284.190700] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 284.198191] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 284.205557] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:05:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000200)={0x100000001, 0x100, 0x8, 0x3, 0x7fffffff, 0x0, 0x4, 0x4}, &(0x7f0000000240)={0x5, 0x7, 0x200, 0x6, 0x4, 0x9, 0x0, 0x1}, &(0x7f0000000280)={0xffffffffffffffe0, 0x1, 0x3, 0x8000, 0x0, 0x9, 0x10001, 0xfffffffffffffffe}, &(0x7f0000000300)={r2, r3+30000000}, &(0x7f0000000380)={&(0x7f0000000340)={0x40}, 0x8}) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x2001, 0x0) getsockopt$bt_BT_VOICE(r4, 0x112, 0xb, &(0x7f0000000400)=0x7, &(0x7f0000000440)=0x2) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=r6, @ANYBLOB="04000000d5ffffff0f00020000000000200047f5f3a37733"], 0x2c, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r8, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r8}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000000540)="42c49fcefd158e6d1dda4410df33432502849be30bbc424828e69e2e19e1c309d0a0729dd0b344c04826174389a1d6def6782b0aaa1b0c74b4f81efc72e3183c77807b92be7bbc5019d20aa7a042", 0x4e, 0x4}, {&(0x7f00000005c0)="1d864897b051937250e655d0da22fb4f0392d2c6ef1ea09b7a7ec6f16c2c4b8963cbfb912fd5dc73eeb0ec8c7fe7ba240df25c1c62b1af494b7a5a36cfa9328e6913a4af3e1675117c5d50acfbd68e5b7f231dbdf9aef4dfe7ce8d64b7b6a178971c2b68364a1b5e64c0724cccd6ff281982bdd25a422435800e4b4c882550101ff8020da34f880c253d6fbda23c", 0x8e, 0x8000}, {&(0x7f0000000680)="dd0363e86783d6f7e583099e0e8cbac414ccd375d23bd98e636a13b72f11a1598894804c8ce3f95525dfeb3a302b912caa849f1d101950761c144b50deec9192dd546889cd416d73bfe816fb63c682ace4f9f6fb7914e7f56317ab1680d8dc5dbd5d7aa5550acb89a379638374c03ec73d6722d8bda2301f7a255c18bdf10d98e2391d00f330ee0e886cac4f7c08fb7ccb341bbaa62eafaed81c764d1e0b0fb8f1f57a12f77f47bffc2f19f67a990da040940af3f99b7876215301b2c295c0c37dd97700f60cc9db3a2da7f4", 0xcc, 0x80000001}, {&(0x7f0000000780)="504d479156dea96f456621db911c0bbb7be5084a0493f58c06806d4c6fd8c77b4963efaa6736d9b86fa4374fe8150a2c6f5f212a4eaef73147c63457bc6f73d1c5301a76deeaecd762f79c5ab0725c36e10fa46cac0379274ff2009517bf0a99e0bdda8362ec99009f06759003246372fd4704041a62ba7e47f0bf509d6258f1ba8eeeeb8fcddc2a2f8ff292645310ddca3db583ac8213ffc5b30dacbd6af5d9c99f31e7815eb9d11dfa808c245c58853bdcbd6e85ff5c202679a643eda066cebfc1cd2d", 0xc4, 0x2}, {&(0x7f0000000880)="121132d2395ac9e5912b453c08819c0a32f2927212063bb98033c88541ade2a922a4c442ed0694a89b996214293214632f48db180718dfcc006ee3140c29db13f3566d71b34eb319422286b485e334160e671004c6df89d764666645a4d652fbc7833f81f90ab3779459a54c4fc9ec0288fbe4eb9888ef823ee8475dec102f94c1bb7326144a5d4d46de14350735c7b80fa77c485b5ffb91623e07469d5dcf014b", 0xa1, 0xa3b}, {&(0x7f0000000940)="3c210dc544", 0x5, 0x1}, {&(0x7f0000000980)="d5042cfd33875b4b53a7b7213850d73e988cfa1c87a03ffb6268649f2d9e", 0x1e, 0xfffffffffffffffe}], 0x810061, &(0x7f0000000b40)={[{@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@audit='audit'}, {@subj_role={'subj_role', 0x3d, '/dev/kon\x00'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_gt={'uid>', r6}}, {@subj_type={'subj_type', 0x3d, '/dev/kon\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) r9 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x309900, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='/dev/kon\x00'}, 0x10) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000140)={0x0, r11, 0x80000000, 0x6, 0xffff, 0x3fb}) mq_open(&(0x7f0000000180)='/dev/kvm\x00', 0x142, 0x2, &(0x7f00000001c0)={0x7fffffff, 0x9, 0x7fffffff, 0x100000001, 0xfff, 0x10001, 0x5, 0x1}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8, 0x18708a42ecdd31d, r9, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$CAPI_GET_SERIAL(r13, 0xc0044308, &(0x7f0000000a80)) 06:05:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x4}, 0x0) [ 284.263633] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:56 executing program 1 (fault-call:3 fault-nth:12): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:05:56 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x0e', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x2000}, 0x0) [ 284.536404] FAULT_INJECTION: forcing a failure. [ 284.536404] name failslab, interval 1, probability 0, space 0, times 0 [ 284.574646] CPU: 1 PID: 22255 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 284.581885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.591561] Call Trace: [ 284.594445] dump_stack+0x172/0x1f0 [ 284.599532] should_fail.cold+0xa/0x1b [ 284.603760] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 284.609000] ? lock_downgrade+0x880/0x880 [ 284.613214] __should_failslab+0x121/0x190 [ 284.617704] should_failslab+0x9/0x14 [ 284.621640] kmem_cache_alloc+0x2ae/0x700 [ 284.625844] ? find_held_lock+0x35/0x130 [ 284.630099] ? kernfs_activate+0x192/0x1f0 [ 284.634470] __kernfs_new_node+0xef/0x680 [ 284.638759] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 284.643644] ? lock_downgrade+0x880/0x880 [ 284.647868] ? kasan_check_write+0x14/0x20 [ 284.652133] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 284.657031] ? wait_for_completion+0x440/0x440 [ 284.661652] kernfs_new_node+0x99/0x130 [ 284.665674] __kernfs_create_file+0x51/0x33b [ 284.670205] sysfs_add_file_mode_ns+0x222/0x560 [ 284.674913] internal_create_group+0x383/0xc30 [ 284.679610] ? bd_set_size+0x89/0xb0 [ 284.683488] ? remove_files.isra.0+0x190/0x190 [ 284.688203] sysfs_create_group+0x20/0x30 [ 284.692383] lo_ioctl+0xf8f/0x20e0 [ 284.695962] ? lo_rw_aio+0x1470/0x1470 [ 284.700096] blkdev_ioctl+0xc38/0x1ab6 [ 284.704187] ? blkpg_ioctl+0xa90/0xa90 [ 284.708587] ? find_held_lock+0x35/0x130 [ 284.712680] ? debug_check_no_obj_freed+0x200/0x464 [ 284.717848] ? __fget+0x340/0x540 [ 284.721429] block_ioctl+0xee/0x130 [ 284.725263] ? blkdev_fallocate+0x410/0x410 [ 284.729713] do_vfs_ioctl+0xd5f/0x1380 [ 284.733624] ? selinux_file_ioctl+0x46f/0x5e0 [ 284.738147] ? selinux_file_ioctl+0x125/0x5e0 [ 284.742960] ? ioctl_preallocate+0x210/0x210 [ 284.747418] ? selinux_file_mprotect+0x620/0x620 [ 284.752228] ? iterate_fd+0x360/0x360 [ 284.756149] ? do_sys_open+0x31d/0x550 [ 284.760241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.765983] ? security_file_ioctl+0x8d/0xc0 [ 284.770442] ksys_ioctl+0xab/0xd0 [ 284.773925] __x64_sys_ioctl+0x73/0xb0 [ 284.778014] do_syscall_64+0xfd/0x620 [ 284.781834] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.787120] RIP: 0033:0x459d67 [ 284.790472] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.809672] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 284.817711] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459d67 [ 284.825100] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 06:05:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0xfffffffffffffc00, 0x284a40) dup(r5) accept4$unix(r5, 0x0, &(0x7f0000000140), 0xf783bc583195ba92) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r8, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r8}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000027c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r10, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r10}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) mount$9p_unix(&(0x7f0000000480)='./file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='9p\x00', 0x1000010, &(0x7f00000026c0)={'trans=unix,', {[{@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, 0xee01}}, {@access_user='access=user'}, {@loose='loose'}, {@version_L='version=9p2000.L'}, {@cachetag={'cachetag', 0x3d, '/dev/kvm\x00'}}], [{@euid_gt={'euid>', r6}}, {@fowner_lt={'fowner<', r8}}, {@fsname={'fsname', 0x3d, 'bdev'}}, {@euid_gt={'euid>', r10}}]}}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={r11, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000000)={r11, 0x2, 0x4, [0x3f, 0x8, 0xd3, 0xbc3b]}, &(0x7f0000000040)=0x10) writev(r3, &(0x7f0000000400)=[{&(0x7f0000000180)="65fb00b65c889e2cca33ad5089829364bd732526bb30c4edf1127e513af0ed4e5c39e23676a85b25fbcb68b585ca85224a99c31946f89c930f820dbb2e82e197cb99823534fa925256f4e7a6adf9215e4b8c2e18324a7b2befe370cb3db4ea47fb6050a8bf280b2830c190ef98c8ba7c67dc4b27b7085dfa5951ecf7395aafcfecd4b9aa4e1f67bd143f48babb7be27d31f7398ef9058d26e8f7e13fbe0dd8d5ba2713954d23199590c8954c203c9b0b4ecacef0fd1a44", 0xb7}, {&(0x7f0000000240)="872bc9778adfa7a918448ff708c0ded0288a0e0720e48fa93e292c5ef7ef4ad7bd922407fb40fac0ade63ff36f7bce99eeb7a794ee902daac22648c8e2369746c07edef70e26648379101c22a07d907a76a94072cc26a9308d545cfd88c2585e529e80270cd57b3a8a59d75482425c20ee5930c05e0baaae1cd9bdcef242b47f481ef807667b05bb58d1d1b7495d96433b2b18c4c47574f6a7b8e336e43ea9a6", 0xa0}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f00000003c0)="b01d1e0b1c9993f92222dae1bef220ef768eb74363d2c9cc70ddbb446add5cf7e771b45ae144f43c80d23211", 0x2c}, {&(0x7f0000001640)="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", 0x1000}], 0x5) r12 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r12, 0x4040ae79, &(0x7f0000000080)={0x2, 0x0, 0xf0f676668d2005db, 0xffffffffffffffff, 0x5}) [ 284.832486] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 284.839778] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 284.847144] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 [ 284.904186] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x34000}, 0x0) 06:05:58 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x15, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:05:58 executing program 1 (fault-call:3 fault-nth:13): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:05:58 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x10', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:05:58 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = syz_open_dev$amidi(&(0x7f00000017c0)='/dev/amidi#\x00', 0x8001, 0x400) sendmsg$nl_crypto(r1, &(0x7f0000001980)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x10000210}, 0xc, &(0x7f0000001940)={&(0x7f0000001840)=@getstat={0xe0, 0x15, 0x108, 0x70bd2c, 0x25dfdbfc, {{'cbc(aes-aesni)\x00'}, [], [], 0x2000}, ["", "", "", "", "", ""]}, 0xe0}, 0x1, 0x0, 0x0, 0x1852558c28d6271d}, 0x40000) r2 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() tkill(r5, 0x1000000000013) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r5, r7, 0x0, 0x24, &(0x7f0000000040)='bdev[wlan1em1^bdev#[{+keyring^vmnet1'}, 0x30) ptrace(0xffffffffffffffff, r8) 06:05:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x5c, r4, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r5}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}]}, 0x5c}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r10, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8, 0x1, 'cbs\x00'}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x48, 0x24, 0x509, 0x0, 0x0, {0x0, r10, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8, 0x1, 'cbs\x00'}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18}}}]}, 0x3d8}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4080020}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r4, 0xe9a8cd1f21edc2e0, 0x70bd27, 0x25dfdbfc, {}, [{{0x8, 0x1, r10}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40}, 0x8040) r11 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$nl_route(0x10, 0x3, 0x0) r16 = socket$netlink(0x10, 0x3, 0x0) r17 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r17, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r16, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r18}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r15, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r18, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8, 0x1, 'cbs\x00'}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r14, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x48, 0x24, 0x509, 0x0, 0x0, {0x0, r18, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8, 0x1, 'cbs\x00'}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18}}}]}, 0x3d8}}, 0x0) setsockopt$packet_drop_memb(r13, 0x107, 0x2, &(0x7f0000000040)={r18, 0x1, 0x6}, 0x10) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$KVM_IOEVENTFD(r11, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 287.311402] audit: type=1400 audit(1571810758.924:51): avc: denied { ioctl } for pid=22371 comm="syz-executor.2" path="socket:[46062]" dev="sockfs" ino=46062 ioctlcmd=0x8933 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 287.311854] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 287.350097] FAULT_INJECTION: forcing a failure. [ 287.350097] name failslab, interval 1, probability 0, space 0, times 0 [ 287.369416] CPU: 0 PID: 22372 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 287.376415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.386019] Call Trace: [ 287.388639] dump_stack+0x172/0x1f0 [ 287.392912] should_fail.cold+0xa/0x1b [ 287.396839] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 287.402060] ? lock_downgrade+0x880/0x880 [ 287.406365] __should_failslab+0x121/0x190 [ 287.410637] should_failslab+0x9/0x14 [ 287.414459] kmem_cache_alloc+0x2ae/0x700 [ 287.418638] ? find_held_lock+0x35/0x130 [ 287.422723] ? kernfs_activate+0x192/0x1f0 [ 287.427160] __kernfs_new_node+0xef/0x680 [ 287.431511] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 287.436287] ? lock_downgrade+0x880/0x880 [ 287.440451] ? kasan_check_write+0x14/0x20 [ 287.444892] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 287.449759] ? wait_for_completion+0x440/0x440 [ 287.454368] kernfs_new_node+0x99/0x130 [ 287.458369] __kernfs_create_file+0x51/0x33b [ 287.462798] sysfs_add_file_mode_ns+0x222/0x560 [ 287.467590] internal_create_group+0x383/0xc30 [ 287.472189] ? bd_set_size+0x89/0xb0 [ 287.475930] ? remove_files.isra.0+0x190/0x190 [ 287.480628] sysfs_create_group+0x20/0x30 [ 287.484896] lo_ioctl+0xf8f/0x20e0 [ 287.488544] ? lo_rw_aio+0x1470/0x1470 [ 287.492533] blkdev_ioctl+0xc38/0x1ab6 [ 287.496441] ? blkpg_ioctl+0xa90/0xa90 [ 287.500344] ? find_held_lock+0x35/0x130 [ 287.504427] ? debug_check_no_obj_freed+0x200/0x464 [ 287.509670] ? __fget+0x340/0x540 [ 287.513283] block_ioctl+0xee/0x130 [ 287.516928] ? blkdev_fallocate+0x410/0x410 [ 287.522177] do_vfs_ioctl+0xd5f/0x1380 [ 287.526106] ? selinux_file_ioctl+0x46f/0x5e0 [ 287.530622] ? selinux_file_ioctl+0x125/0x5e0 [ 287.535314] ? ioctl_preallocate+0x210/0x210 [ 287.539828] ? selinux_file_mprotect+0x620/0x620 [ 287.544698] ? iterate_fd+0x360/0x360 [ 287.548531] ? do_sys_open+0x31d/0x550 [ 287.552533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.558444] ? security_file_ioctl+0x8d/0xc0 [ 287.562879] ksys_ioctl+0xab/0xd0 [ 287.566460] __x64_sys_ioctl+0x73/0xb0 [ 287.570475] do_syscall_64+0xfd/0x620 [ 287.574421] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.580086] RIP: 0033:0x459d67 [ 287.583742] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.603617] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 287.611442] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459d67 [ 287.618888] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 287.626588] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 287.634072] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 287.641361] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 [ 287.674495] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x400300}, 0x0) 06:05:59 executing program 1 (fault-call:3 fault-nth:14): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:05:59 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\"', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 287.875207] FAULT_INJECTION: forcing a failure. [ 287.875207] name failslab, interval 1, probability 0, space 0, times 0 [ 287.887279] CPU: 1 PID: 22429 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 287.894261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.903809] Call Trace: [ 287.906426] dump_stack+0x172/0x1f0 [ 287.910089] should_fail.cold+0xa/0x1b [ 287.914003] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 287.919136] ? lock_downgrade+0x880/0x880 [ 287.923460] __should_failslab+0x121/0x190 [ 287.929055] should_failslab+0x9/0x14 [ 287.933071] kmem_cache_alloc+0x2ae/0x700 [ 287.937246] ? lock_downgrade+0x880/0x880 [ 287.941602] __kernfs_new_node+0xef/0x680 [ 287.945955] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 287.950830] ? wait_for_completion+0x440/0x440 [ 287.955464] ? mutex_unlock+0xd/0x10 [ 287.959192] ? kernfs_activate+0x192/0x1f0 [ 287.963540] kernfs_new_node+0x99/0x130 [ 287.967721] __kernfs_create_file+0x51/0x33b [ 287.972240] sysfs_add_file_mode_ns+0x222/0x560 [ 287.977110] internal_create_group+0x383/0xc30 [ 287.981716] ? bd_set_size+0x89/0xb0 [ 287.985464] ? remove_files.isra.0+0x190/0x190 [ 287.990106] sysfs_create_group+0x20/0x30 [ 287.994450] lo_ioctl+0xf8f/0x20e0 [ 287.998021] ? lo_rw_aio+0x1470/0x1470 [ 288.002534] blkdev_ioctl+0xc38/0x1ab6 [ 288.006553] ? blkpg_ioctl+0xa90/0xa90 [ 288.010831] ? find_held_lock+0x35/0x130 [ 288.015084] ? debug_check_no_obj_freed+0x200/0x464 [ 288.020211] ? __fget+0x340/0x540 [ 288.023833] block_ioctl+0xee/0x130 [ 288.027494] ? blkdev_fallocate+0x410/0x410 [ 288.031849] do_vfs_ioctl+0xd5f/0x1380 [ 288.035754] ? selinux_file_ioctl+0x46f/0x5e0 [ 288.040355] ? selinux_file_ioctl+0x125/0x5e0 [ 288.045242] ? ioctl_preallocate+0x210/0x210 [ 288.049953] ? selinux_file_mprotect+0x620/0x620 [ 288.054932] ? iterate_fd+0x360/0x360 [ 288.058941] ? do_sys_open+0x31d/0x550 [ 288.062849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.068574] ? security_file_ioctl+0x8d/0xc0 [ 288.073006] ksys_ioctl+0xab/0xd0 [ 288.076578] __x64_sys_ioctl+0x73/0xb0 [ 288.080510] do_syscall_64+0xfd/0x620 [ 288.084331] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.089900] RIP: 0033:0x459d67 [ 288.093816] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.112936] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 06:05:59 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x16, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 288.120847] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459d67 [ 288.128224] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 288.135869] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 288.143252] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 288.150748] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:05:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x1000000}, 0x0) 06:05:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80840}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000225bd7000fcdbdf25010000000000000009410000004c0018000000087500"/84], 0x68}, 0x1, 0x0, 0x0, 0x20000800}, 0x800) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 288.224743] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:05:59 executing program 1 (fault-call:3 fault-nth:15): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:00 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x2000000}, 0x0) 06:06:00 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos#', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r3, &(0x7f0000000a00)={&(0x7f00000001c0)=@sco={0x1f, {0x1, 0x2, 0x24, 0x0, 0x80, 0xb4}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000240)="4e67bdf3a6d48f72bd6bedd0bd04da122b38554acab462e3e78424522fa8f40a02a8594b0b4d49aa3bfb028413c2e47cb1c4f65e2b19ca188108ce24be5960dea56cdaa96f57521c1708d52217e01eb4f49e149fda", 0x55}, {&(0x7f00000002c0)="4d6d7f55eb223f15e2aaa2981f76e6f8fbb4d24387ee7f371fdd6db4d00bdaa5230e65ab7ba8cbcb4574ed20307d2705ba4be6502b554d4f8ad41764b6f2caa41a214852d6fb9c80b6d37cc5b0697ebf1df8b642e2df458e2123c8f8b7a88cf8afc7a4722d24b24266ae3d28520cf8f9641bdf223cbb57487f9d9068ca95ec70e1ad96a8efa57725c7c477503aab9445add7838252f8c833b3f1da470dae75ef0a3dfb7c3345f5c9048c35703ea6a91490da8e94486e7473d19fce7d2436281375", 0xc1}, {&(0x7f00000003c0)="1043a4", 0x3}, {&(0x7f0000000400)="670c04cd4ac6c242d525c9d9f472074d794b2aae4899cfb9ea8d155ae2fc1b63732f44fddc071229ac5a48e104caaea8d826cd1367483e71d251efdeb7bd081ba45fefafc2071d322cb8dc70cdb421f86378d62d124b71884a4968c2cc4d134d2651d35f20610c3cbf78fcf260a91fcfbc3d1cf850e2515792869d82c99ff60859f67569a44d217173c1e577f2bcdc4712f141e232c11a4b69dbe360c0af5e4ee75f7d68ca8eede75c765dd7c4794615ae178212f070ea9c8dbac7ac6f9455ae845c9e2b080c279408648810dc4565dafc000558", 0xd4}, {&(0x7f0000000500)="52f2c21b3b59b9ce7e4797fef8b19fc37160bc21a8fda16cb259614036d32b1bcf5c5d2deb87ba56797839cc785bd7dff6995b840d7e9da68cc93cbab08d13d1d7e963ee63f7f9dda542d8b6dd683dcb2636ce2c0b955aca983b129a1749dc23eed66767353653316c9b7efa5d8525b42c429056c9f1e3f65e666f145192a98c4284", 0x82}, {&(0x7f00000005c0)="7acf5c7a446ec620d84d47730d5d0b4c3f7e1209ab516b9e77a169da607ed15cd10516fa792c956e1468eb277aa966bc37be3e0aa834ba3c2af2bba0c75ee3248cd4677edf326827db2d75ed8ef0c96297df8ccc03b86a580ded9c5292d81e29a209ee3335df94aa18aabbd1edb90f14fcf9686d133a4e69cf222d6fe6de6024909219e19fac6a841889593895d5a160c97add9677ff408af1616767e38de0d4eb634fa9daab6d392f3746fbf2991984330658e6e242ceb9e93c85759e8900fc3346621ddc04e74ff53aea555a3b5bb796", 0xd1}, {&(0x7f00000006c0)="ec50862bcc727ac6a3691421d499e7ff097ab9442cd9b6b1821fd6dca907f200e9c0b42270fbb8783053d3fa8f4cb75d6b6a3c5e1855eb61684e355543821dd6c56f1d0eb9a807320022b8ee485ae18539f04f47a58acb1635a95fd6277faeee20463ffcb753d9bd7869881e7a40d9e36a98e37c434825e759a3ceb1d8aecdcbf7b65f7b734cb6c036f6b396b0ab2db31ed6178bb91a2a5ccb8eca7fd2c1d9aa7151d7e48d69024e578b3bd9b4f202c26388a4f3b6f193", 0xb7}], 0x7, &(0x7f0000000800)=[{0xb0, 0x10d, 0x7, "4532d4c2147835620f28c9c4f6f4670b19de48c3de4165a44d3278fec05dbd5ea91ad4d3b6b946881989b5dc42806ed6c510d08eda269add4298205e1de25c54af778ddd177576b4706529324fea4838cb8fe4db82c41111c3414c40604ab08d6f47a9130eaf0a5e96ff806b39b6380ffa50f152d3b460529835d88199251bc971ea2cd5c557b12d4e20275fae7b4c854c84cf3d002c2e4d4912f31d"}, {0xa8, 0x0, 0x7f, "2a59ec4a6c1aa4c4226c7f1c4dcf337902709e40537eea7626cf8ba943ba75498135281239bdd638c8bbbfc41d4142f214c2b5d9048a748f2d23f58ada9deb9b85e8bb52d606c0ec4c78907cf8be477398f3fdabf61dc4cfe671925a0014f0e22749ebba5e3b0969caba2063b2dedbcd419cf4cd7d614c75f9b530da9bfc6b07ae3c65aedd5507d50865ebc18cc6ce428182f6c81791"}, {0x40, 0x103, 0x9, "705c7ac00a886674dd08b022b2b9d63f2f4efba1319075399932f7c8696398fd7413eb26ebce83e0c4b543"}, {0x60, 0xc, 0x4, "7fc590dcd4b19398fb52b586817511045c408710210e48d839d813b035a719f8c74b72a7144e03e73012fd9752183472db7afbc15479889e1d59d50a213d14c0dae4af6f21c9c2c6bacd0aab"}], 0x1f8}, 0x5bf0af121dd2eb7f) r4 = dup(r1) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0xc4000, 0x0) ioctl$VHOST_SET_LOG_FD(r4, 0x4004af07, &(0x7f0000000040)=r5) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r6, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) memfd_create(&(0x7f00000000c0)='\x00', 0x1) [ 288.469165] FAULT_INJECTION: forcing a failure. [ 288.469165] name failslab, interval 1, probability 0, space 0, times 0 [ 288.498320] CPU: 0 PID: 22610 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 288.505446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.514826] Call Trace: [ 288.517448] dump_stack+0x172/0x1f0 [ 288.521103] should_fail.cold+0xa/0x1b [ 288.525107] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 288.530322] ? lock_downgrade+0x880/0x880 [ 288.534507] __should_failslab+0x121/0x190 [ 288.538767] should_failslab+0x9/0x14 [ 288.542601] kmem_cache_alloc+0x2ae/0x700 [ 288.546844] ? lock_downgrade+0x880/0x880 [ 288.551024] __kernfs_new_node+0xef/0x680 [ 288.555196] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 288.560071] ? wait_for_completion+0x440/0x440 [ 288.564822] ? mutex_unlock+0xd/0x10 [ 288.568662] ? kernfs_activate+0x192/0x1f0 [ 288.573096] kernfs_new_node+0x99/0x130 [ 288.577191] __kernfs_create_file+0x51/0x33b [ 288.581626] sysfs_add_file_mode_ns+0x222/0x560 [ 288.586319] internal_create_group+0x383/0xc30 [ 288.591114] ? bd_set_size+0x89/0xb0 [ 288.594880] ? remove_files.isra.0+0x190/0x190 [ 288.599505] sysfs_create_group+0x20/0x30 [ 288.603678] lo_ioctl+0xf8f/0x20e0 [ 288.607245] ? lo_rw_aio+0x1470/0x1470 [ 288.611417] blkdev_ioctl+0xc38/0x1ab6 [ 288.615429] ? blkpg_ioctl+0xa90/0xa90 [ 288.619524] ? find_held_lock+0x35/0x130 [ 288.623605] ? debug_check_no_obj_freed+0x200/0x464 [ 288.628660] ? __fget+0x340/0x540 [ 288.632140] block_ioctl+0xee/0x130 [ 288.635893] ? blkdev_fallocate+0x410/0x410 [ 288.640420] do_vfs_ioctl+0xd5f/0x1380 [ 288.644712] ? selinux_file_ioctl+0x46f/0x5e0 [ 288.649235] ? selinux_file_ioctl+0x125/0x5e0 [ 288.653754] ? ioctl_preallocate+0x210/0x210 [ 288.658381] ? selinux_file_mprotect+0x620/0x620 [ 288.663434] ? iterate_fd+0x360/0x360 [ 288.667256] ? do_sys_open+0x31d/0x550 [ 288.671184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.676750] ? security_file_ioctl+0x8d/0xc0 [ 288.681191] ksys_ioctl+0xab/0xd0 [ 288.684669] __x64_sys_ioctl+0x73/0xb0 [ 288.688581] do_syscall_64+0xfd/0x620 [ 288.692493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.698222] RIP: 0033:0x459d67 [ 288.701431] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.720469] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 288.728389] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459d67 [ 288.735777] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 288.743371] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 288.750672] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 288.757955] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 [ 288.802450] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:06:02 executing program 1 (fault-call:3 fault-nth:16): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:02 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x4000000}, 0x0) 06:06:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x41000, 0x0) write$P9_RLOCK(r2, &(0x7f0000000040)={0x8, 0x35, 0x1, 0x3}, 0x8) 06:06:02 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos,', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:02 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x4de7c1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) socket$alg(0x26, 0x5, 0x0) 06:06:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x17, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 290.727484] FAULT_INJECTION: forcing a failure. [ 290.727484] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 290.739566] CPU: 1 PID: 22727 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 290.739576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.739581] Call Trace: [ 290.739609] dump_stack+0x172/0x1f0 [ 290.739629] should_fail.cold+0xa/0x1b [ 290.739646] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 290.739665] ? mark_held_locks+0x100/0x100 [ 290.739689] __alloc_pages_nodemask+0x1ee/0x750 [ 290.739712] ? __alloc_pages_slowpath+0x2870/0x2870 [ 290.739755] cache_grow_begin+0x91/0x8c0 [ 290.762264] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 290.762283] ? check_preemption_disabled+0x48/0x290 [ 290.762304] kmem_cache_alloc+0x63b/0x700 [ 290.762326] __kernfs_new_node+0xef/0x680 [ 290.808789] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 290.813574] ? wait_for_completion+0x440/0x440 [ 290.818287] ? mutex_unlock+0xd/0x10 [ 290.822014] ? kernfs_activate+0x192/0x1f0 [ 290.826259] kernfs_new_node+0x99/0x130 [ 290.830326] __kernfs_create_file+0x51/0x33b [ 290.834799] sysfs_add_file_mode_ns+0x222/0x560 [ 290.839475] internal_create_group+0x383/0xc30 [ 290.844364] ? bd_set_size+0x89/0xb0 [ 290.848270] ? remove_files.isra.0+0x190/0x190 [ 290.852872] sysfs_create_group+0x20/0x30 [ 290.857020] lo_ioctl+0xf8f/0x20e0 [ 290.860569] ? lo_rw_aio+0x1470/0x1470 [ 290.864561] blkdev_ioctl+0xc38/0x1ab6 [ 290.868449] ? blkpg_ioctl+0xa90/0xa90 [ 290.872438] ? find_held_lock+0x35/0x130 [ 290.876512] ? debug_check_no_obj_freed+0x200/0x464 [ 290.882180] ? __fget+0x340/0x540 [ 290.885663] block_ioctl+0xee/0x130 [ 290.889389] ? blkdev_fallocate+0x410/0x410 [ 290.893714] do_vfs_ioctl+0xd5f/0x1380 [ 290.897700] ? selinux_file_ioctl+0x46f/0x5e0 [ 290.902195] ? selinux_file_ioctl+0x125/0x5e0 [ 290.906776] ? ioctl_preallocate+0x210/0x210 [ 290.911270] ? selinux_file_mprotect+0x620/0x620 [ 290.916128] ? iterate_fd+0x360/0x360 [ 290.919927] ? do_sys_open+0x31d/0x550 [ 290.923992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.929725] ? security_file_ioctl+0x8d/0xc0 [ 290.934140] ksys_ioctl+0xab/0xd0 [ 290.937594] __x64_sys_ioctl+0x73/0xb0 [ 290.941572] do_syscall_64+0xfd/0x620 [ 290.945374] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.951078] RIP: 0033:0x459d67 [ 290.954267] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.973527] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 290.981239] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459d67 [ 290.988594] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 290.995882] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 291.003151] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 291.010962] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:02 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x20000000}, 0x0) [ 291.055032] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:06:02 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000200), &(0x7f0000000240)=0x4) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$key(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x4, 0xff, 0x9, 0x11, 0x0, 0x70bd29, 0x25dfdbfe, [@sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e20, 0x42fb9105, @mcast1, 0x3bd4}, @in6={0xa, 0x4e23, 0xed79, @mcast2, 0x7}}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e22, 0x8, @mcast1, 0x45eba315}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}}]}, 0x88}}, 0x0) ptrace(0x10, r0) 06:06:02 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosH', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:02 executing program 1 (fault-call:3 fault-nth:17): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x80, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x40000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @multicast2, @multicast2}, &(0x7f00000004c0)=0xc) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000500)=r3) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x101100, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@ipv4}}, &(0x7f0000000240)=0xe8) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r7, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r7}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r8 = getuid() sendto$ax25(r4, &(0x7f0000000380)="016b3b3644281c21", 0x8, 0x14000, &(0x7f00000003c0)={{0x3, @bcast, 0x8}, [@bcast, @bcast, @null, @default, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x2080000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno'}, 0x2c, {[{@posixacl='posixacl'}, {@dfltuid={'dfltuid', 0x3d, r5}}, {@version_u='version=9p2000.u'}, {@access_uid={'access', 0x3d, r7}}, {@dfltuid={'dfltuid', 0x3d, r8}}, {@nodevmap='nodevmap'}, {@mmap='mmap'}, {@debug={'debug', 0x3d, 0x10001}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@measure='measure'}, {@fsname={'fsname', 0x3d, '@'}}]}}) [ 291.282242] FAULT_INJECTION: forcing a failure. [ 291.282242] name failslab, interval 1, probability 0, space 0, times 0 [ 291.304423] CPU: 1 PID: 22901 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 291.311508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.320965] Call Trace: [ 291.323695] dump_stack+0x172/0x1f0 [ 291.327357] should_fail.cold+0xa/0x1b [ 291.331459] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 291.336681] ? lock_downgrade+0x880/0x880 [ 291.340954] __should_failslab+0x121/0x190 [ 291.345295] should_failslab+0x9/0x14 [ 291.349123] kmem_cache_alloc+0x2ae/0x700 [ 291.353314] ? lock_downgrade+0x880/0x880 [ 291.357484] __kernfs_new_node+0xef/0x680 [ 291.361745] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 291.368784] ? wait_for_completion+0x440/0x440 [ 291.373394] ? mutex_unlock+0xd/0x10 [ 291.377125] ? kernfs_activate+0x192/0x1f0 [ 291.381466] kernfs_new_node+0x99/0x130 [ 291.385463] __kernfs_create_file+0x51/0x33b [ 291.389894] sysfs_add_file_mode_ns+0x222/0x560 [ 291.395027] internal_create_group+0x383/0xc30 [ 291.399627] ? bd_set_size+0x89/0xb0 [ 291.403364] ? remove_files.isra.0+0x190/0x190 [ 291.407974] sysfs_create_group+0x20/0x30 [ 291.412143] lo_ioctl+0xf8f/0x20e0 [ 291.415725] ? lo_rw_aio+0x1470/0x1470 [ 291.419719] blkdev_ioctl+0xc38/0x1ab6 [ 291.423795] ? blkpg_ioctl+0xa90/0xa90 [ 291.427697] ? find_held_lock+0x35/0x130 [ 291.431955] ? debug_check_no_obj_freed+0x200/0x464 [ 291.437084] ? __fget+0x340/0x540 [ 291.440572] block_ioctl+0xee/0x130 [ 291.444213] ? blkdev_fallocate+0x410/0x410 [ 291.448550] do_vfs_ioctl+0xd5f/0x1380 [ 291.452452] ? selinux_file_ioctl+0x46f/0x5e0 [ 291.456959] ? selinux_file_ioctl+0x125/0x5e0 [ 291.461560] ? ioctl_preallocate+0x210/0x210 [ 291.465987] ? selinux_file_mprotect+0x620/0x620 [ 291.470790] ? iterate_fd+0x360/0x360 [ 291.474636] ? do_sys_open+0x31d/0x550 [ 291.478914] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.484569] ? security_file_ioctl+0x8d/0xc0 [ 291.489097] ksys_ioctl+0xab/0xd0 [ 291.492754] __x64_sys_ioctl+0x73/0xb0 [ 291.496868] do_syscall_64+0xfd/0x620 [ 291.500698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.505906] RIP: 0033:0x459d67 [ 291.509117] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:06:03 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x1, 0xa006) getsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() r2 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) rt_tgsigqueueinfo(r1, r1, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x802, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r1) 06:06:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x80ffffff}, 0x0) [ 291.528486] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 291.536313] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459d67 [ 291.543689] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 291.551064] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 291.558546] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 291.565930] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x18, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:03 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x106000) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0x12) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) timerfd_create(0xe, 0x800) ptrace(0x10, r0) [ 291.614667] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:06:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000000c0)={0x0, 0x0, 0x2, 0x0, [], [{0x8, 0x4, 0x100, 0x2, 0x9, 0x5}, {0xa1a, 0x3f, 0x6, 0x6, 0x4, 0x1}], [[], []]}) r3 = dup(r2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000108000000000000000000010000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0016001800010014000b000000000000000000000000000000000008001b0000000000"], 0x44}}, 0x0) recvmmsg(r4, &(0x7f0000008f40)=[{{&(0x7f0000001640)=@tipc=@name, 0x80, &(0x7f0000002a80)=[{&(0x7f00000016c0)=""/144, 0x90}, {&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000002780)=""/118, 0x76}, {&(0x7f0000002800)=""/66, 0x42}, {&(0x7f0000002880)=""/114, 0x72}, {&(0x7f0000002900)=""/205, 0xcd}, {&(0x7f0000002a00)=""/87, 0x57}], 0x7, &(0x7f0000002b00)=""/198, 0xc6}, 0xfffffffc}, {{&(0x7f0000002c00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000002d00)=[{&(0x7f0000002c80)=""/74, 0x4a}], 0x1, &(0x7f0000002d40)=""/2, 0x2}, 0x9}, {{&(0x7f0000002d80)=@generic, 0x80, &(0x7f0000003100)=[{&(0x7f0000002e00)=""/86, 0x56}, {&(0x7f0000002e80)=""/251, 0xfb}, {&(0x7f0000002f80)=""/3, 0x3}, {&(0x7f0000002fc0)=""/54, 0x36}, {&(0x7f0000003000)=""/211, 0xd3}], 0x5, &(0x7f0000003180)=""/227, 0xe3}, 0x7cd}, {{&(0x7f0000003280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000004640)=[{&(0x7f0000003300)=""/179, 0xb3}, {&(0x7f00000033c0)=""/137, 0x89}, {&(0x7f0000003480)=""/250, 0xfa}, {&(0x7f0000003580)=""/180, 0xb4}, {&(0x7f0000003640)=""/4096, 0x1000}], 0x5, &(0x7f00000046c0)=""/131, 0x83}, 0x9}, {{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000004780)=""/6, 0x6}, {&(0x7f00000047c0)=""/161, 0xa1}, {&(0x7f0000004880)=""/102, 0x66}], 0x3}, 0xfffffff7}, {{0x0, 0x0, &(0x7f0000006ac0)=[{&(0x7f0000004940)=""/16, 0x10}, {&(0x7f0000004980)=""/4096, 0x1000}, {&(0x7f0000005980)=""/254, 0xfe}, {&(0x7f0000005a80)=""/30, 0x1e}, {&(0x7f0000005ac0)=""/4096, 0x1000}], 0x5, &(0x7f0000006b40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000007b40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000007cc0)=[{&(0x7f0000007bc0)=""/248, 0xf8}], 0x1, &(0x7f0000007d00)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000008d00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000008e00)=[{&(0x7f0000008d80)=""/7, 0x7}, {&(0x7f0000008dc0)=""/55, 0x37}], 0x2, &(0x7f0000008e40)=""/244, 0xf4}, 0x6}], 0x8, 0xe5ab78e8d051cd1e, &(0x7f0000009140)={0x0, 0x1c9c380}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$nl_route(0x10, 0x3, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000009180)={0x0, 0x0}, &(0x7f0000000240)=0xfffffffffffffd2a) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000009200)={{{@in=@multicast1, @in=@dev={0xac, 0x14, 0x14, 0x2b}, 0x4e21, 0x9, 0x4e21, 0x2, 0xe, 0x20, 0x80, 0x3a, r5, r9}, {0xfc00000000000000, 0x2, 0x4, 0x100000000, 0x135, 0x8f, 0x5, 0x7f}, {0x87, 0x8, 0x7, 0x1}, 0x2, 0x0, 0x0, 0x0, 0x6, 0x2}, {{@in6=@ipv4={[], [], @multicast1}, 0x4d3, 0x2b}, 0xa, @in=@loopback, 0x3505, 0x3, 0x0, 0x0, 0x0, 0xffffffff}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x0) 06:06:03 executing program 1 (fault-call:3 fault-nth:18): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:03 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosL', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0xffffff7f}, 0x0) [ 291.820080] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 291.866352] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 291.881566] FAULT_INJECTION: forcing a failure. [ 291.881566] name failslab, interval 1, probability 0, space 0, times 0 [ 291.925519] CPU: 0 PID: 23099 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 291.932500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.941862] Call Trace: [ 291.944465] dump_stack+0x172/0x1f0 [ 291.948111] should_fail.cold+0xa/0x1b [ 291.952008] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 291.957128] ? lock_downgrade+0x880/0x880 [ 291.961328] __should_failslab+0x121/0x190 [ 291.966002] should_failslab+0x9/0x14 [ 291.969814] kmem_cache_alloc_trace+0x2cc/0x760 [ 291.974525] kobject_uevent_env+0x387/0x101d [ 291.978958] kobject_uevent+0x20/0x26 [ 291.982856] lo_ioctl+0x100b/0x20e0 [ 291.986481] ? lo_rw_aio+0x1470/0x1470 [ 291.990367] blkdev_ioctl+0xc38/0x1ab6 [ 291.994252] ? blkpg_ioctl+0xa90/0xa90 [ 291.998135] ? find_held_lock+0x35/0x130 [ 292.002209] ? debug_check_no_obj_freed+0x200/0x464 [ 292.007229] ? __fget+0x340/0x540 [ 292.010705] block_ioctl+0xee/0x130 [ 292.014347] ? blkdev_fallocate+0x410/0x410 [ 292.018681] do_vfs_ioctl+0xd5f/0x1380 [ 292.022581] ? selinux_file_ioctl+0x46f/0x5e0 [ 292.027073] ? selinux_file_ioctl+0x125/0x5e0 [ 292.031589] ? ioctl_preallocate+0x210/0x210 [ 292.036787] ? selinux_file_mprotect+0x620/0x620 [ 292.041596] ? iterate_fd+0x360/0x360 [ 292.045393] ? do_sys_open+0x31d/0x550 [ 292.049465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.055089] ? security_file_ioctl+0x8d/0xc0 [ 292.059509] ksys_ioctl+0xab/0xd0 [ 292.063003] __x64_sys_ioctl+0x73/0xb0 [ 292.066914] do_syscall_64+0xfd/0x620 [ 292.070729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.076013] RIP: 0033:0x459d67 [ 292.079377] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.098549] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 292.106442] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459d67 [ 292.113881] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 06:06:03 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(r0) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_dccp(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23, 0x80000000, @mcast2, 0xe0bf}, 0x1c) ptrace(0x10, r0) 06:06:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0xffffff80}, 0x0) [ 292.121513] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 292.128798] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 292.136153] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 [ 292.162676] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 292.193535] audit: type=1400 audit(1571810763.804:52): avc: denied { name_bind } for pid=23195 comm="syz-executor.3" src=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 292.235299] audit: type=1400 audit(1571810763.804:53): avc: denied { node_bind } for pid=23195 comm="syz-executor.3" saddr=ff02::1 src=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 06:06:03 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:03 executing program 1 (fault-call:3 fault-nth:19): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x40030000000000}, 0x0) 06:06:04 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos`', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 292.444098] FAULT_INJECTION: forcing a failure. [ 292.444098] name failslab, interval 1, probability 0, space 0, times 0 [ 292.477725] CPU: 1 PID: 23346 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 292.484855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.494230] Call Trace: [ 292.496850] dump_stack+0x172/0x1f0 [ 292.500516] should_fail.cold+0xa/0x1b [ 292.504440] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 292.509594] ? lock_downgrade+0x880/0x880 [ 292.514010] __should_failslab+0x121/0x190 [ 292.518447] should_failslab+0x9/0x14 [ 292.522355] __kmalloc+0x2e2/0x750 [ 292.526008] ? rcu_read_lock_sched_held+0x110/0x130 [ 292.531422] ? kobject_get_path+0xc4/0x1b0 [ 292.535711] kobject_get_path+0xc4/0x1b0 [ 292.539811] kobject_uevent_env+0x3ab/0x101d [ 292.544350] kobject_uevent+0x20/0x26 [ 292.548277] lo_ioctl+0x100b/0x20e0 [ 292.548298] ? lo_rw_aio+0x1470/0x1470 [ 292.548318] blkdev_ioctl+0xc38/0x1ab6 [ 292.548335] ? blkpg_ioctl+0xa90/0xa90 [ 292.548349] ? find_held_lock+0x35/0x130 [ 292.548368] ? debug_check_no_obj_freed+0x200/0x464 [ 292.556162] ? __fget+0x340/0x540 [ 292.556190] block_ioctl+0xee/0x130 [ 292.556205] ? blkdev_fallocate+0x410/0x410 [ 292.556222] do_vfs_ioctl+0xd5f/0x1380 [ 292.556238] ? selinux_file_ioctl+0x46f/0x5e0 [ 292.556256] ? selinux_file_ioctl+0x125/0x5e0 [ 292.597773] ? ioctl_preallocate+0x210/0x210 [ 292.602339] ? selinux_file_mprotect+0x620/0x620 [ 292.607190] ? iterate_fd+0x360/0x360 [ 292.611014] ? do_sys_open+0x31d/0x550 [ 292.614920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.621035] ? security_file_ioctl+0x8d/0xc0 [ 292.625477] ksys_ioctl+0xab/0xd0 [ 292.629077] __x64_sys_ioctl+0x73/0xb0 [ 292.632976] do_syscall_64+0xfd/0x620 [ 292.636818] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.642102] RIP: 0033:0x459d67 [ 292.645401] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.664403] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 292.672405] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459d67 [ 292.679778] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 292.687149] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 06:06:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x19, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 292.694418] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 292.701776] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 [ 292.734895] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:06:04 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYBLOB="8000000096dbf478010f1a08420a8de57a011de06bd1e906454b721b4046e5a90700e9fba6b73f9ba4d0ba6b0bdd604572c4b5adc53a05b3e8b9f8de64b151e1ea8916c680c6f47dd02350162d4f2f5275496377f8f5ebd2656d0b2b97bfa91d6eb7cee38f7218dda4463f19a0be3ff5462d6a95b651d6b519092946409a5813d72bbb3f"], &(0x7f0000000300)=0x88) r4 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xa22, 0x0) getsockopt$inet_dccp_buf(r4, 0x21, 0x92660406a02b7dcb, &(0x7f0000000100)=""/89, &(0x7f0000000180)=0x59) prctl$PR_SET_PTRACER(0x59616d61, r1) ptrace$setopts(0x4200, r1, 0x7fffffff, 0x7901db0c6d7eade2) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace(0x10, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000480)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000580)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x12, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, [@jmp={0x5, 0x0, 0x4, 0x18, 0x3, 0x30}, @map_val={0x18, 0xa, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x7}, @exit, @call={0x85, 0x0, 0x0, 0x5b}, @generic={0x80, 0x2, 0x6, 0x8001, 0x5}, @map={0x18, 0xa, 0x1, 0x0, r9}, @map={0x18, 0x9, 0x1, 0x0, r11}, @call={0x85, 0x0, 0x0, 0xc}, @map_val={0x18, 0x0, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @map={0x18, 0x0, 0x1, 0x0, r13}]}, &(0x7f0000000400)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x3, [], r16, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x3, 0xdd, 0x80000001}, 0x10}, 0x70) 06:06:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0, &(0x7f00000000c0), 0x10, &(0x7f0000000180)={[{@utf8no='utf8=0'}, {@shortname_mixed='shortname=mixed'}, {@rodir='rodir'}, {@shortname_mixed='shortname=mixed'}, {@fat=@nocase='nocase'}], [{@permit_directio='permit_directio'}, {@euid_eq={'euid', 0x3d, r2}}]}) 06:06:04 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x100000000000000}, 0x0) [ 292.871761] FAT-fs (loop2): Unrecognized mount option "permit_directio" or missing value 06:06:04 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x1, @broadcast, 'ip6gre0\x00'}}, 0x1e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) 06:06:04 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x200000000000000}, 0x0) 06:06:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x1, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4959, 0x8000) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000080)=0x7ff) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000000)={0x0, 0x0, 0xcb4dc62b76530fe3, 0xffffffffffffffff, 0xd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDENABIO(r4, 0x4b36) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f00000000c0)) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, r5) keyctl$invalidate(0x15, r5) 06:06:04 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosh', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:04 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0xc2840, 0x0) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) sysinfo(&(0x7f00000001c0)=""/4084) r2 = syz_open_dev$media(&(0x7f00000012c0)='/dev/media#\x00', 0x7, 0x4) r3 = getpgid(r0) r4 = gettid() tkill(r4, 0x1000000000013) r5 = gettid() tkill(r5, 0x1000000000013) r6 = getpgid(r5) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$nl_netfilter(r2, &(0x7f0000001700)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x2c731038ae6959e8}, 0xc, &(0x7f00000016c0)={&(0x7f0000001340)={0x35c, 0x6, 0x2, 0x300, 0x70bd25, 0x9, {0xa, 0x0, 0xa}, [@typed={0x8, 0x92, @pid=r3}, @generic, @typed={0x4, 0x78, @str}, @nested={0x12c, 0x1e, [@typed={0xc, 0x25, @u64=0x7ff}, @typed={0x8, 0x5b, @ipv4=@dev={0xac, 0x14, 0x14, 0x19}}, @generic="333045c4422d51f2d59f51d0c3c904ed3b0394ad60bfb272bfac7da52692084f8c5691dbfea92314ff3800f1d6c7def64fa018a17c18fb0f5f8e14fcdf9ff124a12208137e408d25e03bb34b98a67429048be385886461dbd16249ec92a6f1137db3144375fbebd5e408c013e71e609fdaf02674decdbd64c592b800d5e81f33df509ceac4acad0f37837f1c72ccd87f9d79f7029633daaa6d216f96fc68fb38dceb5d7cdb72bc5df56a2dc17fe5855eeb5169e8be34f4c5500dc7d8007be84548eab14c6fe41a2ad30a136786b03a80885a0a5a41b607b3a73261d80b43cfea8ee4cfde7dc3ddeafce037198eaad88e2be6fc69", @typed={0xc, 0x4b, @u64=0x6}, @typed={0x8, 0x6f, @pid=r4}, @typed={0x4, 0x1c}, @typed={0x8, 0x5c, @pid=r6}]}, @typed={0x8, 0x7, @fd=r7}, @generic="9018f8f20d652a6603", @nested={0x1f4, 0x6c, [@generic="25a9c311cbe54ffb19ed8c1db10ca03dc368fec1f27316e8e541a015e60f18491469bea0422515a0e8f623dcb810dbd4751710ec679da4ef477f8a380add46f4a58d741ba7ab3945df51336014218efaf8939d2c29fe954b7f19e89cd662101b2535800ab7ed8430d3e3f412fe238a67f815a578eb8983c98da61e2410529130cde0384c1fd45bf6f4a724f798234bd0e6e11766148eaafc28265821bfe906ac8aa0b9b9ef9166de9cd2ff5a3d", @generic="d44cf54c5bf3c4d08c7d9aeed1c8dcd90e0a2b580e574cd87cccbf24f46d20765f9469782968408610367b25073675d849769a0a4d758571506c60ab059755a6031d042555ccd1f7a9750766f5c963ff7605928b0d22db360cc9c1764614de2d2b56e0eda818e5d86183d4ed12338182f82a58388a38a71bcd0efe006a76f169f2f72c6f9eae8c23088c16970d32f2", @generic="e96ef8b41b2109223a78c66737a04408e5d57bbe526cfb34216735b45c30bc9de0d5507f47d844362cc09a0d1229b1abbbfe8db0f25586155c1d041320217bb5660b2db214958c1db4ccf4819f3de83190de78805e556014bccfda132fc998059d5bacf36ac3b73cbf5bb7c0b4380df7fe6d6e082800318a56f30fa6082bc30f01a685916e587a1fd8a0503325e1af4c1c3bae7c8876ddc87f4388c8cadff03e73611d3869ca2ca3902549453ded99261050f5"]}, @typed={0x8, 0x84, @fd=r9}]}, 0x35c}, 0x1, 0x0, 0x0, 0x4000022}, 0x20000000) prctl$PR_SET_PTRACER(0x59616d61, r1) prctl$PR_MCE_KILL_GET(0x22) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADLINK(r11, &(0x7f0000001200)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r13, 0x10f, 0x84, &(0x7f0000001240), &(0x7f0000001280)=0x4) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) r14 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:04 executing program 1 (fault-call:3 fault-nth:20): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:04 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x400000000000000}, 0x0) 06:06:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0x7e, "840fd0e394e944ad564badc07445cd69280976b7ed6186354fc796564740fcedab152febc8cee419003e6b8ae048140ad5975e026b3bff001d2a31692d51b7832863835f4ffb5d97c8e76fde0ab8c9710c84090464b3a3fb21684cf1cbd5e5e8aaca386db768008dd57ad057a1f12d50930a19468de9dbe42c1b5f9aabd1"}, &(0x7f0000000000)=0x86) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r2, 0x53}, &(0x7f0000000180)=0x8) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) prctl$PR_GET_THP_DISABLE(0x2a) [ 293.424799] FAULT_INJECTION: forcing a failure. [ 293.424799] name failslab, interval 1, probability 0, space 0, times 0 [ 293.443642] CPU: 0 PID: 23976 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 293.450890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.460269] Call Trace: [ 293.462887] dump_stack+0x172/0x1f0 [ 293.466536] should_fail.cold+0xa/0x1b [ 293.470539] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 293.475664] ? lock_downgrade+0x880/0x880 [ 293.479867] __should_failslab+0x121/0x190 [ 293.484254] should_failslab+0x9/0x14 [ 293.488078] __kmalloc+0x2e2/0x750 [ 293.491643] ? rcu_read_lock_sched_held+0x110/0x130 [ 293.496677] ? kobject_get_path+0xc4/0x1b0 [ 293.500938] kobject_get_path+0xc4/0x1b0 [ 293.505028] kobject_uevent_env+0x3ab/0x101d [ 293.509557] kobject_uevent+0x20/0x26 [ 293.513378] lo_ioctl+0x100b/0x20e0 [ 293.517141] ? lo_rw_aio+0x1470/0x1470 [ 293.521051] blkdev_ioctl+0xc38/0x1ab6 [ 293.524957] ? blkpg_ioctl+0xa90/0xa90 [ 293.528886] ? find_held_lock+0x35/0x130 [ 293.533001] ? debug_check_no_obj_freed+0x200/0x464 [ 293.538054] ? __fget+0x340/0x540 [ 293.541542] block_ioctl+0xee/0x130 [ 293.545187] ? blkdev_fallocate+0x410/0x410 [ 293.549533] do_vfs_ioctl+0xd5f/0x1380 [ 293.553467] ? selinux_file_ioctl+0x46f/0x5e0 [ 293.557980] ? selinux_file_ioctl+0x125/0x5e0 [ 293.562496] ? ioctl_preallocate+0x210/0x210 [ 293.566945] ? selinux_file_mprotect+0x620/0x620 [ 293.571731] ? iterate_fd+0x360/0x360 [ 293.575554] ? do_sys_open+0x31d/0x550 [ 293.579578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.585131] ? security_file_ioctl+0x8d/0xc0 [ 293.589695] ksys_ioctl+0xab/0xd0 [ 293.593277] __x64_sys_ioctl+0x73/0xb0 [ 293.597287] do_syscall_64+0xfd/0x620 [ 293.601117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.606320] RIP: 0033:0x459d67 [ 293.609529] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.628461] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 293.636320] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459d67 [ 293.643624] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 293.651023] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 293.658569] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 293.666198] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:05 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosl', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:05 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1a, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x2000000000000000}, 0x0) [ 293.743775] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:06:05 executing program 1 (fault-call:3 fault-nth:21): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r3 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x0, 0x800) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000100)={0x1c72e1ef0d5803be, &(0x7f0000000040), 0xac886e77c6294999, r3, 0x4}) 06:06:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x80ffffff00000000}, 0x0) 06:06:05 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdost', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 293.970255] FAULT_INJECTION: forcing a failure. [ 293.970255] name failslab, interval 1, probability 0, space 0, times 0 [ 293.997580] CPU: 0 PID: 24166 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 294.004649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.014275] Call Trace: [ 294.016989] dump_stack+0x172/0x1f0 [ 294.020784] should_fail.cold+0xa/0x1b [ 294.024700] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 294.029837] ? lock_downgrade+0x880/0x880 [ 294.034146] __should_failslab+0x121/0x190 [ 294.038604] should_failslab+0x9/0x14 [ 294.042425] kmem_cache_alloc_node+0x26c/0x710 [ 294.047115] ? find_held_lock+0x35/0x130 [ 294.051336] __alloc_skb+0xd5/0x5f0 [ 294.054996] ? skb_scrub_packet+0x490/0x490 [ 294.059339] ? kasan_check_read+0x11/0x20 [ 294.063559] alloc_uevent_skb+0x83/0x1e2 [ 294.067638] kobject_uevent_env+0xaa3/0x101d [ 294.072246] kobject_uevent+0x20/0x26 [ 294.076069] lo_ioctl+0x100b/0x20e0 [ 294.079804] ? lo_rw_aio+0x1470/0x1470 [ 294.083708] blkdev_ioctl+0xc38/0x1ab6 [ 294.087702] ? blkpg_ioctl+0xa90/0xa90 [ 294.091701] ? find_held_lock+0x35/0x130 [ 294.095779] ? debug_check_no_obj_freed+0x200/0x464 [ 294.100822] ? __fget+0x340/0x540 [ 294.104400] block_ioctl+0xee/0x130 [ 294.108247] ? blkdev_fallocate+0x410/0x410 [ 294.112730] do_vfs_ioctl+0xd5f/0x1380 [ 294.116648] ? selinux_file_ioctl+0x46f/0x5e0 [ 294.121173] ? selinux_file_ioctl+0x125/0x5e0 [ 294.125685] ? ioctl_preallocate+0x210/0x210 [ 294.130114] ? selinux_file_mprotect+0x620/0x620 [ 294.134918] ? iterate_fd+0x360/0x360 [ 294.138752] ? do_sys_open+0x31d/0x550 [ 294.142761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.148320] ? security_file_ioctl+0x8d/0xc0 [ 294.152847] ksys_ioctl+0xab/0xd0 [ 294.156409] __x64_sys_ioctl+0x73/0xb0 [ 294.161178] do_syscall_64+0xfd/0x620 [ 294.165201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.170408] RIP: 0033:0x459d67 [ 294.173721] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.193122] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 294.201037] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459d67 [ 294.208461] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 294.215763] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 294.223139] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 294.230429] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 [ 294.356768] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:06:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clock_getres(0x1d9481c85ee1ee92, &(0x7f0000000000)) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f00000000c0)="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") ioctl$KVM_RUN(r3, 0xae80, 0x0) 06:06:07 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0xffffff7f00000000}, 0x0) 06:06:07 executing program 1 (fault-call:3 fault-nth:22): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:07 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1b, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:07 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosz', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 296.328223] FAULT_INJECTION: forcing a failure. [ 296.328223] name failslab, interval 1, probability 0, space 0, times 0 [ 296.354596] CPU: 1 PID: 24287 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 296.361663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.371161] Call Trace: [ 296.373787] dump_stack+0x172/0x1f0 [ 296.377550] should_fail.cold+0xa/0x1b [ 296.381479] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 296.386617] ? lock_downgrade+0x880/0x880 [ 296.390845] __should_failslab+0x121/0x190 [ 296.395114] should_failslab+0x9/0x14 [ 296.399045] kmem_cache_alloc_node+0x26c/0x710 [ 296.403670] ? find_held_lock+0x35/0x130 [ 296.407908] __alloc_skb+0xd5/0x5f0 [ 296.411574] ? skb_scrub_packet+0x490/0x490 [ 296.415937] ? kasan_check_read+0x11/0x20 [ 296.420121] alloc_uevent_skb+0x83/0x1e2 [ 296.424222] kobject_uevent_env+0xaa3/0x101d [ 296.428784] kobject_uevent+0x20/0x26 [ 296.432623] lo_ioctl+0x100b/0x20e0 [ 296.436322] ? lo_rw_aio+0x1470/0x1470 [ 296.440343] blkdev_ioctl+0xc38/0x1ab6 [ 296.444278] ? blkpg_ioctl+0xa90/0xa90 [ 296.448280] ? find_held_lock+0x35/0x130 [ 296.452377] ? debug_check_no_obj_freed+0x200/0x464 [ 296.457437] ? __fget+0x340/0x540 [ 296.461111] block_ioctl+0xee/0x130 [ 296.464771] ? blkdev_fallocate+0x410/0x410 [ 296.469130] do_vfs_ioctl+0xd5f/0x1380 [ 296.473056] ? selinux_file_ioctl+0x46f/0x5e0 [ 296.477602] ? selinux_file_ioctl+0x125/0x5e0 [ 296.482222] ? ioctl_preallocate+0x210/0x210 [ 296.486679] ? selinux_file_mprotect+0x620/0x620 [ 296.491677] ? iterate_fd+0x360/0x360 [ 296.495606] ? do_sys_open+0x31d/0x550 [ 296.499533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.505119] ? security_file_ioctl+0x8d/0xc0 [ 296.509597] ksys_ioctl+0xab/0xd0 [ 296.513171] __x64_sys_ioctl+0x73/0xb0 [ 296.517264] do_syscall_64+0xfd/0x620 [ 296.521307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.526660] RIP: 0033:0x459d67 [ 296.529885] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.549173] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 296.557016] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459d67 [ 296.564593] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 296.572063] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 06:06:08 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r8, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r8}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r10, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) r12 = syz_open_dev$sndtimer(&(0x7f00000013c0)='/dev/snd/timer\x00', 0x0, 0x2) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001400)=0x0) r14 = geteuid() r15 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r16, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = dup(r17) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r19) r20 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r21 = gettid() tkill(r21, 0x1000000000013) r22 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r23, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r23}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r24 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r24, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r25, 0x0, 0x0) r26 = gettid() tkill(r26, 0x1000000000013) r27 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r29 = dup(r28) ioctl$PERF_EVENT_IOC_ENABLE(r29, 0x8912, 0x400200) r30 = accept4$vsock_stream(r29, &(0x7f0000001d80)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r32 = dup(r31) ioctl$PERF_EVENT_IOC_ENABLE(r32, 0x8912, 0x400200) r33 = syz_open_pts(r32, 0x10000) r34 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r34, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r36 = dup(r35) ioctl$PERF_EVENT_IOC_ENABLE(r29, 0x8912, 0x400200) r37 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r37, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r38, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r38}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) getgroups(0x1, &(0x7f0000004600)=[0x0]) r40 = gettid() tkill(r40, 0x1000000000013) getresuid(&(0x7f0000004640), &(0x7f0000004680), &(0x7f00000046c0)=0x0) r42 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r42, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r43, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$TUNGETDEVNETNS(r45, 0x54e3, 0x0) r47 = gettid() tkill(r47, 0x1000000000013) r48 = geteuid() r49 = getegid() r50 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r50, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r51 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r51, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r52 = gettid() r53 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r53, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) getsockopt$sock_cred(r53, 0x1, 0x11, &(0x7f0000004700)={0x0, 0x0}, &(0x7f0000004740)=0xc) r55 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r55, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r56, 0x0, 0x0) r57 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r57, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r58, 0x0, 0x0) r59 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r59, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r60, 0x0, 0x0) getgroups(0x9, &(0x7f0000004780)=[0xee01, r56, 0xee01, 0x0, 0xee01, 0xee00, r58, 0xee00, r60]) r62 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r62, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r64 = dup(r63) ioctl$PERF_EVENT_IOC_ENABLE(r64, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r65) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r67 = dup(r66) ioctl$PERF_EVENT_IOC_ENABLE(r67, 0x8912, 0x400200) r68 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r68, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r69, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r69}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r70 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r70, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r71, 0x0, 0x0) r72 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r72, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r73, 0x0, 0x0) getgroups(0x7, &(0x7f00000047c0)=[0x0, r71, 0xee00, r73, 0xee00, 0xee01, 0xee01]) r75 = gettid() tkill(r75, 0x1000000000013) r76 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r76, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r77, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r77}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) lstat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r79 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000005e80)='/dev/rfkill\x00', 0x0, 0x0) r80 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r80, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r81 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r82 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000005ec0)='/selinux/validatetrans\x00', 0x1, 0x0) r83 = geteuid() r84 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r84, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r85, 0x0, 0x0) getgroups(0x5, &(0x7f0000005f00)=[r85, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff]) r87 = gettid() tkill(r87, 0x1000000000013) getresuid(&(0x7f0000005f40), &(0x7f0000005f80)=0x0, &(0x7f0000005fc0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000006000)={0x0, 0x0, 0x0}, &(0x7f0000006040)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r91 = dup(r90) ioctl$PERF_EVENT_IOC_ENABLE(r91, 0x8912, 0x400200) r92 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r92, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r94 = dup(r93) ioctl$PERF_EVENT_IOC_ENABLE(r94, 0x8912, 0x400200) r95 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r95, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r96 = gettid() tkill(r96, 0x1000000000013) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r98 = dup(r97) ioctl$PERF_EVENT_IOC_ENABLE(r98, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r98, 0x29, 0x22, &(0x7f0000007200)={{{@in6=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000007300)=0xe8) sendmmsg$unix(r3, &(0x7f00000073c0)=[{&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001340)=[{&(0x7f0000000040)="f3f92f9999e1cf51ebbad14cb60c5106bdf378477ab7", 0x16}, {&(0x7f0000000180)="b55ef3ed1c5de4b72568dc6f3e3032920daffaca173d0a6c511f392cf7c14ebb5de8fe21b0764d7084e7d59dba76c26e1aa297624902acd17877ecda8f5a5e9972134e7a09acd050ff4f18ad7b94d84115278501801dee9b9bce1d703f3f23ce770cfeced4a1fe760475af04d06f45fe60235264bfa3c41c0099cb0a325504331f80103f29c8220cfcfd2f66fe337734c74229626adb604270a8b02efe5ffb08bacab6ef31dcf6248bb081427f0f1bb2f26154c5f070f683b1c414141d6a3b6d910dbb654760a04f13b235556894c80916789fd7a4e52b09cb772718fa8f4ba86037e2874beb806e7238eeb1654ef9443e5ae291bb16a5da2960383e24cc17c04924b134dc248a38bae45988a5b4b4213dcf6f2d3578ba932944d80743b0ca5cc094c802edcf398e029ae707802f4765a718859de9d46381f3a266a1aee0e2528e36c5cb2279e5383dcd862966c43e201f2a7e483a8de493543f751ff9cfd8fe432f785fb1438344dea9563803297bc0f57e6e333c97df615d376bb4d2be00072a1087ccb6deb1fbad863bef6b05308686f198cbff55fa661f257bcf49cf1d8aa34102481de752578d4d4968ffde3a0a9a4b53e5e95fe7f76ff649d0e8080efdd54f22e70c83254542fb3c755e3b952bffd689954768e7a31b8b940e315e8acf845bb3ff0b41b95a7f16a6663e1762874e1fe46af5e9f81d794683c0b724fc767938aab4d8449c7201274638680fc25dc6842dead20c1485afcffc15b4c927feb9484acd971b0b4eb4c354783a7e98a179eafbbc5f1faa9735b8bebad90e3a78840708b46c00c85cb08d3b4771ffcb9c23daecd11d2837d9b184473dd7ebc4f47e12189ba51e4409fc31aeb44f2b62e5ad3dfa8f9cbbafd46318d54df952e5d9a8f4a01eaa8907644933d4262b952d1aa9c173d0ce63b02a729960cb49c99fa399d46ca178d0a6f9b637d2f764211033b2284382650c82ee25aabd89a723adb216981a2787e8d6ec6c1ffb193f2d066e2027b4e28bd19f26df0d066eca636eb4ab1016b35d6a75e4a04bf29342a8935211aebd1ddb6c8329032f44a5c63a1f1c52040f1646eb0d83cefb8803d0d2d6efd7cdfd9a24cec84e37153b64a3a47c546a82e9744a735c2738e52564aa7dd33e76581fefb3c224d7c6dcdc4f088526f9d85b7146a7e08e1ccf24692409d35278d26799c3ca11dbf2bde9cb5f1389bf15c1d50ec9f6a860f1bd0a0cedf28b0c01c3ee404d1460b26e4dd438f2641a88237a763fe85ed64ab26e4b1f567c41b78cf12d928af30d0bfa06afd483060de8bb516f8d954ab39bedf8f9c2c78f88e9becd171da62e5c64fb382b56ccc63c2053632a87f4c5e85061977be2c1b223e3a33185cc56be67493423d8d4ced74035317fa7f36ac03dcd4dac1afd7174fbe9f4a544dc150958d1940a1b1a3b625f33369313f7da042dc411774d9844840044b968a5eaf8762ee37d7a17cb710bdfcfac3ff9b50a1e4a140a49738a9a9f38cf7c2bf41731dc321678b3cdf456c3354c589929582b306c1da4ed6d431b666a0d7518bdc6672fa0fd076352e520480549cbb17c1b71086784dc190322346fd6e68699efc0e1d60a2e10c1ba1fc1b61989c54a0ebcd7691fae6732a24d7370fcbc020d75329f07086d7f6a2d05f964b7b93c93fae2ff8bbb6abb8742f74582d2aa0b963e41abbe818c4c71403699b2547c68d1e5b3c3c57366602ce7e0a6f82921ce915db924b074bdb4796dc9dc1397fc8c97d2a376e0c5cb9267f8feff64045bdef2f378c2cd706740e60de6463b139e83c911e655e5b05187ccdc127e5d7392e55ed6955ce6871beabb35d63f6731b35b5282cd72e14c1b4f9c75300b9e124ef0d3f3dc40dcbd70f31850e155fd0ded7b8d41a7749c5216b6c3a56036ff56875d0756473397b49621d3321209558586607a27d40c533d23cb03eb55b6f21ef42099af174040d0b5bbf25567c5d8eb2a500983630a54323266f6e61eca3e8a57001e6afd6f9a8df774430ef156f997f6945e7fbbd98095253da4d4520eccb6308ca32dbead1066ad27a553a20bce42e76ce1a50737531f724a577e2d2825be5640571133c72377e1b33565d944c1804c9b44d14517fafa262cff99c3461dcb23eeba2a5d9783ebc0d1423b7b040d4cc0ac4e8089c276695d6039a9d476ce25d16c9ae6b815b24aab8ab322a9d9ba7ec7f50fe6cb5a4536e9b3659df689624bd4e5e01ed98bd92a803e277144084bd343cd97c75d9c7da90b1d0e16c25551e60292bf6957b1cd6de620d2dde1c295328c1b71fe314c615cc50d6e6c76970a9a3eee0564204a3b36bb9ee3cf5c6195c2ca341a4eba358a55dbff2e7cef06fea768554520b5403d6aaae534ea3ce1ff8ae2f02a77952ddcb732e4e1862957c0060c0e5224e6eb7a7d9d889089f49a141682e108bf9fc6149543c72ac78711e1b5c9805ba186dd42822f3404763fe441ae84a04e14e99ce7d1df145682d94a417d83591176704d20687a915a059327fed707b7e89c29e852eda747133981fed7b75856eb902c474403b5cfa06f4386ca4b8ea2524eaa7d8818aad77193c9a102dc4c5853c90b7bcf03eb62202f7909205fd76cb78494ba51a5bde7372670a80da6b236c1108a2a0de5e9f12af45cfd69ef69cca4a6be3d611ef4b2fde55c3e362818ebf1065b17d37d46804245abddc8bdf69071d3d701965685571314dafb73e3b29e27f68e96f2fb48f45010d2ec14eb22f597ed95519254216d8a94203c3886e8e94671ab2de272d80617f4907fdd47668636263139299e49a174e63fe7b909361b901fffe097ca50351c918d5ffc0c06d204bfacdb1074e8251a23417d6e98aea30a4c84832ade46222247d9d2e23712e1d8cd50f0e346a51e65ac135fde2e63abe5a6493a4f00144c9ab5445040be2439fbf2c87f66b74d0c4dcd986845208ce6b48515cdf56acbdf3d4bd78a224f78912999e10575f62feafce37697d4444d9197141b17a611770023b22a7ef4ce5301b74ad300936b45239bff6a2b233a5c04b35dbb70870ca8a7d5a7bf17bdfd1e27d2bd61a04ebd30ac1e38ce0e289da2d6ae4a5fb12c1794adc9571c26cfb7b14a6684930c40fd18560a126623d3177ee25eee9e62be7974f44b6b57b66ec4a159e777bd0c89a78047728d8c9a191c366ceb57706c70e43c2d70d047d4a9833d506a4b548a3573ca7fb20c988c0765624bf3b9ffe945ba591c10570541085089d81a9f79613a5cc328a94b9f99d9ee466405bfb8cb6e80cf36a75a462775610f6c6a846d5dcf93c83e1422c626050a3f80db82d00a0296eb51838db1da17cac1dafa9d22fc9fd47e216216951808a5a889089ae6016eef8889f08f0b746fdcfc362dc1fd6e054d588b39a4b002364c243e91e3911703493ae593df863576b1ddae525dda438932e41a3a9e48c2f3095572f1dd3831a4391f50db9742ef6eff0a5a5a4305b056eaffccd33a002acd81ed725af0afa0f12aef434b6710cf133de323881d2bff81b32c72daa8aa8ddf87b0935f428f918acf28c28c1e6a54580faca73fc35907c2f63c50414bcbbbb85b226446f8e147867d681a9084f9ac782a5af938880a923d6728e4b130933dc7f03ad04ac6cd5bd31363da1c39cb7ce13f757c8b36f8e269b821431ce741ff30ac7ca08c6a64052820c8e5d0a182c3320bdc433f875de07eeabc0575c50b2073c66dcc267f214ddae5f7a1693be9774f1b878056598bc948140eed3603efe9a2d387e1dd76fb4c6f1a9af3417ef5f1c05a8620315963f8ce515688b22b47cb5602979234682bcfae5512216512296b116b9b7f0bd2e3ad27d3241b34512f1633bb91a26e765aabc1cdea227efeb8f4f82083a4bc2df0430b364d8b42b592330a6f429780438eb30c2a5b011999bf678afdae8350c1e3de4eba7b46fb5a2c93f2fae65bf29e74861e57a305a85e719b726aa688e9da0522459ed4722df6a8ccc4f70cb9e8d6ebc90bb25c745008e602026949214708d35603535ad567a8d3e49817ac61d4fba369c6a5e5921463bcea836efde6ebe1f59979f2a07bf1682e89289457cffd3f71a39bd807cc5c7a061370fc9f876ca0e05ba99e0da0ed09d5c26696808d400e24fa4a174ab6477d2b654ab13ff1664bd4cbe03758ae1608a4fbfb00da61a30264658eb9a3da1564065f9517dd92305664caa42c777438fb2a3211b9f4a419f1d3519daf5d14ab3fc69ef230f2be636ce460f81a5824c72e00ee411d5f15874e44f48d461ce06ac8eb09e5e81d94f55b8717e5f04496a0625bb271e0709f6088f287176e0b57de3d499b93fd55409ef74fca701d23773fa8883e1d5fdc0079987af74d35e21fda3dc6bb09a81a95d613d66c7d3725361dfb96c589b3fda964d79a5d262b16e7f3d2fd2cf445bfec242d02655f02f627dde01f7546a6d243dfcd297b17e10d3000ea15a6b3838e8f5807d1af0bc4bcb9fcefb7ce04aacce94e39fcb46f0c782adab885b601dc130bc438f18eb26c5b669d897c5c11c752cc5cca51fceca91c295098cbd606d8441ae901e3e2504abe189f2184792502e3041251a33faf9bcde0b021727a4d983a4afda5ba1c65ab9d94189a2968717911cf345fb8537a920e99a2bd20c149c73e906fea461345e3cfcf0cb294410b7d7a52fd202b356cf712aaa8c9cd6c1e0d607b7244361a5b3c8a3fa90d537d56249fc4b7f9a210985b40a176f79d805fa004992e69dc862d9ac024d46c71d02b4b3f9bd965c7e296d8393ecfdc6221c338364e6b48b5e817a17211412065f027daa1b28b99b321bc03089e854f7b91dfec2fbb1de5f06f19eb543b27a8b6d99dc03c766643d1dd6267390cc2e3f2ba384dcc14f2218f0008cae2dfd3ae9c1eceae3ee70667a2b73498fe6fca5a7300ca0eae3dad5164caef8c240d917e21f46b5da841595aa47fbb57171b92a634f576c48a4fa5f2ac4ddebd3cbae986e3d910cd257a59229f0533b061e51144ff741ab16b771b092b988ad34124a146b81cc22328e192d34fd5cce8bee53312112a59e910aaa862eacf61e36c4aa5d3fbde2512b1796c4596d3cab951357f6fab46ad49e202309b5a9b2bf07f08d077e6de9ebeb58ce8735e6acc4a7b2bedc07557b849e034f7607cacd3db6ed9a12a8fd40234d897d75ed0cd5723f9504e8abbf8ed7c1b40a9da63243fdf7b47470d8d98f1bceda85498dc3da4fc0a2e78ed64c081b855138a3db04e15879d560758a97b6d35f731ec8c7eb62c1eb1d5b2d1da91648d9a631509cc01ba2abfdc4fe9cfbaa69d528e0bd6cc7cacfdbc24f8a725d577f9ed00492b0ab0437711140b4a7438a043aed989a2a71c5a56e816726f3de5b523d8e9b34ab051718e16ff6e8ea0113c6c7dc7426c051741a7fc91bc6d1dbef4063e11e275b69f208b005d06b88c372d3dee22fb4ca19a6b2fc41d6c184d4877605daf1e2761fc7f674d6ad0a9d81dc0be181762e8efd42e398a22c5f0382fa5dc4f24762f87a34d9b1987dd820281d4339bdd552395e8a3e58516a26e97ade262af4adb0d782c0ae262a25da208121d8c40d2394cebfc7f7f80f13fe48eed39f6561c12301e0ad86520df9beabe8f0cc1542e78511f46264ec66c336a7a6db3a3846279a17596589e2ff2f617c2016b053f25fcc82a8805c2c9442bcb7aaea7d5587073fb45e6670038e3cdae80c395b46f53441a096c177d84d3f7fd04ac866d58a0fa18a2afe63c36bbc40f8e0b93f40bdf505502e4ea6ffee059e28e6b1febaa2b", 0x1000}, {&(0x7f0000001180)="f5a466b48e10de61891c9c48976c87f471f737a693033bae03fcb88d9314a89a7f57a7eaada34ff15e169cdab6d1be2c95ace14d5eae", 0x36}, {&(0x7f00000011c0)="ce2c3634208d817aa76f5e2c697d0cfb53cdbee1f8c604538c0c804d9aefad5b6be4de444040f3f7cc10302be99e4dbdbf93dc1c9072e142e55c17e21208e8b55bff8f706e93e816ecff87516825c22dabee823e90709aeb5453900ea0114177d8edf64b8ff4fdf22295286797c23f7ca18b3a5bc04a6eccb951ee7e7db110af7d8645e9ff60ed6967800a1052b9636c6a957ead085038eae2722fb1d1316f027beac7f990f4681ef3b4d48c2ba17871e27e9e442d79cfcecd9712e88d9fa0f2992d5720e91c57bc0faa4c4dc9289c3508727ab602e623e3f3608bad3536b3d982099d92c3763738e8084bb1dd78734f46aa", 0xf2}, {&(0x7f00000012c0)="bbc5f4d63fbd5c1de135a782ef858e01820f9e24c2e0bbec4fe15b5f4bf379a026a4c321a4011a99863c010291dfa057ae6625df8c", 0x35}, {&(0x7f0000001300)="2626da995907", 0x6}], 0x6, &(0x7f0000001440)=[@rights={{0x18, 0x1, 0x1, [r4, r6]}}, @cred={{0x1c, 0x1, 0x2, {r1, r8, r10}}}, @rights={{0x18, 0x1, 0x1, [r11, r4]}}, @rights={{0x1c, 0x1, 0x1, [r2, r4, r12]}}, @cred={{0x1c, 0x1, 0x2, {r13, r14, r16}}}], 0x90}, {&(0x7f0000001500)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001a00)=[{&(0x7f0000001580)="242ae2f9556edacc83c0d54fe286cb9751ac1ebf94a32f295a0ad5", 0x1b}, {&(0x7f00000015c0)="cabd055eee570e0a209dee9a49b4af01e367c05b961d609377272c9ba6247f4c171cab50bc2de04057d979350c26c08f3cd5cc17fe989a27b593df2ee8ab62edfb91cd207af182d2fe39", 0x4a}, {&(0x7f0000001640)="22a642662360f68620f6122bb07c4e5a1ea7acb0a81763ed054cc93df8d360720a21b786b93ef172a080a5620e8a31b14c91b125e79e0f775b4ceec315579bdaf7589ba93128872f13217de2417a9c731c7924141ca92330eb2e78ee256edb8ccf05ea31899d65ef9e08aa3c2de5469481965f30c3257fd1629795", 0x7b}, {&(0x7f00000016c0)}, {&(0x7f0000001700)="bc898cde2f9cf9e66b99ed3758790660496df487fa652c9ca788797474516be63bac0167985cc730e373fa5a1eea371c09e60db0c490da5e7faa07d0742922fd9eb8eaf0b4b1be10bd47f1bbce0dc2bc634692adbf6e91e6938164fd37661030e387a412c1c30990b881ad6a6ea64c010b62855e7013c3ccdf2ca6f2238c0b592381ef09f5ba2c5f0c23c6f59eaad4da6581de05f302fb8a482cd77a0c02c801c8f2093978dcec7e71339292dd", 0xad}, {&(0x7f00000017c0)="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", 0xfb}, {&(0x7f00000018c0)="26484ddf0eb58a3509ccbfc80d0cc8e98a0b8aacf5d2cd31882cfebdc2bbb95b2e1a949437392df101955c1579a29071642cd63803314001e0368d4309430742b02268b062ee1685e5182c01455d7b80c8709bd40399c1d0db16327cad8aa060efc15352238786ef10bd82760c26e8e37dde7a0a66c49e6dfd74eae9cf854e58458eeaedc296530bfaacb8f2cfeb6ce28151d4f80ee010bb26b31e54391efdb3472b85c5333c09b5a53987157f1f05cb10a8e8", 0xb3}, {&(0x7f0000001980)="8152405c5e044d155f1c164792cdeb49a1f1a1e62fa2f6f100356554e2e0753a2603d4a0d3f8ed6c1b6260ff159587bf66e5ed520377decb2b20f68cdd8fdef4a525f4cf825ae8", 0x47}], 0x8, &(0x7f0000001a80)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r18]}}, @rights={{0x20, 0x1, 0x1, [r19, r2, r2, r20]}}, @cred={{0x1c, 0x1, 0x2, {r21, r23, r25}}}], 0x58, 0x4040}, {&(0x7f0000001b00)=@file={0x3, './file0\x00'}, 0x6e, &(0x7f0000001bc0)=[{&(0x7f0000001b80)="9575bbef34241e980b5d64b1676d4caa4cdfa9133ea6001aa201", 0x1a}], 0x1, &(0x7f0000001c00), 0x0, 0x80}, {&(0x7f0000001c40)=@abs={0x5f144aff216c37cc, 0x0, 0x4e20}, 0x6e, &(0x7f0000001d40)=[{&(0x7f0000001cc0)="c82b5e9eaf8e093d0db6e1a95dde86fddf55bfc4aa79ea9697e7091fe992653b9dfa198923f85f8af32cad564f7e6e8a9d6dd68b319911af96ad77735bbaa8b7211fd5f7c621eef25f0a0de3d065f2e79dcf99afff1c781288542525529addf8d1", 0x61}], 0x1, &(0x7f0000001dc0)=[@cred={{0x1c, 0x1, 0x2, {r26, r27, 0xee01}}}, @rights={{0x28, 0x1, 0x1, [r30, r33, r34, r36, r4, r4]}}, @rights={{0x18, 0x1, 0x1, [r4, 0xffffffffffffffff]}}], 0x60, 0x80}, {&(0x7f0000001e40)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000004540)=[{&(0x7f0000001ec0)="cf950e1dbf8416ddaa933bfdce3850d01f0bb23b7ea04b2008ff9054bf4dbf4cd2b99ec0585a0907d767e24ddbf8ea779a8776645364c23c32c9079da58a8d6ee526e481542d5f4133a7d7520abc40999934c9ecb0a485407dc81c10ea032d91b5d8e3c142ebcfb56a7ab6fabdb2a1a754978e5c0d2dfca1e59a0122de5886f89ab05557f26839104a1f228a9c1a17be2f4a82a035c95ae59b5ec8c1687310e9989463b968ac117c889159558e77ef68dcb357f168ba89952ebe3c047d004902ada8b4f9384ac1be5e1147634b274315e2e3a0c5a0e94b17aa", 0xd9}, {&(0x7f0000001fc0)="91e0081b41e0ad99125d4312419b3ffd105fbe9f43421648f8413764c8abc73636278c3d4416c5994bccbc82c059a2a01ec7229a9e0e29b1b1d785929faecd1cca3b1168e0dcbd839a93a75b5b0058af584ac5d85a419efff3c2ced3dbfc88bc91603d49cc3c02e47c8998552ff91c40ec4326b3a4ea071846ab7cf5d1eec4032f82be5e85e4469a880819390f87d8979e04d4d73e6d3850509bf90b2a841ce5696518a7a712cb390db0a68bae2625e3a87f536f4157f716e217bea6a7aaa3ec0181964908f87b4b1adadbd7b9c99288082cc02af481f600f2575df7090900ef51d2d4b5fcafce68577e89d2dc012c33047b7eed4731f4db2725b03a9ce7fb47d947e19d2e1446dc84322c2ace0b326b13de588c5526a6bb0c14138f5487337c63f196fc9b479bcf2e3ea6c862bfbd025bd8981cace9323ffcff6d9c3a2d3e824af134118e8d1b955eaa797bf00f93fcc68b5cba44cbe9054147cdc93f001d9d3df261ccb6791f5c942d66a9256f6f0b9c2a4a916ab61e948ac702d16c3ced6610681cf649b308c69d5d8826890ceb933c8053de693820c53bd42921399fdc97e45e50a691dc2d90aa59a3d1730dd1f7de54dcb22e1d761f9dcfedd855b6c3cb6d36ed389626d84c444258f24d7ffcada9411b307dd2e42cf0a01b59a0d6d97c8c35be7502d74338ecc20cc772bf04bea2f379294c8a0cdc9654206e6cdd240b8b8b74199d9d88e7436135fa59bf729861f00611e7b0b57ba5df17c78997cd9bdf24c8f121b8e00f671d919c20aedcc1f4535a73aff3380489b8d3d4869fc43b03a5da45c560e36b8abdbdcbad82908aaa8d0617f42f52bc7ea9c224db57ed25ddcfa69d9af264fb6384590e647ffe2dfcfb91a40ecdc1189ecc922e54eda5a63329678fa730506a61464ac22a0edd0c2e3302bb047364b99e23f028d55628b5ce4de833ba26bbbb58e22f8422914e34e2aa36abe830db2153782d7ecdfbc963581b9da9ef3102f3a935251dd271f6b00e94ea91239d3e1ef8c0372ae012822c3068a0a014c46c6d3409d92ae1786d7780600dfce23a2893d4e5cd374c8fa56e23ba9b203b18c31a8c3ce0ce9592c0cd8adffab57095b36bff0207dda4fcac7319f83a0f0963fccf5681b6d1901b20d5c79f4fbc7317b9d266c4159aa5219d2e93c80856227e5b9083138aafd6b3d2c8b782922276ba3b0b903af85ab3a8c969d28c2b342b3b0bd6eeabd4912f0ec20003355cfcc441ae70107713ae9597fc611f93f72debaa9def564495f5ee12f0007fcc461478da6f4d69cee284f0689127fd634491492008c264179ee0386852ef412a072dffa32cfd0225ab6f853f2f8b274376ed25078d704fb92252ee3d07668da3ac08600dc68cbbab069259c0d707182b8a33442c64dc7c80e7c037cca5bfac83460ad8358aa8425e2b12cabd0f52d5d1079fd810cbd2ed77b741441e8683c2ff6dc93eb23761e97a153584595d2e03781890db49e1f7ae58f4555ca1aa55b53528b7e1ee90ec7071da56a76a98ac0b85155194b650a595738b885aa9df3f220df255e12f5af1e4a381f78dfabe5e542b9b30bfffa17f6cc635521925402b5ad89d13e5e0b7b0b605735d29fda9a225cb277db5a451158ea113335d7258f0b47906a62124af27a829191b94b24ef3a559110b745c45f90b279a900681f23cb5047a38c09bdc876c273c7938258e2fbfe8c8a21f649e8f815c340fef836d2b87b9e885bae7202b3de1e8774093e43b90f5325438b07728d3056e31a137cc063a1be68fa7a8e602ff6ca9bd175f82740c94b7003094f0e28a72e24da418f1f1fc0c7df0cfb4321e4b1af6853c0e81df9f60a95cfb40a5e0970f97e7a77b0a6cc2ed093b2e1a68d9b8e582d567dfcddabe55d63d7c4e5cc5f6499cbbce15e1190d1981f78cbc49248b63aad717ff1702f9bd2e2d6da549e72dc57217894ec8493d4fe10cc5736ba18174a4da4ec5985a2395e8a776e2b00d316cd6037949d2714174889a956e77b7daa43cb854faa1ecb9bdd029257cb4333a32d9efcf677b0675387c87c5b067d63403814d38d0ebc4c8e039a673cb72ca3240b96b88fb2692651ce48ce4cdd5af06950bcaa7ebe58cbf7ee6d42f57d67670d2d6d68930946307d609ab2ea8fee1f6b68a5e99325eca697ead30afaf6b4a1a9e4de125694fc39e13c1b7a45d91f30835e2688dd3a4193572f9a2f85c2581d86d6de4c244750f824b68096ac2cc608c9ea1f1a77e8222974d214e6892f7e45aa0a6b9a10d9e7a5e045fae7206f69e23225c6679de67b7eb14b85a08588e379b42a4eff59e82da0267876cdfa506336143faf770e77cccc155e0bd55a76b19f976c9007cf91b4d904c4dc99606ce207f0cc27e6d12f5def656c61c50e6130d2b662c96623339c3f9ab12b1597f6e99d6bc2966ea8dc5cf3111683b876730d39d69559a7279fb469d66f31e872a7c28d0a59ee269319d4b5d8c99993135e363501ac9683dffdc9a06c62508f9df7f7ea089ee6b88d8243abd19e27d0773a20908904691e08c6f14cee4b76ecb8c37d77256188507b4990fab67b6e11b43ed134f3d45d1ebfafe2bd21ef7b38918886263c0e5ae77a6800604b5a0a1bae2ea9f66facf42287385bd3e7edcc8f74e95f750045ebd192381aa0f1605904363e980110670007f6bcf63c36804870e3b76da5291c7e1fe777d213aabc382ac85869d42f82aa1727a533fb9ca910ed8bd8024ff7b4b31df49d3daa36689c917f3cbc56a1cc891934f2b02f7784e52d89a0a9e70d53d43957a35338127d98056a2669c5e49d3b3b5b2d7031e131d2eaef208b1474144a4600bd41edb850e6a003738ae95a7a9182c3ba2dec0e5262f08a9edbd078dd31e62deec9657d6f04a85ae12b9b17979bdd204de9a7339a1a82e6e4ad60d89de7e61cb5137f4078a2a3a3e576a182cc2a0802d46ff2b90f49aaff0f2f4a95b07ecbcd187beaab9f2270b608ef8353a976edf0c0a88dc0d60ce49b9c3e056f0596975873eef3cecae8b786299af959de6832769e720bed0cda9eed556f1b6f36efed3238405d6bd0bfce434bd4f48bf7689267486ff6da2b52e4479e5123be4ead220f59dea8cdb19f9a1cfa2dbc5a535ec3e7ec432de0314fccf0e91efe8c782416ffa071717afd356ab66d1a6e014c533e11854389a0894b9255dd5c7df5940449a317e9859fed173d5190c02281142c09d7c59646b284fa470cf58b8ba5725172a221a9935860177151bb61824342336519ca2e5416a8749c9f348e975dae0634b97d310abdb7428105e42e740622450f85c12ee9ee8261155b667270fb60e2bd21d79a48cc52a25d09254430e72c444ec986b8d85d0c1ec068adf2e8224a520470347c7a1be8b6842ebc2cc719c8139f5e59b0cd3f35a7a18b03a0b06ad22ed38c178928775b2e9ecdbe8a62ffcc45af9d24f5623ce7094156c9720102d6eee30a67a8bb50e4370112e194b0d0b271246a5b3dc6969a4104836c6f2df23634e10bf28d348e493585fb88ea3f558c801ac3f5ecb7f1c37e29222412338a8f5c4ab5f3a8ee35e8a403eacfa18c00afab3bfee713863eb0da931563d0b7d7342220a7156fccaf4f266973c95c3d482e8b9675625111283d9da1120ba26ee6277b9b087d0230d1bebdeec3090a632498e9516229bf223c90a231b18108a298407845bcc7bee74ac5226498e64fccfb9ce3b6775fc3989b3f532cfbd505bd0e1902623d82ec363751a469a194490a8fbe17724259dba004267bad78cc2cf564f1be305461c90135e1e94b86f1a5237c84ea31b7ec1a4237c0f61d9decf910136e9812b8091f91016f57cf5a365cd5aa79c4dfa3a2e569915dc8d29d40f6f3c66749d9a8495efc817f51c73e1e65c90c5a78bb7f7dfe7a4168e822db5aa459664569b25314435888b191b164f7189e3ae321b38325fa831988dcfba24be36fdaadc1ba95cd9fe137ce4ae79d33102b1b26081a0cea335ffdef0c174292c7d8a56c458b36e6d3dc0e5da8441e2c69a3bb49559d105bf6b2ba1d4113bc1f77000738d28c795baf4f1f53cdf3d271a389b6b44a401b430e616c350c3f6a2461f53f4d1f95d810f31c08b2a0a4e85d67490f417e2c3c5be702debbfe43ae202ba6b885f2c0ff8364995756b7718197403327aa0133f1835bb793970744b1f962a0846f420c094224d6a4da1e0f42d22dd04c57bd51a970e16cad102fc06d5d2e7f1ffc7e3504101d015257e1f79eba1810bbea06982369068e223910dccadecec0ab2b3df4d3089675c56ff7a5d165bd9415bbe4f6e74876803f8202f87ae6f81b6529c62c2b2bd14b674089efed370cb4224bd23c15c394267b88d2de53fc5112615017041c9a1ec1993374f7a03cc21d5525870971239ed59f7c86ca78206ff42307841b90c94a3cab6e213bd36dab87bfb264c1738cd1ddfff9e6d357b3298abde8d4f1557b1fadb092ae8008b651ba23cad384f829321b59a663b2a08acc5d607adc86a94e8cb8b18c9ab14cb893503f91d764faaeb5a129f98869028a39d8839fffcdfbb06a967cb60ba02af1b65e3d7815b95bdceac005f80719d4589f2bf94ec9eae495a728ce4189c154b657ae3d277ec09eefb02137ddf55ac3bbbf7d126a1a5b09fc7a4c701b7497ce6ff24b55856ce5d0fd5ade36cb8d9592ca75d102addead0ff6e987ef87515d2ec7bca29539f979df109562a930131730e43ac32b6c258a7564b01595cd4010ecb9c55d7cda1b96721b14602a7156405254863862cee7da1dc47c1787313debb180beaae744cb17318b4c53c57869c377c6dd7635816d0a9f036e19ac4ad1740677ee44b0c5f2e1db98cb1d9cbca9e122c09f071669561a6bcbf54078f1fa71ef1a2e7796c617fce2aff146d6029056c0c3b89a99122e50b099fdc4f4f7fd6aeab613f08cddd00b110a11d6db88f575c49cf6f5ab4d0dfdda5ee8f382b6acef674ba19e6d776b0646dba885d4bc9527f1805d10243ff86e43f3791777ef4f76e203fed71713ae0bde55a40de377502691311086ba97817637f5d3ffa854cac077b0aab228c00f781de16386981f57ceaa4d46ccaf036f0d99fc11f7ca8b27a1d148f4e6bd220448e37bf2e24eb6aa1aefbb8a6088aaceeeaf1880d9c0222737a60ff8abf447c5df229444aba98a29a8c2b9ac23c4bd70f64302d6a3a44f58470a747affb207bd72ce2329e9927f193570678a4f94c7ca0f7bfa5a645101b45a2df4ede42cad72c74e0aa194bcffcc62924f1e518f2ad1a8b62cdc9cb4f73e73b46c4b784d0de391dd9277fdbedbcb551e0430d1d961cf357620a7c2697a18fe2c16471ac08ed1f6170c6a4299e6695d6a239912194a0e1444d3845a127f6de1e084e08cb20b94e31cf994a311005842012bdc726716e1a9cc38fc20c3ef178b28578f4dfed040ed4322c5d9f7af6eaf2906eca400f2aae41dc50a21d821e0bc7501eb73e41dc40ded5a1d59c5bfd5eb6d80c60750c78d0e455dc862fdc35e688ae1f6dfe5f590afebf9e6c7a55db7c9f22be0fb49c2f4c5c60c1c2432fad758707f6c315dbe275006e8757fd3c766992b3547a65bd79222e78e48cfb6e29005ff35c4f719a06e3c2a805a84d5a74206beb43d40b31477808bba2228d5faeb8df350f9f5a64a320334028092151ecaa63a91d280f9aa0872a54bac1448905fd1ccfc58f197dc439ade413e448f136b3bcebb2d6d7416a94dc20c4ce3349458486798ab3fd83136e0b4361a6a6ca2d63ea5a91f79aee05c458d0abe8", 0x1000}, {&(0x7f0000002fc0)="b32f8251c69404711f2a3de0fc7a9b954dc182f5d3a9afcce1b3c3c164890948ed5facaa54a2b7bf8e1bfb64aeede6d59d24cc2221fb3ec8c17f1666195391536c7ef5c67dd2afed35b63f96babda4df9ef999b68b167776bc895bff98f2c702e2f7aacee19bb494b12b73992b4339ab98195b74c0b44ccbbb14c28e0300b0b7947e2202bf4c8602075aeda609776510d7fb179a65da1e89f0d54ab6a2aa70ceef816a750219878e39a24c065cba30f93be479f74cea3273085160aa634e17d55d52ab5819488a72cc6a5df254e9351c5c049574bedc951ebcf9528a58f46436d8920acaf4a1", 0xe6}, {&(0x7f00000030c0)="74863a109e300f6ea9775fa2a5ab9e9fd1d80d2df619b269aaaf1116c77827239d7f4f87d656663894738f6f5db0f8c98135ba07931b2a780f26f3a1db97cf2d517a67eb02ef9e1f90993ecce9429804dc544105d6e4c5f3a572d5ed41b48cf9901961982a5815737f3cbdedee41ca89f94501a2f9ae1d9124728e96781b864aefb6b99f13e9b2f47365750ef0c663d58d7b15b6ae614472e83813b201918caa90b6972a5efd0e6e6c8a8378cbc456e75d3673d6e5ac4c98861b8598c4332887af73b731f786ec6e113f7a299f48d3eb9a640f4a8c68a58143da3d0d27cd", 0xde}, {&(0x7f00000031c0)="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", 0x1000}, {&(0x7f00000041c0)="881e6ab11664611a53bd65104be8f9e3", 0x10}, {&(0x7f0000004200)="68c54bafa6ffa187f8984ea57f3ecaff248558215fe42260f0402ac417cb4a7e739bd9e59f84cfc1ae41f9fb6a4e1a82d4db90179577f298bbd4455cd462e494ffb9337dba9afea4aed55d2e0d40ca4f1839f1a07aa86fe07b22d8b72ad2e8e001140cdc792c3ab13dc930e24f4ee364056bac1353c8ed23d6105ee82a22715d65b270b6165ba5e8adbcb96142350db9ca4a1d2a7879925d5b968743cebe717896d1d968fa72d1ec587c0dc1", 0xac}, {&(0x7f00000042c0)="94b4b0cf307d9d5e2c5c33ed0e43d507004b0cbefd131feafdb6e621c9235de8ee6cf0762cc410f43adedc52327e2e198adc77da8dcc1e3597f0d9ed827813db2287add83639b0a7c016d7a47a03e6f930db2e3f25dda34bd764c8ae6cdfe2b27e02faa57019fb7da0a9f2b1df0af62b1edd93d667f61ff38573af4eec1b8c81457ccac37410268f6d78b3", 0x8b}, {&(0x7f0000004380)="fea1303522011a3d083fc261011628f335dc5c3ce93d474d59ba8c8fc32bec76120ad729a6b40e17b112d452664b60de9f2bd18dc8d6d22f6f4857c1424829e4d9a25dd65d2365d2de49f0805ce5482d4ff2856ec40bc727192b689f7588f44249368f7d88019ab74f6974bd4bb4b79917d95e897cdb0d1dd02462375b3e1ef82ec4109768502dd6e8eb83ac424961d0bfe08ccb6acb0878a83c86ad7cf82ea7e4a2d6585b4d0cc0", 0xa8}, {&(0x7f0000004440)="c34553f4e2f2869af6e3f46f4f726ee2d138d871b08b396d797097ea66cb5935916316891a76e1e5a52e339aa34971b085a5d716da0aa6dca3553bb67132bed2ffc55bedb3a8a24a19bb07f1246565a3ceffe20d86162f0d70756c4efdfe5b328454d76059c76853479a831c6dfb6d500d49fbf99403e244228898e447efe1b225dd69ab2a41122f5d82c713f23a1202147d2b622c281e9e6d67ad7556fe30f799bb3eb378ff5c76396674b9ddc47705c4c6b8b9aa11e3f13fa142c56126beda3efca395340d984fc96e297c422630e5969603df8a82f8da73955855395782622b683e8d6ddb92c97c437ba3f5c40cc2", 0xf0}], 0xa, &(0x7f00000048c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r38, r39}}}, @cred={{0x1c, 0x1, 0x2, {r40, r41, r43}}}, @rights={{0x14, 0x1, 0x1, [r46]}}, @cred={{0x1c, 0x1, 0x2, {r47, r48, r49}}}, @rights={{0x1c, 0x1, 0x1, [r50, r51, r3]}}, @cred={{0x1c, 0x1, 0x2, {r52, r54, r61}}}, @rights={{0x2c, 0x1, 0x1, [r3, r62, r2, r64, r65, r67, r2]}}, @cred={{0x1c, 0x1, 0x2, {r0, r69, r74}}}, @cred={{0x1c, 0x1, 0x2, {r75, r77, r78}}}], 0x128, 0x44004004}, {&(0x7f0000004a00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000005dc0)=[{&(0x7f0000004a80)="f01e4e54f1178ebc2be326c8", 0xc}, {&(0x7f0000004ac0)="17e2fc7c20909e793d073b81520cf91213f8e49ac51476cc715444881bf251ca2231579ba1d5e4798c79fce934ebb774db210a4b3b", 0x35}, {&(0x7f0000004b00)="1616a7ebb0967679977449dee2ef738383085b1742d482331c01ac320d3ddd4bc364ab2215254557e1cf83e449104d7bb7bef4726e1d4ae2e4d76b3d411cbdab", 0x40}, {&(0x7f0000004b40)="3e779cc1e051fb440358fd694e07244fc5d8eaa06965a382671e33624d65e25cc5c09ca293fdac6b6bfeac2cd79badec6e3495229551929ddf53e44b77a68a09f1fe4a48a8f13559fb", 0x49}, {&(0x7f0000004bc0)="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", 0x1000}, {&(0x7f0000005bc0)="d82c79a14399f746f20f751c1c0addaae4d3d3d251b09b083282b74a17bd", 0x1e}, {&(0x7f0000005c00)="04f7816ab00b09c1d97278a867ce4ee9337c29c8456a420434672760b619b9062abdc078f620eff788236f4d36da70c23b569f58c9157b0c527b2277951e4e463f225f869f599221bc01479f1491b9d5d4b70fa1f591", 0x56}, {&(0x7f0000005c80)="e14e9b844b3a3d226feb84fb964c339b4027354f98bf11ad4e84fe64d9a9f26f2681f328f042460975a9bc2cfbd7d3f841bb5f16dbb0cb2dc633abdb8aeaec8bf14da51f284eecb5e9732a8eee4eb4a2f01a38f34967345071abd18ee56bdc814e8dae67a999dd0c6dcf5a659abf5b2a219bbf6368669786ef413f7788cac121aa887fe58d9e3c65fd04a7724b7e207fcf6705464eb752228846", 0x9a}, {&(0x7f0000005d40)="278e0267dec14793d3f169e569f2a0ae6d070b5f5ea90781a589a51821e3315d437c60eb46462b8ebfbb9fffbd3d2eb79b282da8d516502e77aef0b5f95678f670d75e778a1a2be0738c806d8979f2aff0f1ae1f875712d19c6c7b22b5c7167cffc4d212d69c65672a12af69ce", 0x6d}], 0x9, &(0x7f0000006080)=[@rights={{0x18, 0x1, 0x1, [r79, r3]}}, @rights={{0x20, 0x1, 0x1, [r80, r81, r4, r82]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r83, r86}}}, @cred={{0x1c, 0x1, 0x2, {r87, r88, r89}}}], 0x78, 0x20048090}, {&(0x7f0000006100)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000071c0)=[{&(0x7f0000006180)="f084c56b19b78641668e1c16c170f712a3daf538c8d6dc56816b5c9fa6564f4c135526e67fb4c731567ce249aa7c071377a260bd2666024ab9012cc04cc7208d7a7d75ee7d2e83010ed4be95f7ca20d7a981b87e3c55f54f52c123577a181b0b353eaf2e1bcc1ea9944c2e01add53eecdcae92fb1e135f91d16a7f37fdf5ecf5b77c5780ea6b90dce5124d203356b1be5202623227b453675746fde63c90b571bede21844918ddeb0ea5b5b5fb559f4e1283bb75ce9c2521d09249fe87078e10cff4770fb7158e8c6352e40348d492abb4f5a7e314062ac14593c014d16895036b22f817f71d0b0754f1b6bff4c9bc0315a02ff10268c94188bd11087d87ec39fc2e203f4cf1b05312a22d465bd3601f5ea235e42b2233aefba3340cb62c4de95e19f433c8b846d8cb9604076b0b46d7ffce1e55d0690e4e18a6183d1e20b2a0726077ca569c7672cb4866453efb1b5d765974cc23c330071210ebdced1f065c1875ebfd3b7a2d801fe345bb8c83a9d949333b753715bcd5eccee6fe956be195af0e935040b8fe4bd1674e696dc617c8fe72097d2f0a467dcc7585b4d2d744449e30833fea703dae78e34833c1040bb3b3ec9151c81b54d52858233476ad5184c5cf5c32074c6b09ea7cc7740f1ea4a7000acc6a651e36d57153f3d10631f03bfc7d1232c34583d25b6515c64bdd321fd05795202aa2ba17d6ad07ac4bcd16672ceda0882e9568c71d5c4e4611c7156c9b594564897f431e28effc1ab99cceafe4bd97b710bdc123f2255772e6c7bee4f6fb605fb7ecd21c4dc8a460cf03627764895db7e9a8294655ee1afb26f5501864b85ec47bba77a31841d04b662a490ce23cc48d83a90597952e26ad4ce531aa370eadb3d317d0aeec7c82ec11dbcfbd2e6f1abb29fe471252cf17917a9c7f59380fccbab64302b74dfd279a318e539146736186abb30c54528a0b7d7ef2afeec656aec095e0c090709c3bc34cdd1040f1631bac1ee7c5e821565ad00ab49a2d3358cb7a4567de3d7369b4c46afb135b23588ab7d5f5fb1be8bf732627b8ef423d5faf3ae617addb18584b5156014ef0fef2dcdf38078ec8bd8c630201eb1c28eae8636e2454b73859665ad64d9fd7e5601269fc79170ca6700cf244ef4c4782a58ba0acbe3a7e07b7b23929db7bcb2a06ef12577cc3f4260e0487992a8c077817937b5f20b3e9b10367f69882122e4d4784f8abb52b0d894546872c1fc74aa8ae1721f0b0b758003bca3bddd99ace90c42b41766c1af09b45f183edf758b2cf8c4dc4eb25374d60b86b0c36b12d3df1b9b0d923562db5cd00b34365964ceccaebbb3f844adcba1e653e67f99c854fc764b154ea3bc261e073b557c746f6b759742dd952c2dbbcb2b70854f03ceb4a493cc6a80c3244b2afa4c2d3228b81c411ce2dd5b9c11c73c8916e7345fe6cfd8d73c19e9aaa24c626be608c0d5662b402dc8f44a5fb8cdcb621e1c0d9b05270e2f8471b6aba905da2b520db6af4f147d8ef2d7cce1bb0ed7efa64ddf976df8743ffb7be64f2410cda6ccc7985060d9b9b819c0f3cf937dbcbd415b0d36741f33465b71ba9f5887a070d52ad085f987fcaa78ce8812bf8493678426041c8ed772e6646cf31ad72db4a26923d22a5987ec58b248bf9623e363e63ea5153f15acf1759e905ae944e7da24ed366332b0246a1aa187455ddced0ce0ed1ffaa90df58ce06af49c32e4f734f4c8bebb4dece3087d6126527020b714d5cf6a169a316b3e6c98fe902500aed0e81cf9acf8dbc44825908805f4f34fc00adcb5c04b0df120b852fb4816ccd70c5529debf238ae5ac3e42182337b6bb536c2f924d9ea66a3a666f83c628cc075fe0c7bb2ca8e4a80a33ac4c160d198cdd00c6ae54566084d6b3079e452c317cbd63d6e8b05b26522c5a2aff2a57b9f1d2533b81ed08755fe998d5e7b4743880098573717b2bf836ade1cc9263ffeacc1d46d6728fba7377ddfdd10896299379fba426b864f8d10701cba07f28d6b2c7993fd60bb189e70c285b49d7c08bc57654443eb837cdff9d2e6aad44825617eff810a456be8465a508d26a2c32a80eb57161496fe1e72db8806e527a0f97a8650ae1a8868c54ead5ef4b31788d141f3a7b73ee0e499c156e53f338e7a0e3a9e6aa6798d054bfccaaefe33322bd78c0402fcb3f131f3509ca9fdc6c4b3fe5d27ebd604ba9688788775be75380cbdf6dc4c28ec1ac16acfa2c017d43f4afe3d49722c06606beeb6d894bc69e2d0f3a584487192df8c70c62b191b980633a56e36df5c44b1b38a71b0f39586414a9dc942c5db85c0c575323c57db29d10376d4203e217a1711c8052f6663253733e1d05b4e77f548d21cedee0f6c0d59dea41286b6991e2065fd2f145470d4796be4cf7806e65f76e5c225390b4421c4da763f98223a5af4bfeabed32d389ec67e3daedb850cd3b84dcb81c524f8190f23ef22ca21d05874d7c70cea0aee4cb5594e6c55d0764157aa0d5dcd73e9193e11eb1078320ba19034d5f4916d3e28393d0f5cb841b879e0c1314e436c5817a78708a55dd211ceb39cc2d2a96ab0ad0f88e24dd1773861ef6e7456a80f4bd0da5f0fc9682aa91e8e83648083888aa7bd429b092b58f3fba030f8aafa5bedc5ea421f28a184f63cefe33d50d9369e4b4c87a073dffc32f930a3ec38cc73d7b70875c5087f7988d5a999b0dcd5e2bed365349037491e4b9d2ce29f1286d2a027e69805799d2c5ae1da8d38243a5a40e5f1aca2bcde5df307aa25186251daf71fc71ee783ec9d399f7e466d1724d399a29d0c1efe3f31797171a77e6e28b14a01c4067cea6fb0f274fbb3f502fea50108a271bd26c285643cdfc464d77d07c5f63f43c57ae6e8ced6fd6f487e205228879646cd4275bd76f7250d14cec6771813715f9e8d5c394bfee4c9078b9fd092fadad108f4fd73e7a7ccd20f9e5bb050d74e0902689d8091c1cab5bd22b59dc26359aca103701f698a032844bb66c3bc1921cc7c3973d1d28101ec2dc359f98e1ff0c1ce242b9e38e76ee234d9f9d7fc63ff4ae5c75fb500ec90b91b74ae8be90fc4c66ca255a765a2961468529dedb7fd1d6371d9aa7525ac081b9878a6423c83f7da3e89c20ebf3a6d4b54633e56f24619971bd99b3aa1a4bb3497c855e660386a64e82a49c823f964f479a96ffffc6aa614e03e3d60ab90833aacaed48bd68235a5d6d738e7a53b4618a0e4126ab25be7478443dd5ba484a2dcf3792beddc3e6123123d80cd4844bcbf95828a6574ec610c856564b0176ab60fcbe7fcff16de91ae0e7a12690d044baf4accb097e9a11ecaf4d315cdcb5c7f93def9a84afd06319c76583914c1e86cd8138a959fb6007444bc1a357cc1fabed81cd528a5ecf5563129357a2c4ab242323b702fb11036a7f9662cf73c6deb8430b5de44a9850cece198b73e9717f05a050fc383fa5bc46fd38fd4ccfec6f425fb94ecda27947540b96d9d329e71c6dc01c693d4930827c51602e00eb84baf1eaa9b2e99dda23fceb90afad6cd34d248a86c633b2d9d69ad2f6d67a3d19dcd9315d04e8b2ed2619f364c295d88fdd773224c328174b2bd1b3a1f740493c87fc87f3ddb3e5350a3088a0362a0d1634eaaba3f4453220da35d49a7ffdbba6cc78b29d7b956230811f87f0bc597dd218911357ef4994600dbe50d987d2a04dd08b840b24871b2a08c13dbf1b658790aab20e46b5b006e403c49f6165c4107eabe58b55633dcbd264c47428632d8ac73e607d3a7e24d40b85d55f5be856fc62a2f7b4abeda40c1abeb07b0ed649fdee439bd93ce118e9581d316ee493537d059e1a51727c561455db47011d7fff43688c91c6ab6fbaf9641b642bdf3e06e041f73b309c51f8c62b3f8e9933b2e7e46a0ba92538495059641a189b38169b0d6b9c48b631c1aee243c612f1ad2c20f097334e1fc676d3b432cf0c51110f69f823406f20b9af375bdf7aa9759c3e183c3ce36cb1de27b323099693b23649f9d42751f824182952ab45b77074573f1c7feb4d1bb05d247b8528eae26d8be4825426ea4c3bee4527f6fc93581bbe5d165d03f24215925c5b2230e88d4981fce11fdfeac87135d9748dcada2605c33972a8a4ba77eee37e09851a98859cda8eae2ef162af6d3baa3e1641f4a0c6370d0ee7cca76dfc5166e712a63c9b5fc8303316b3a63cd9c8c775b8b9bb26f8c478249f9b9c5bab8a2bc641746d2f92d2c0c7bb63047a2383fdfa09b8c97e76bf26d0cb9b762a5ee7af4d09d995bf250bf326aeb3224ea4831c93e8aa32d83216ac001c7c714c99b27a0144ae9ac35beef9fc0d5fd992f76e84195cfb96ca932ae429411491108b89e6e877de5bcc19a39d29acf72ece0664b7c59d46f6723451d3a6cd215bec7efa4bec2c81e09a774ac17c265cb47e68b535e758bb42de572021bd02319e1c710f065c7322ce470a130e9652d4f08a35e34631803c71612d8fbc09f754ba866c658b1b9557f0aeb075c0e529751d7d156a78d04a062a20864923fc80479286074c754eae23f0458a5e19bd5cc8583b7910d882112b777a5a6b2dc7d3c165b4739f88ce59bc8e5a885e9898934b8117a10ec7e7a8a648e157f6004b9ef9d381a491b8d2059f8e28da5f1623437e932ac63c9bab67c88a10be0b45f104e25efb8b959c05ec05db91ccc57a2905ba86d2bf06088e672ff59bd0cbee3d5499f1903e67297d8d686fb299d131d47b484fc1acdd72bd13a76ce50fcc8b8183a89053f65fb51129a75f91ba4afcd112696a122e40a93e3ff2a4e237936bb203699ad444df98fa2a17b7a3ef568a19e052a0ced62036622beddc43e3383b3ad33631a2685da6694b16c0239777798031595ceeae95b836615cd864f5ff8240d06680ddca49d60e0924f897ac6acb78137a93ce644c747c3b418c1c03d77466b14f0a6dcdc56c0ac2f9a8b0fc475c4d97be89e6ea5d04169923d2841dc1d1413d5dc36ffb2f185d02313bd5bbe6a43f3cf1a930bd5edfdf23fa30546fe75e0defeadc8f8c3d23ae51a463e9d8fe3e5cb4bb2f38c4530b44bfa72cd46644fa19b49206326cdadc4a02c45f887e9193a990591415243c61233656e6d661c0a20d6fe162aeb95c2a8c86b96691e102e32a44b5f744d712e3adbb6c8f91b8664b195d83a603c4a841eddccab5f0d1218f7911dcfc9232c8f8e5f5b0e25aced38fdb3e71633c58cd18ae4087b9e5e78061d821f2044817202333a0319904857b1e46a18d35dbe8ea71e4b841e74fafb76bb89d84e4e98300213eb95c034fb7de27ddb9b18714cd7a98e79f0998862f027dc74bb1d9405103f6fc37345ad640a84143925244f65c7568a97e89d29309eeb6fab65adad8da740f52633c61b21edfd33486cf87a08d229d8df3144fbaa27994bac6481645a064bf44d9c91ebe44f6c6122e1a6f92c84d2165014df1b5230edd9d6535b9b73124c274f04bb5a78e7edd22a363dab8b6dd1e66c2c47fc12577e3e57c030c38eb44f7824500ca249d2703f81ca3b182da6318cfa396fe4c57328f50d3e4566519dd36b91dc25696bcbf6ed413037d3b096c46865e55637c2c00a7fb137e431009db7a2c55ad6cc9b27301e580b245fa97dc315ceb0fd3535f825c20a01baf541c8218a1d76d242ed31b796f22386939c92bfa5b5670fff2a641f808206a806d3503ecc4d57b5d7bce5a3d410d7d5431adf77d32130767f24dba38829cef40e38c04abd9f646fec8829c2f87613728a512b08208875bc40e2cea57f6af1a9dfbed019ed8cf8f3", 0x1000}, {&(0x7f0000007180)="6e045f9d0b5e41b1c6f723e728a1b0591346dc0a80159ffdc53ba98e3c21f87044", 0x21}], 0x2, &(0x7f0000007340)=[@rights={{0x24, 0x1, 0x1, [r91, r92, r94, r3, r95]}}, @cred={{0x1c, 0x1, 0x2, {r96, r99, 0xffffffffffffffff}}}], 0x48, 0xc010}], 0x7, 0x4044) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:08 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)={0xffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) [ 296.579347] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 296.586727] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:08 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x2}, 0x0) [ 296.675237] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:06:08 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x0e', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3, 0x0, 0x2}) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:08 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x1e, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ptrace(0x10, r0) 06:06:08 executing program 1 (fault-call:3 fault-nth:23): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x4}, 0x0) [ 296.898606] FAULT_INJECTION: forcing a failure. [ 296.898606] name failslab, interval 1, probability 0, space 0, times 0 [ 296.937013] CPU: 0 PID: 24517 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 296.944285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.953692] Call Trace: [ 296.956306] dump_stack+0x172/0x1f0 [ 296.959965] should_fail.cold+0xa/0x1b [ 296.963919] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 296.969051] ? lock_downgrade+0x880/0x880 [ 296.973841] __should_failslab+0x121/0x190 [ 296.978127] should_failslab+0x9/0x14 [ 296.982407] kmem_cache_alloc+0x2ae/0x700 [ 296.986575] ? refcount_add_not_zero_checked+0x240/0x240 [ 296.992198] ? lock_downgrade+0x880/0x880 [ 296.996495] skb_clone+0x156/0x3e0 [ 297.000089] netlink_broadcast_filtered+0x86e/0xb20 [ 297.005346] netlink_broadcast+0x3a/0x50 [ 297.009477] kobject_uevent_env+0xad4/0x101d [ 297.013932] kobject_uevent+0x20/0x26 [ 297.017759] lo_ioctl+0x100b/0x20e0 [ 297.021408] ? lo_rw_aio+0x1470/0x1470 [ 297.025488] blkdev_ioctl+0xc38/0x1ab6 [ 297.029394] ? blkpg_ioctl+0xa90/0xa90 [ 297.033297] ? find_held_lock+0x35/0x130 [ 297.037378] ? debug_check_no_obj_freed+0x200/0x464 [ 297.043062] ? __fget+0x340/0x540 [ 297.046550] block_ioctl+0xee/0x130 [ 297.050203] ? blkdev_fallocate+0x410/0x410 [ 297.054637] do_vfs_ioctl+0xd5f/0x1380 [ 297.058632] ? selinux_file_ioctl+0x46f/0x5e0 [ 297.063264] ? selinux_file_ioctl+0x125/0x5e0 [ 297.067789] ? ioctl_preallocate+0x210/0x210 [ 297.072220] ? selinux_file_mprotect+0x620/0x620 [ 297.077088] ? iterate_fd+0x360/0x360 [ 297.080914] ? do_sys_open+0x31d/0x550 [ 297.084824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.090381] ? security_file_ioctl+0x8d/0xc0 [ 297.094810] ksys_ioctl+0xab/0xd0 [ 297.098374] __x64_sys_ioctl+0x73/0xb0 [ 297.102367] do_syscall_64+0xfd/0x620 [ 297.106189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.111397] RIP: 0033:0x459d67 [ 297.114699] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.133816] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 297.141646] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459d67 06:06:08 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1c, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 297.149310] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 297.156869] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 297.164153] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 297.171626] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x2000}, 0x0) 06:06:08 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) sched_setscheduler(r1, 0x0, &(0x7f0000000040)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) truncate(&(0x7f0000000180)='./file0\x00', 0x7) ptrace(0x10, r0) 06:06:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000300)={r7, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000000)={r7, 0x5, 0x1, 0x1}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r8, 0xe983}, &(0x7f0000000100)=0x8) r9 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r9, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 297.264392] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:06:08 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:09 executing program 1 (fault-call:3 fault-nth:24): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x34000}, 0x0) 06:06:09 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)={0x800000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x9, 0x8, 0x6, 0x7}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_DECODER_CMD(r3, 0xc0485660, &(0x7f0000000000)={0x0, 0x0, @start}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000100)={0x790a, 0x80, 0x5, 0xffffffff, 0x3}) [ 297.484155] FAULT_INJECTION: forcing a failure. [ 297.484155] name failslab, interval 1, probability 0, space 0, times 0 [ 297.484956] FAT-fs (loop5): bogus number of reserved sectors [ 297.535855] CPU: 0 PID: 24928 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 297.542925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.552560] Call Trace: [ 297.555185] dump_stack+0x172/0x1f0 [ 297.558840] should_fail.cold+0xa/0x1b [ 297.561243] FAT-fs (loop5): Can't find a valid FAT filesystem [ 297.562837] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 297.562866] __should_failslab+0x121/0x190 [ 297.562887] should_failslab+0x9/0x14 [ 297.582500] kmem_cache_alloc+0x2ae/0x700 [ 297.586673] ? security_compute_sid.part.0+0xbb0/0x15c0 [ 297.592143] ? rcu_read_lock_sched_held+0x110/0x130 [ 297.597278] ? ratelimit_state_init+0xb0/0xb0 [ 297.601854] ext4_alloc_inode+0x1f/0x630 [ 297.606035] ? ratelimit_state_init+0xb0/0xb0 [ 297.610902] alloc_inode+0x64/0x190 [ 297.614575] new_inode_pseudo+0x19/0xf0 [ 297.618565] new_inode+0x1f/0x40 [ 297.622323] __ext4_new_inode+0x3cb/0x52c0 [ 297.626670] ? kasan_check_read+0x11/0x20 [ 297.631012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.636964] ? ext4_free_inode+0x1470/0x1470 [ 297.641398] ? dquot_get_next_dqblk+0x180/0x180 [ 297.646089] ? selinux_determine_inode_label+0x1b1/0x360 [ 297.651579] ext4_mkdir+0x3d5/0xdf0 [ 297.655372] ? ext4_init_dot_dotdot+0x520/0x520 [ 297.660071] ? selinux_inode_mkdir+0x23/0x30 [ 297.664515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.670173] ? security_inode_mkdir+0xe4/0x120 [ 297.674791] vfs_mkdir+0x42e/0x690 [ 297.678364] do_mkdirat+0x234/0x2a0 [ 297.682038] ? __ia32_sys_mknod+0xb0/0xb0 [ 297.686212] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 297.691104] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.696701] ? do_syscall_64+0x26/0x620 [ 297.700787] ? lockdep_hardirqs_on+0x415/0x5d0 [ 297.705855] __x64_sys_mkdir+0x5c/0x80 [ 297.709815] do_syscall_64+0xfd/0x620 [ 297.713627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.718929] RIP: 0033:0x459317 [ 297.722129] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.741206] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 297.749013] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459317 [ 297.756669] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000140 [ 297.763947] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 297.771235] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 297.778812] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 [ 297.846927] FAT-fs (loop5): bogus number of reserved sectors [ 297.855674] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:09 executing program 1 (fault-call:3 fault-nth:25): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x400300}, 0x0) 06:06:09 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos*', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 298.028783] FAULT_INJECTION: forcing a failure. [ 298.028783] name failslab, interval 1, probability 0, space 0, times 0 [ 298.045712] CPU: 1 PID: 25157 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 298.052715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.062088] Call Trace: [ 298.064786] dump_stack+0x172/0x1f0 [ 298.068752] should_fail.cold+0xa/0x1b [ 298.072683] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 298.077846] ? lock_downgrade+0x880/0x880 [ 298.082192] __should_failslab+0x121/0x190 [ 298.086549] should_failslab+0x9/0x14 [ 298.090366] kmem_cache_alloc+0x2ae/0x700 [ 298.094553] ? __d_lookup+0x433/0x760 [ 298.098367] ? lookup_dcache+0x23/0x140 [ 298.102383] ? d_lookup+0xf9/0x260 [ 298.106066] ? lockdep_hardirqs_on+0x415/0x5d0 [ 298.110689] __d_alloc+0x2e/0x9c0 [ 298.114152] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 298.119186] d_alloc+0x4d/0x280 [ 298.122483] __lookup_hash+0xcd/0x190 [ 298.126301] filename_create+0x1a7/0x4f0 [ 298.130471] ? kern_path_mountpoint+0x40/0x40 [ 298.135655] ? strncpy_from_user+0x21b/0x2d0 [ 298.140098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.145738] ? getname_flags+0x277/0x5b0 [ 298.150080] do_mkdirat+0xb5/0x2a0 [ 298.153682] ? __ia32_sys_mknod+0xb0/0xb0 [ 298.157852] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 298.162729] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.168117] ? do_syscall_64+0x26/0x620 [ 298.172128] ? lockdep_hardirqs_on+0x415/0x5d0 [ 298.177341] __x64_sys_mkdir+0x5c/0x80 [ 298.181635] do_syscall_64+0xfd/0x620 [ 298.185454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.190656] RIP: 0033:0x459317 [ 298.193878] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.213796] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 298.221696] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459317 06:06:09 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1d, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:09 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) ptrace$getsig(0x4202, 0x0, 0x8, &(0x7f0000000100)) 06:06:09 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x10000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x1000000}, 0x0) [ 298.229060] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000140 [ 298.236627] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 298.243905] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 298.251200] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:10 executing program 1 (fault-call:3 fault-nth:26): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:10 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosB', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10100, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r4, 0x11, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0xb, 0x18, {0x0, @bearer=@udp='udp:syz2\x00'}}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x800, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040040) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:10 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x2000000}, 0x0) 06:06:10 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000480)=""/24, &(0x7f00000004c0)=0x18) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x11, r0) [ 298.541926] FAULT_INJECTION: forcing a failure. [ 298.541926] name failslab, interval 1, probability 0, space 0, times 0 [ 298.584263] CPU: 1 PID: 25377 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 298.591335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.600709] Call Trace: [ 298.603338] dump_stack+0x172/0x1f0 [ 298.607084] should_fail.cold+0xa/0x1b [ 298.611104] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 298.616238] ? lockdep_hardirqs_on+0x415/0x5d0 [ 298.620994] __should_failslab+0x121/0x190 [ 298.625330] should_failslab+0x9/0x14 [ 298.629165] kmem_cache_alloc+0x2ae/0x700 06:06:10 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x9) ptrace(0x10, r0) [ 298.633329] ? map_id_range_down+0x1ee/0x370 [ 298.638059] ? __put_user_ns+0x70/0x70 [ 298.642264] selinux_inode_alloc_security+0xb6/0x2a0 [ 298.647410] security_inode_alloc+0x8a/0xd0 [ 298.651768] inode_init_always+0x56e/0xb40 [ 298.656026] alloc_inode+0x81/0x190 [ 298.659756] new_inode_pseudo+0x19/0xf0 [ 298.663832] new_inode+0x1f/0x40 [ 298.667216] __ext4_new_inode+0x3cb/0x52c0 [ 298.671468] ? kasan_check_read+0x11/0x20 [ 298.675831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.681397] ? ext4_free_inode+0x1470/0x1470 [ 298.685917] ? dquot_get_next_dqblk+0x180/0x180 [ 298.690608] ? selinux_determine_inode_label+0x1b1/0x360 [ 298.696093] ext4_mkdir+0x3d5/0xdf0 [ 298.699793] ? ext4_init_dot_dotdot+0x520/0x520 [ 298.705009] ? selinux_inode_mkdir+0x23/0x30 [ 298.709722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.715271] ? security_inode_mkdir+0xe4/0x120 [ 298.719966] vfs_mkdir+0x42e/0x690 [ 298.723630] do_mkdirat+0x234/0x2a0 [ 298.727276] ? __ia32_sys_mknod+0xb0/0xb0 [ 298.731447] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 298.736215] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.742725] ? do_syscall_64+0x26/0x620 [ 298.746894] ? lockdep_hardirqs_on+0x415/0x5d0 [ 298.751720] __x64_sys_mkdir+0x5c/0x80 [ 298.755709] do_syscall_64+0xfd/0x620 [ 298.759532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.764908] RIP: 0033:0x459317 [ 298.768202] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.788399] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 298.797621] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459317 [ 298.804902] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000140 [ 298.812197] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 298.819485] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 298.826874] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:10 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x4000000}, 0x0) 06:06:10 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosC', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:10 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1e, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x4}, @IFLA_GROUP={0x8}]}, 0x2c}}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_NR_MMU_PAGES(r5, 0xae44, 0xd60) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xfffffda2) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000440)={r6, @empty, @loopback}, 0xc) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:10 executing program 1 (fault-call:3 fault-nth:27): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:10 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400204) ptrace(0x10, r0) set_robust_list(&(0x7f0000000180)={&(0x7f0000000100)={&(0x7f0000000040)}, 0x8, &(0x7f0000000140)}, 0x18) 06:06:10 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x20000000}, 0x0) 06:06:10 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosD', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 299.269754] FAULT_INJECTION: forcing a failure. [ 299.269754] name failslab, interval 1, probability 0, space 0, times 0 [ 299.302274] CPU: 1 PID: 25712 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 299.309339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.318896] Call Trace: [ 299.321498] dump_stack+0x172/0x1f0 [ 299.325127] should_fail.cold+0xa/0x1b [ 299.329122] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 299.334306] ? lock_downgrade+0x880/0x880 [ 299.338474] __should_failslab+0x121/0x190 [ 299.342714] should_failslab+0x9/0x14 [ 299.346514] kmem_cache_alloc+0x2ae/0x700 [ 299.350661] ? __d_lookup+0x433/0x760 [ 299.354478] ? lookup_dcache+0x23/0x140 [ 299.358550] ? d_lookup+0xf9/0x260 [ 299.362367] ? lockdep_hardirqs_on+0x415/0x5d0 [ 299.366966] __d_alloc+0x2e/0x9c0 [ 299.370433] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 299.375455] d_alloc+0x4d/0x280 [ 299.378836] __lookup_hash+0xcd/0x190 [ 299.382641] filename_create+0x1a7/0x4f0 [ 299.386727] ? kern_path_mountpoint+0x40/0x40 [ 299.391393] ? strncpy_from_user+0x21b/0x2d0 [ 299.395809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.401573] ? getname_flags+0x277/0x5b0 [ 299.405636] do_mkdirat+0xb5/0x2a0 [ 299.409174] ? __ia32_sys_mknod+0xb0/0xb0 [ 299.413319] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 299.418200] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.423669] ? do_syscall_64+0x26/0x620 [ 299.427812] ? lockdep_hardirqs_on+0x415/0x5d0 [ 299.432416] __x64_sys_mkdir+0x5c/0x80 [ 299.436318] do_syscall_64+0xfd/0x620 [ 299.440129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.445462] RIP: 0033:0x459317 [ 299.448707] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.467982] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 299.476034] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459317 [ 299.483296] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000140 [ 299.490745] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 299.498192] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 299.505547] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:11 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x80ffffff}, 0x0) [ 299.527472] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 06:06:11 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000100)) r2 = getpid() r3 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r3) rt_tgsigqueueinfo(r2, r2, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace(0x10, r2) 06:06:11 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='2Q\x13\xc5\x8f\xd28\x83\x01', 0x40, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:11 executing program 1 (fault-call:3 fault-nth:28): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:11 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosE', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:11 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0xffffff7f}, 0x0) [ 299.781640] FAULT_INJECTION: forcing a failure. [ 299.781640] name failslab, interval 1, probability 0, space 0, times 0 [ 299.793220] CPU: 0 PID: 26135 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 299.800248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.800255] Call Trace: [ 299.800281] dump_stack+0x172/0x1f0 [ 299.800301] should_fail.cold+0xa/0x1b [ 299.800319] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 299.800337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.800357] __should_failslab+0x121/0x190 [ 299.835034] should_failslab+0x9/0x14 [ 299.838874] __kmalloc+0x71/0x750 [ 299.842453] ? context_struct_to_string+0x428/0x880 [ 299.847630] context_struct_to_string+0x428/0x880 [ 299.847654] ? security_load_policycaps+0x540/0x540 [ 299.847668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.847680] ? sidtab_search_core+0x1d0/0x320 [ 299.847702] security_sid_to_context_core.isra.0+0x226/0x2f0 [ 299.847721] security_sid_to_context_force+0x38/0x50 [ 299.847737] selinux_inode_init_security+0x3b6/0x7a0 [ 299.847759] ? selinux_inode_create+0x30/0x30 [ 299.847773] ? ext4_get_acl+0x107/0x5a0 [ 299.847788] ? rcu_read_lock_sched_held+0x110/0x130 [ 299.847812] security_inode_init_security+0x1ad/0x3b0 [ 299.847829] ? ext4_init_acl+0x220/0x220 [ 299.863531] ? security_kernel_load_data+0xb0/0xb0 [ 299.863550] ? posix_acl_create+0x11a/0x430 [ 299.874130] ? lock_downgrade+0x880/0x880 [ 299.874156] ? ext4_set_acl+0x490/0x490 [ 299.874172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.874188] ? check_preemption_disabled+0x48/0x290 [ 299.874207] ext4_init_security+0x34/0x40 [ 299.884524] __ext4_new_inode+0x3b2a/0x52c0 [ 299.884555] ? ext4_free_inode+0x1470/0x1470 [ 299.884578] ? dquot_get_next_dqblk+0x180/0x180 [ 299.903746] ? selinux_determine_inode_label+0x1b1/0x360 [ 299.912827] ext4_mkdir+0x3d5/0xdf0 [ 299.912856] ? ext4_init_dot_dotdot+0x520/0x520 [ 299.912879] ? selinux_inode_mkdir+0x23/0x30 [ 299.912893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.912911] ? security_inode_mkdir+0xe4/0x120 [ 299.925447] vfs_mkdir+0x42e/0x690 [ 299.987694] do_mkdirat+0x234/0x2a0 [ 299.991453] ? __ia32_sys_mknod+0xb0/0xb0 [ 299.995715] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 300.000487] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.006053] ? do_syscall_64+0x26/0x620 [ 300.010059] ? lockdep_hardirqs_on+0x415/0x5d0 [ 300.014755] __x64_sys_mkdir+0x5c/0x80 [ 300.018856] do_syscall_64+0xfd/0x620 [ 300.022769] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.028184] RIP: 0033:0x459317 [ 300.031484] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.051262] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 300.059776] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459317 [ 300.067341] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000140 [ 300.075257] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 06:06:11 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x21, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:11 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x204000, 0x0) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x5) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r5, &(0x7f0000000040)={0x1, 0x7f}, 0x2) 06:06:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x30, r5, 0x491, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x30}}, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x20000, 0x0) sendmsg$TIPC_NL_MON_SET(r3, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x264, r5, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x70, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xe4}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @remote}}, {0x14, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x3}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10001}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc6}]}, @TIPC_NLA_LINK={0xc4, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x97a1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffa}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8ca1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1e77}]}]}, @TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94e5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x65aa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}]}, @TIPC_NLA_BEARER={0x4}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x264}, 0x1, 0x0, 0x0, 0x44010}, 0x20048090) [ 300.083123] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 300.090706] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:11 executing program 1 (fault-call:3 fault-nth:29): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:11 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0xffffff80}, 0x0) [ 300.188352] Started in network mode [ 300.192068] Own node identity , cluster identity 4711 06:06:11 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosF', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:11 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000080)={0x2, 0x0, 0x4, 0xffffffffffffffff, 0xd}) [ 300.362865] FAULT_INJECTION: forcing a failure. [ 300.362865] name failslab, interval 1, probability 0, space 0, times 0 [ 300.374389] CPU: 1 PID: 26338 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 300.381421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.381429] Call Trace: [ 300.381462] dump_stack+0x172/0x1f0 [ 300.381486] should_fail.cold+0xa/0x1b [ 300.381503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 300.381522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.411882] __should_failslab+0x121/0x190 [ 300.416146] should_failslab+0x9/0x14 [ 300.419975] __kmalloc+0x71/0x750 [ 300.423471] ? context_struct_to_string+0x428/0x880 [ 300.428594] context_struct_to_string+0x428/0x880 [ 300.428618] ? security_load_policycaps+0x540/0x540 [ 300.428635] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.428650] ? sidtab_search_core+0x1d0/0x320 [ 300.428673] security_sid_to_context_core.isra.0+0x226/0x2f0 [ 300.428692] security_sid_to_context_force+0x38/0x50 [ 300.460328] selinux_inode_init_security+0x3b6/0x7a0 [ 300.465438] ? selinux_inode_create+0x30/0x30 [ 300.469952] ? ext4_get_acl+0x107/0x5a0 [ 300.474372] ? rcu_read_lock_sched_held+0x110/0x130 [ 300.479395] security_inode_init_security+0x1ad/0x3b0 [ 300.484593] ? ext4_init_acl+0x220/0x220 [ 300.488852] ? security_kernel_load_data+0xb0/0xb0 [ 300.493866] ? posix_acl_create+0x11a/0x430 [ 300.498179] ? lock_downgrade+0x880/0x880 [ 300.502422] ? ext4_set_acl+0x490/0x490 [ 300.506394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.512119] ? check_preemption_disabled+0x48/0x290 [ 300.517493] ext4_init_security+0x34/0x40 [ 300.521656] __ext4_new_inode+0x3b2a/0x52c0 [ 300.526102] ? ext4_free_inode+0x1470/0x1470 [ 300.530615] ? dquot_get_next_dqblk+0x180/0x180 [ 300.535283] ? selinux_determine_inode_label+0x1b1/0x360 [ 300.540831] ext4_mkdir+0x3d5/0xdf0 [ 300.544650] ? ext4_init_dot_dotdot+0x520/0x520 [ 300.549351] ? selinux_inode_mkdir+0x23/0x30 [ 300.554117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.559652] ? security_inode_mkdir+0xe4/0x120 [ 300.564316] vfs_mkdir+0x42e/0x690 [ 300.567861] do_mkdirat+0x234/0x2a0 [ 300.571489] ? __ia32_sys_mknod+0xb0/0xb0 [ 300.575650] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 300.580583] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.586040] ? do_syscall_64+0x26/0x620 [ 300.590039] ? lockdep_hardirqs_on+0x415/0x5d0 [ 300.594745] __x64_sys_mkdir+0x5c/0x80 [ 300.598645] do_syscall_64+0xfd/0x620 [ 300.602646] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.607944] RIP: 0033:0x459317 [ 300.611151] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.630500] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 300.638206] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459317 [ 300.645484] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000140 [ 300.652756] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 300.660286] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 300.667819] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:12 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x40030000000000}, 0x0) 06:06:12 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = gettid() tkill(r2, 0x1000000000013) rt_tgsigqueueinfo(0xffffffffffffffff, r2, 0x25, &(0x7f0000000080)={0x1b, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:12 executing program 1 (fault-call:3 fault-nth:30): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x48044c0}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv4_getrule={0x20, 0x22, 0x20, 0x70bd29, 0x25dfdbfc, {0x2, 0x20, 0x0, 0x20, 0xa6, 0x0, 0x0, 0x9}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x2000a004}, 0x4000000) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x8000) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x1) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_IRQ_BUSID(r5, 0xc0106403, &(0x7f0000000000)={0x3, 0x12, 0xfffffff9, 0x8001}) [ 300.906718] FAULT_INJECTION: forcing a failure. [ 300.906718] name failslab, interval 1, probability 0, space 0, times 0 [ 300.918157] CPU: 0 PID: 26577 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 300.926581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.936168] Call Trace: [ 300.938794] dump_stack+0x172/0x1f0 [ 300.942466] should_fail.cold+0xa/0x1b [ 300.944426] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 300.946482] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 300.946503] ? __es_tree_search.isra.0+0x1bf/0x230 [ 300.946525] __should_failslab+0x121/0x190 [ 300.946543] should_failslab+0x9/0x14 [ 300.979414] kmem_cache_alloc+0x47/0x700 [ 300.983669] ? ext4_es_scan+0x730/0x730 [ 300.987922] __es_insert_extent+0x2cc/0xf20 [ 300.992383] ? do_raw_write_lock+0xbd/0x1e0 [ 300.996744] ext4_es_insert_extent+0x27e/0x640 [ 301.001452] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 301.007541] ? rcu_read_lock_sched_held+0x110/0x130 [ 301.012678] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 301.018605] ? ext4_es_find_delayed_extent_range+0x387/0xa30 [ 301.024525] ext4_ext_put_gap_in_cache+0xf7/0x150 [ 301.029773] ? ext4_zeroout_es+0x180/0x180 [ 301.034031] ? ext4_find_extent+0x76e/0x9d0 [ 301.038386] ? ext4_find_extent+0x6a6/0x9d0 [ 301.043087] ext4_ext_map_blocks+0x204c/0x55c0 [ 301.048097] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 301.053327] ? __lock_is_held+0xb6/0x140 [ 301.057591] ? lock_acquire+0x16f/0x3f0 [ 301.061694] ? ext4_map_blocks+0x4cf/0x1b20 [ 301.066349] ext4_map_blocks+0xf83/0x1b20 [ 301.070629] ? ext4_issue_zeroout+0x170/0x170 [ 301.075267] ? kasan_check_write+0x14/0x20 [ 301.079558] ? __brelse+0x95/0xb0 [ 301.083224] ext4_getblk+0xc4/0x510 [ 301.086882] ? ext4_iomap_begin+0xfd0/0xfd0 [ 301.091248] ? ext4_free_inode+0x1470/0x1470 [ 301.095782] ext4_bread+0x8f/0x230 [ 301.099438] ? ext4_getblk+0x510/0x510 [ 301.103386] ext4_append+0x155/0x370 [ 301.107314] ext4_mkdir+0x61b/0xdf0 [ 301.110985] ? ext4_init_dot_dotdot+0x520/0x520 [ 301.115674] ? selinux_inode_mkdir+0x23/0x30 [ 301.120110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.125956] ? security_inode_mkdir+0xe4/0x120 [ 301.130921] vfs_mkdir+0x42e/0x690 [ 301.134742] do_mkdirat+0x234/0x2a0 [ 301.138651] ? __ia32_sys_mknod+0xb0/0xb0 [ 301.142996] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 301.149375] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.154858] ? do_syscall_64+0x26/0x620 [ 301.159061] ? lockdep_hardirqs_on+0x415/0x5d0 [ 301.163765] __x64_sys_mkdir+0x5c/0x80 [ 301.167849] do_syscall_64+0xfd/0x620 [ 301.171672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.176962] RIP: 0033:0x459317 [ 301.180264] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:06:12 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:12 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosG', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:12 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x100000000000000}, 0x0) 06:06:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) read(0xffffffffffffffff, &(0x7f00000000c0)=""/28, 0x1c) [ 301.200746] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 301.208563] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459317 [ 301.216116] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000140 [ 301.223753] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 301.231124] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 301.238870] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 [ 301.308644] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:06:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x200000000000000}, 0x0) 06:06:13 executing program 1 (fault-call:3 fault-nth:31): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000000)={0xd000, 0x0, 0xc}) 06:06:13 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosH', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 301.571538] FAULT_INJECTION: forcing a failure. [ 301.571538] name failslab, interval 1, probability 0, space 0, times 0 [ 301.583163] CPU: 0 PID: 26800 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 301.583178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.599670] Call Trace: [ 301.602376] dump_stack+0x172/0x1f0 [ 301.606181] should_fail.cold+0xa/0x1b [ 301.610122] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 301.615246] ? save_stack+0xa9/0xd0 [ 301.615265] ? __es_tree_search.isra.0+0x1bf/0x230 [ 301.615278] ? save_stack+0x45/0xd0 [ 301.615298] __should_failslab+0x121/0x190 [ 301.615317] should_failslab+0x9/0x14 [ 301.623991] kmem_cache_alloc+0x47/0x700 [ 301.624010] ? ext4_es_scan+0x730/0x730 [ 301.624030] __es_insert_extent+0x2cc/0xf20 [ 301.624045] ? do_raw_write_lock+0xbd/0x1e0 [ 301.624063] ext4_es_insert_extent+0x27e/0x640 [ 301.635745] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 301.635769] ? rcu_read_lock_sched_held+0x110/0x130 [ 301.635783] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 301.635798] ? ext4_es_find_delayed_extent_range+0x387/0xa30 [ 301.635816] ext4_ext_put_gap_in_cache+0xf7/0x150 [ 301.635831] ? ext4_zeroout_es+0x180/0x180 [ 301.690071] ? ext4_find_extent+0x76e/0x9d0 [ 301.695737] ? ext4_find_extent+0x6a6/0x9d0 [ 301.700108] ext4_ext_map_blocks+0x204c/0x55c0 [ 301.704810] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 301.709884] ? __lock_is_held+0xb6/0x140 [ 301.714010] ? lock_acquire+0x16f/0x3f0 [ 301.718131] ? ext4_map_blocks+0x4cf/0x1b20 [ 301.722523] ext4_map_blocks+0xf83/0x1b20 [ 301.726709] ? ext4_issue_zeroout+0x170/0x170 [ 301.731442] ? kasan_check_write+0x14/0x20 [ 301.735700] ? __brelse+0x95/0xb0 [ 301.739275] ext4_getblk+0xc4/0x510 [ 301.742927] ? ext4_iomap_begin+0xfd0/0xfd0 [ 301.747955] ? ext4_free_inode+0x1470/0x1470 [ 301.752516] ext4_bread+0x8f/0x230 [ 301.756309] ? ext4_getblk+0x510/0x510 [ 301.760231] ext4_append+0x155/0x370 [ 301.763982] ext4_mkdir+0x61b/0xdf0 [ 301.767639] ? ext4_init_dot_dotdot+0x520/0x520 [ 301.772634] ? selinux_inode_mkdir+0x23/0x30 [ 301.777088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.782834] ? security_inode_mkdir+0xe4/0x120 [ 301.787662] vfs_mkdir+0x42e/0x690 [ 301.787684] do_mkdirat+0x234/0x2a0 [ 301.787703] ? __ia32_sys_mknod+0xb0/0xb0 [ 301.787720] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 301.787741] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.787757] ? do_syscall_64+0x26/0x620 [ 301.787773] ? lockdep_hardirqs_on+0x415/0x5d0 [ 301.787788] __x64_sys_mkdir+0x5c/0x80 [ 301.787801] do_syscall_64+0xfd/0x620 [ 301.787817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.787829] RIP: 0033:0x459317 [ 301.787843] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.787850] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 301.810197] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459317 06:06:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x400000000000000}, 0x0) [ 301.810206] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000140 [ 301.810214] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 301.810223] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 301.810232] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 [ 301.917902] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:06:15 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000100)=""/4096, 0x1000, 0x10000, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000000c0)={{0xbd}, 'port1\x00', 0x12, 0x0, 0x100, 0x3ff, 0xd4, 0x8, 0x8ca2, 0x0, 0x2}) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x28800) 06:06:15 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosI', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:15 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x2000000000000000}, 0x0) 06:06:15 executing program 1 (fault-call:3 fault-nth:32): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x23, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 303.936503] FAULT_INJECTION: forcing a failure. [ 303.936503] name failslab, interval 1, probability 0, space 0, times 0 [ 303.948372] CPU: 1 PID: 26923 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 303.955321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.964775] Call Trace: [ 303.964844] dump_stack+0x172/0x1f0 [ 303.971276] should_fail.cold+0xa/0x1b [ 303.975213] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 303.980394] ? __sigqueue_alloc+0x173/0x4d0 [ 303.980411] ? find_held_lock+0x35/0x130 [ 303.980432] __should_failslab+0x121/0x190 [ 303.980450] should_failslab+0x9/0x14 [ 303.980465] kmem_cache_alloc+0x47/0x700 [ 303.980482] ? kasan_check_read+0x11/0x20 [ 303.980500] __sigqueue_alloc+0x268/0x4d0 [ 303.980514] __send_signal+0x20f/0x14a0 [ 303.980531] ? lock_acquire+0x16f/0x3f0 [ 304.017637] send_signal+0x49/0xd0 [ 304.021292] force_sig_info+0x251/0x310 [ 304.025473] force_sig_info_fault.constprop.0+0x215/0x360 [ 304.031125] ? is_prefetch.isra.0+0x470/0x470 06:06:15 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x4480) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futex(&(0x7f0000000100), 0x3, 0x1, &(0x7f0000000180)={r4, r5+10000000}, &(0x7f00000001c0)=0x2, 0x0) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ptrace(0x10, r0) [ 304.035643] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 304.041234] ? trace_hardirqs_on+0x67/0x220 [ 304.045594] __bad_area_nosemaphore+0x2db/0x3f0 [ 304.050297] ? vmacache_find+0x65/0x310 [ 304.054303] bad_area+0x69/0x80 [ 304.057614] __do_page_fault+0xae1/0xe90 [ 304.061779] ? do_mkdirat+0x1a2/0x2a0 [ 304.065690] ? vmalloc_fault+0x740/0x740 [ 304.069857] ? trace_hardirqs_off_caller+0x65/0x220 [ 304.075021] ? trace_hardirqs_on_caller+0x6a/0x220 [ 304.080149] ? page_fault+0x8/0x30 [ 304.083707] do_page_fault+0x71/0x57d [ 304.087628] ? page_fault+0x8/0x30 [ 304.091285] page_fault+0x1e/0x30 [ 304.094751] RIP: 0033:0x453aff [ 304.097984] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 304.117368] RSP: 002b:00007fae6b80ba88 EFLAGS: 00010283 [ 304.122754] RAX: 00007fae6b80bb40 RBX: 0000000000000010 RCX: 0000000000000000 [ 304.130055] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fae6b80bb40 [ 304.137332] RBP: 0000000000000000 R08: 00000000000000e0 R09: 000000000000000a [ 304.144795] R10: 0000000000000075 R11: 00000000004e6620 R12: 0000000000000005 [ 304.152256] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:15 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosJ', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 304.204071] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:06:15 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x80ffffff00000000}, 0x0) 06:06:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x101000, 0x120) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000540)={{0x2, 0x0, @descriptor="fd148cfb5ae4d0bc"}}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYRES32=r3], 0x1}, 0x1, 0x0, 0x0, 0x14010}, 0x80000) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_SUBSCRIBE_EVENT(r7, 0x4020565a, &(0x7f0000000240)={0x1800300b, 0x3, 0x3}) ioctl$KVM_IOEVENTFD(r5, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000280)) 06:06:15 executing program 1 (fault-call:3 fault-nth:33): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:16 executing program 3: ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000100)={[], 0x400, 0x8, 0xca, 0x0, 0x1, 0x1000, 0x1000, [], 0x401}) clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xddad) r1 = getpid() r2 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) rt_tgsigqueueinfo(r1, r1, 0x1b, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r6, 0x111, 0x4, 0x1, 0x4) [ 304.387738] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 304.427102] FAULT_INJECTION: forcing a failure. [ 304.427102] name failslab, interval 1, probability 0, space 0, times 0 [ 304.451648] CPU: 1 PID: 27246 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 304.458753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.468129] Call Trace: [ 304.470742] dump_stack+0x172/0x1f0 [ 304.470765] should_fail.cold+0xa/0x1b [ 304.470785] ? fault_create_debugfs_attr+0x1e0/0x1e0 06:06:16 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) [ 304.470805] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 304.478635] __should_failslab+0x121/0x190 [ 304.478652] should_failslab+0x9/0x14 [ 304.478669] __kmalloc+0x2e2/0x750 [ 304.478689] ? ext4_find_extent+0x76e/0x9d0 [ 304.478705] ext4_find_extent+0x76e/0x9d0 [ 304.478728] ext4_ext_map_blocks+0x1c3/0x55c0 [ 304.514925] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 304.519961] ? __lock_is_held+0xb6/0x140 [ 304.524138] ? lock_acquire+0x16f/0x3f0 [ 304.528391] ? ext4_map_blocks+0x928/0x1b20 [ 304.532749] ext4_map_blocks+0x990/0x1b20 [ 304.536930] ? ext4_issue_zeroout+0x170/0x170 [ 304.541533] ? kasan_check_write+0x14/0x20 [ 304.545870] ? __brelse+0x95/0xb0 [ 304.549347] ext4_getblk+0xc4/0x510 [ 304.552998] ? ext4_iomap_begin+0xfd0/0xfd0 [ 304.557371] ? ext4_free_inode+0x1470/0x1470 [ 304.561806] ext4_bread+0x8f/0x230 [ 304.565364] ? ext4_getblk+0x510/0x510 [ 304.569279] ext4_append+0x155/0x370 [ 304.573017] ext4_mkdir+0x61b/0xdf0 [ 304.576678] ? ext4_init_dot_dotdot+0x520/0x520 [ 304.581373] ? selinux_inode_mkdir+0x23/0x30 [ 304.585796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.591352] ? security_inode_mkdir+0xe4/0x120 [ 304.595984] vfs_mkdir+0x42e/0x690 [ 304.599548] do_mkdirat+0x234/0x2a0 [ 304.603205] ? __ia32_sys_mknod+0xb0/0xb0 [ 304.607385] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 304.612161] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.617543] ? do_syscall_64+0x26/0x620 [ 304.621854] ? lockdep_hardirqs_on+0x415/0x5d0 [ 304.626725] __x64_sys_mkdir+0x5c/0x80 [ 304.630740] do_syscall_64+0xfd/0x620 [ 304.634654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.639942] RIP: 0033:0x459317 [ 304.643170] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.662087] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 304.669835] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459317 [ 304.678292] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000140 06:06:16 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x24, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 304.685574] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 304.692868] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 304.700190] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:16 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosK', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:16 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x31, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:16 executing program 1 (fault-call:3 fault-nth:34): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x2000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0xd}) 06:06:16 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 304.945366] FAULT_INJECTION: forcing a failure. [ 304.945366] name failslab, interval 1, probability 0, space 0, times 0 [ 304.956727] CPU: 1 PID: 27518 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 304.964209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.973583] Call Trace: [ 304.976206] dump_stack+0x172/0x1f0 [ 304.979868] should_fail.cold+0xa/0x1b [ 304.983874] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 304.989112] ? mark_held_locks+0xb1/0x100 [ 304.993275] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 304.993291] ? __es_tree_search.isra.0+0x1bf/0x230 [ 304.993311] __should_failslab+0x121/0x190 [ 304.993328] should_failslab+0x9/0x14 [ 305.003875] kmem_cache_alloc+0x47/0x700 [ 305.003892] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 305.003908] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 305.003921] ? ext4_es_scan+0x730/0x730 [ 305.003940] __es_insert_extent+0x2cc/0xf20 [ 305.003960] ? do_raw_write_lock+0xbd/0x1e0 [ 305.039486] ext4_es_insert_extent+0x27e/0x640 [ 305.044079] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 305.049893] ext4_map_blocks+0xc3f/0x1b20 [ 305.054265] ? ext4_issue_zeroout+0x170/0x170 [ 305.058768] ? kasan_check_write+0x14/0x20 [ 305.063009] ? __brelse+0x95/0xb0 [ 305.066480] ext4_getblk+0xc4/0x510 [ 305.070116] ? ext4_iomap_begin+0xfd0/0xfd0 [ 305.074459] ? ext4_free_inode+0x1470/0x1470 [ 305.078871] ext4_bread+0x8f/0x230 [ 305.082431] ? ext4_getblk+0x510/0x510 [ 305.086435] ext4_append+0x155/0x370 [ 305.090195] ext4_mkdir+0x61b/0xdf0 [ 305.093827] ? ext4_init_dot_dotdot+0x520/0x520 [ 305.098872] ? selinux_inode_mkdir+0x23/0x30 [ 305.103291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.108937] ? security_inode_mkdir+0xe4/0x120 [ 305.113524] vfs_mkdir+0x42e/0x690 [ 305.117131] do_mkdirat+0x234/0x2a0 [ 305.120866] ? __ia32_sys_mknod+0xb0/0xb0 [ 305.125204] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 305.130052] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.135422] ? do_syscall_64+0x26/0x620 [ 305.139511] ? lockdep_hardirqs_on+0x415/0x5d0 [ 305.144116] __x64_sys_mkdir+0x5c/0x80 [ 305.148006] do_syscall_64+0xfd/0x620 [ 305.151843] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.157048] RIP: 0033:0x459317 [ 305.160252] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.179152] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 305.186876] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459317 06:06:16 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x22400, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000100)=0x3) clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() r2 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) rt_tgsigqueueinfo(r1, r1, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r1) [ 305.194142] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000140 [ 305.201408] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 305.209002] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 305.216367] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:16 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosL', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:16 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x2}, 0x0) 06:06:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x3, 0xffffffffffffffff, 0xd}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000040)={0xfffffffffffff800, 0x8}) [ 305.272609] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:06:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000200)={0x5, 0x8, 0x4a27, @broadcast, 'vlan0\x00'}) clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r3) rt_tgsigqueueinfo(r2, r2, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = gettid() tkill(r5, 0x1000000000013) rt_tgsigqueueinfo(r3, r5, 0x38, &(0x7f0000000100)={0x3e, 0x80000000, 0x4}) r6 = dup(r4) ioctl$KVM_SET_DEBUGREGS(r6, 0x4080aea2, &(0x7f0000000180)={[0xf000, 0xf000, 0x5000, 0x3be0e16dadddddf2], 0x2, 0x0, 0x401}) ptrace(0x10, r2) 06:06:17 executing program 1 (fault-call:3 fault-nth:35): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 305.441196] FAULT_INJECTION: forcing a failure. [ 305.441196] name failslab, interval 1, probability 0, space 0, times 0 [ 305.453036] CPU: 1 PID: 27693 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 305.460114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.469571] Call Trace: [ 305.472177] dump_stack+0x172/0x1f0 [ 305.476392] should_fail.cold+0xa/0x1b [ 305.480477] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 305.485599] ? lock_downgrade+0x880/0x880 [ 305.489956] __should_failslab+0x121/0x190 [ 305.494203] should_failslab+0x9/0x14 [ 305.498009] __kmalloc_track_caller+0x2de/0x750 [ 305.502682] ? strndup_user+0x77/0xd0 [ 305.506569] memdup_user+0x26/0xb0 [ 305.510125] strndup_user+0x77/0xd0 [ 305.513754] ksys_mount+0x3c/0x150 [ 305.517475] __x64_sys_mount+0xbe/0x150 [ 305.521460] do_syscall_64+0xfd/0x620 [ 305.525374] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.530568] RIP: 0033:0x45c94a [ 305.533848] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 305.553041] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 305.560768] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 305.568035] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 305.575937] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 305.583418] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 305.590697] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:17 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x66, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:17 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x0) 06:06:17 executing program 1 (fault-call:3 fault-nth:36): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:17 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosM', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)="aa130b81bc9f2e3af54bd0339e873f3fc09c1857601f9871351497f4b2ad1cfb723ebae70a862880fb8d65f0b13528d9d0ddbad5ac9dcce142b703117bde9580034c46a5d4053a9ff230ea1e0353d56891a2dd6bc6c820d529b3e193a0123f8e2ec92fbfc07111b41c22bcf6a6e30088855f1f04c51d6aaa9b9266c0b91d51319747d16c18831cd0d854788ad6572dbb732503ebde0cfdbddbb3e7e9356753fae691f9d8bfc20bb14a1cc904f993418ec59731d37735ed19c458793490c2") ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0xd000, 0x0, 0x0, r0, 0xb}) [ 305.865673] FAULT_INJECTION: forcing a failure. [ 305.865673] name failslab, interval 1, probability 0, space 0, times 0 [ 305.877346] CPU: 1 PID: 27817 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 305.884301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.894105] Call Trace: [ 305.896720] dump_stack+0x172/0x1f0 [ 305.900382] should_fail.cold+0xa/0x1b [ 305.904391] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 305.909774] ? mark_held_locks+0xb1/0x100 [ 305.913954] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 305.919000] ? __es_tree_search.isra.0+0x1bf/0x230 [ 305.923959] __should_failslab+0x121/0x190 [ 305.923977] should_failslab+0x9/0x14 [ 305.923992] kmem_cache_alloc+0x47/0x700 [ 305.924009] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 305.941557] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 305.941569] ? ext4_es_scan+0x730/0x730 [ 305.941588] __es_insert_extent+0x2cc/0xf20 [ 305.941605] ? do_raw_write_lock+0xbd/0x1e0 [ 305.941624] ext4_es_insert_extent+0x27e/0x640 [ 305.941643] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 305.970550] ext4_map_blocks+0xc3f/0x1b20 [ 305.974717] ? ext4_issue_zeroout+0x170/0x170 [ 305.979300] ? kasan_check_write+0x14/0x20 [ 305.983615] ? __brelse+0x95/0xb0 [ 305.987069] ext4_getblk+0xc4/0x510 [ 305.990695] ? ext4_iomap_begin+0xfd0/0xfd0 [ 305.995035] ? ext4_free_inode+0x1470/0x1470 [ 305.999550] ext4_bread+0x8f/0x230 [ 306.003192] ? ext4_getblk+0x510/0x510 [ 306.007166] ext4_append+0x155/0x370 [ 306.010900] ext4_mkdir+0x61b/0xdf0 [ 306.014552] ? ext4_init_dot_dotdot+0x520/0x520 [ 306.019241] ? selinux_inode_mkdir+0x23/0x30 [ 306.023658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.029283] ? security_inode_mkdir+0xe4/0x120 [ 306.033865] vfs_mkdir+0x42e/0x690 [ 306.037432] do_mkdirat+0x234/0x2a0 [ 306.041166] ? __ia32_sys_mknod+0xb0/0xb0 [ 306.045316] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 306.050074] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.055697] ? do_syscall_64+0x26/0x620 [ 306.059868] ? lockdep_hardirqs_on+0x415/0x5d0 [ 306.064596] __x64_sys_mkdir+0x5c/0x80 [ 306.068554] do_syscall_64+0xfd/0x620 [ 306.072385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.077585] RIP: 0033:0x459317 [ 306.080778] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.100271] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 306.107999] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459317 06:06:17 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:17 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x2000}, 0x0) 06:06:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfffffffffffffffe, 0x8440) accept4$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14, 0x80000) [ 306.115287] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000140 [ 306.122570] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 306.129832] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 306.137111] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 [ 306.172230] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 306.190799] FAT-fs (loop5): bogus number of reserved sectors [ 306.196881] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RNDGETENTCNT(r4, 0x80045200, &(0x7f0000000040)) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000000)={0x3, 0x4, 0xa, 0x5, 0x1000}) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r5, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:17 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 06:06:20 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x20880, 0x0) ioctl$CAPI_SET_FLAGS(r2, 0x80044324, &(0x7f0000000100)) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:20 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:20 executing program 1 (fault-call:3 fault-nth:37): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_int(r3, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f0000000140)={{0x2, 0x0, @reserved="f2c3411c145357a4f5ca061deb0899fab1c1e8a466a1719f18787a14bc3e6be0"}}) 06:06:20 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 06:06:20 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x6c, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 308.482717] FAT-fs (loop5): bogus number of reserved sectors [ 308.484000] FAULT_INJECTION: forcing a failure. [ 308.484000] name failslab, interval 1, probability 0, space 0, times 0 [ 308.494382] FAT-fs (loop5): Can't find a valid FAT filesystem [ 308.519726] QAT: Invalid ioctl [ 308.526358] CPU: 0 PID: 28137 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 308.533520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.543170] Call Trace: [ 308.545793] dump_stack+0x172/0x1f0 [ 308.549453] should_fail.cold+0xa/0x1b [ 308.553654] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 308.558918] ? lock_downgrade+0x880/0x880 [ 308.563125] __should_failslab+0x121/0x190 [ 308.567610] should_failslab+0x9/0x14 [ 308.571990] __kmalloc_track_caller+0x2de/0x750 [ 308.577164] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 308.582818] ? strndup_user+0x77/0xd0 [ 308.587011] memdup_user+0x26/0xb0 [ 308.590857] strndup_user+0x77/0xd0 [ 308.590875] ksys_mount+0x7b/0x150 [ 308.590890] __x64_sys_mount+0xbe/0x150 [ 308.590908] do_syscall_64+0xfd/0x620 [ 308.590926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.590937] RIP: 0033:0x45c94a 06:06:20 executing program 2: dup(0xffffffffffffffff) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080)=0x7fffffff, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bridge0\x00', 0x0}) syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0xf0c704532c32d42b) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000340)="0383000003004c030d001100fff55b4202938207d9fb86dd398d5375000000007929301e8000d5c01843e06590080800000085472da722162bb401000000c3b50035110f118d0000f5cfe606f6925cbf34658ea132797b1abc5dc62600009b000000faffffff0000", 0x395, 0x0, 0x0, 0xffffffffffffffc9) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x40, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) [ 308.590952] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 308.590959] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 308.590974] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 308.590981] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 308.590988] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 308.591002] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 308.591013] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:20 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 06:06:20 executing program 1 (fault-call:3 fault-nth:38): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 308.772013] FAT-fs (loop5): bogus number of reserved sectors [ 308.809526] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:20 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000040)) ptrace(0x10, r0) 06:06:20 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 308.902111] FAULT_INJECTION: forcing a failure. [ 308.902111] name failslab, interval 1, probability 0, space 0, times 0 [ 308.932448] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 308.953101] CPU: 0 PID: 28383 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 308.960302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.969976] Call Trace: [ 308.972733] dump_stack+0x172/0x1f0 [ 308.976393] should_fail.cold+0xa/0x1b [ 308.980303] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 308.985425] ? lock_downgrade+0x880/0x880 [ 308.989618] __should_failslab+0x121/0x190 [ 308.993878] should_failslab+0x9/0x14 [ 308.997786] kmem_cache_alloc+0x2ae/0x700 [ 309.001955] ? kmem_cache_alloc_trace+0x5a7/0x760 [ 309.006816] ? find_held_lock+0x35/0x130 [ 309.011014] getname_flags+0xd6/0x5b0 [ 309.014969] user_path_at_empty+0x2f/0x50 [ 309.019140] do_mount+0x150/0x2bc0 [ 309.022796] ? rcu_read_lock_sched_held+0x110/0x130 [ 309.027834] ? copy_mount_string+0x40/0x40 [ 309.032091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.037730] ? copy_mount_options+0x280/0x3a0 [ 309.042253] ksys_mount+0xdb/0x150 [ 309.045820] __x64_sys_mount+0xbe/0x150 [ 309.049833] do_syscall_64+0xfd/0x620 [ 309.053665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.058976] RIP: 0033:0x45c94a [ 309.062269] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 309.081873] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 309.089762] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a 06:06:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000000)={0x2000, 0x0, 0x0, r7, 0x1}) [ 309.097050] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 309.104334] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 309.111703] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 309.118987] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:20 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 309.206199] FAT-fs (loop5): bogus number of reserved sectors 06:06:20 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x6d, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:20 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) rt_tgsigqueueinfo(0x0, 0x0, 0x10000000016, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000100)={{0x2, 0x0, @identifier="cc0837161b72b31ccb363787c072bdfe"}, 0xfa, [], "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"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() tkill(r2, 0x1000000000013) wait4(r2, &(0x7f0000000040), 0x2, 0x0) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, 0x0) [ 309.274215] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:20 executing program 1 (fault-call:3 fault-nth:39): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:21 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x244141, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x2000, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:21 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 309.366517] FAT-fs (loop5): bogus number of reserved sectors [ 309.400858] FAT-fs (loop5): Can't find a valid FAT filesystem [ 309.474506] FAULT_INJECTION: forcing a failure. [ 309.474506] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 309.486374] CPU: 1 PID: 28673 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 309.494204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.503574] Call Trace: [ 309.506476] dump_stack+0x172/0x1f0 [ 309.510146] should_fail.cold+0xa/0x1b [ 309.514075] ? kernel_text_address+0x73/0xf0 [ 309.518614] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 309.523849] ? mark_held_locks+0x100/0x100 [ 309.528229] __alloc_pages_nodemask+0x1ee/0x750 [ 309.532938] ? __alloc_pages_slowpath+0x2870/0x2870 [ 309.538153] ? find_held_lock+0x35/0x130 [ 309.542257] cache_grow_begin+0x91/0x8c0 [ 309.546335] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 309.551905] ? check_preemption_disabled+0x48/0x290 [ 309.556962] kmem_cache_alloc+0x63b/0x700 [ 309.561156] getname_flags+0xd6/0x5b0 [ 309.565002] user_path_at_empty+0x2f/0x50 [ 309.569181] do_mount+0x150/0x2bc0 [ 309.572905] ? rcu_read_lock_sched_held+0x110/0x130 [ 309.577974] ? copy_mount_string+0x40/0x40 [ 309.582238] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 309.587819] ? _copy_from_user+0xdd/0x150 [ 309.591993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.597555] ? copy_mount_options+0x280/0x3a0 [ 309.602102] ksys_mount+0xdb/0x150 [ 309.605668] __x64_sys_mount+0xbe/0x150 [ 309.609681] do_syscall_64+0xfd/0x620 [ 309.613519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.618855] RIP: 0033:0x45c94a [ 309.622060] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 309.641193] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 309.649453] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 309.656737] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 309.664278] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 06:06:21 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0xf5be14e4a3e72f13, 0x0) ioctl$VIDIOC_G_EDID(r2, 0xc0285628, &(0x7f00000000c0)={0x0, 0x0, 0x9, [], &(0x7f0000000040)=0x3f}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 309.671812] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 309.679207] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:21 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 309.741423] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 309.756167] FAT-fs (loop5): bogus number of reserved sectors [ 309.770131] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:21 executing program 1 (fault-call:3 fault-nth:40): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setregs(0xd, r2, 0x20000000000000, &(0x7f00000000c0)="b10e9dd71908d09256917b3c68be55e6f88cc5efe6b76b05acc2f2c0d4035b217556875a291b5a9474634b885f2f4490d2a43607649733eb9f410a9aac5979269a4e5adaf2b4a6d04b467c36356ab4b21b0bc329d90dcdf4180976b963e184a61efd219351eb488717e48b94c79c123c2f0c8e4871b5f97bf9c6ed9d912713d9c8cce62325620541f64e1403396f6b2392e6eb20") ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x30280, 0x0) [ 309.845280] FAT-fs (loop5): bogus number of reserved sectors [ 309.862996] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:21 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 309.949166] FAULT_INJECTION: forcing a failure. [ 309.949166] name failslab, interval 1, probability 0, space 0, times 0 [ 309.960810] CPU: 0 PID: 28888 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 309.967904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.977445] Call Trace: [ 309.980158] dump_stack+0x172/0x1f0 [ 309.983809] should_fail.cold+0xa/0x1b [ 309.987726] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 309.992868] ? lock_downgrade+0x880/0x880 06:06:21 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x80ffffff}, 0x0) [ 309.997061] __should_failslab+0x121/0x190 [ 310.001351] should_failslab+0x9/0x14 [ 310.005301] kmem_cache_alloc+0x2ae/0x700 [ 310.009706] ? lock_downgrade+0x880/0x880 [ 310.013992] alloc_vfsmnt+0x28/0x780 [ 310.017927] vfs_kern_mount.part.0+0x2a/0x410 [ 310.022465] do_mount+0x53e/0x2bc0 [ 310.026045] ? copy_mount_string+0x40/0x40 [ 310.030305] ? _copy_from_user+0xdd/0x150 [ 310.034600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.040330] ? copy_mount_options+0x280/0x3a0 [ 310.044969] ksys_mount+0xdb/0x150 [ 310.048529] __x64_sys_mount+0xbe/0x150 [ 310.052537] do_syscall_64+0xfd/0x620 [ 310.056369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.061573] RIP: 0033:0x45c94a [ 310.064765] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 310.083796] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 310.091655] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 310.098925] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 310.106210] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 310.113480] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 310.120764] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:21 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x6f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 310.223624] FAT-fs (loop5): bogus number of reserved sectors [ 310.245753] FAT-fs (loop5): Can't find a valid FAT filesystem [ 310.323692] FAT-fs (loop5): bogus number of reserved sectors [ 310.333551] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:24 executing program 1 (fault-call:3 fault-nth:41): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:24 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 06:06:24 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos&', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:24 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x70, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:24 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xb307113b8f391d83, 0x180) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x30, r6, 0x491, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000400}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x15c, r6, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x0, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffeff}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_SOCK={0x40}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffff9}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x30c}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7751}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7ff}, @TIPC_NLA_NET_NODEID_W1={0x0, 0x4, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x90, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}]}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x40, 0x0) connect$bt_sco(r7, &(0x7f0000000400)={0x1f, {0x9, 0x21, 0x1, 0x4, 0x1}}, 0x8) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000100)=0x100000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000380)=0x7) ptrace(0x10, r0) write$selinux_access(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a6b766d5f6465766963655f743a733020756e636f6e66696e65645f753a73797374656d5f723a696e736d6f645f743a73302d73303a63302e63313032332031383434363773e22dbe65efcec2f6e70186343430373337303935353135353200"], 0x65) [ 312.441639] FAULT_INJECTION: forcing a failure. [ 312.441639] name failslab, interval 1, probability 0, space 0, times 0 [ 312.473228] Cannot configure node identity twice [ 312.497098] audit: type=1400 audit(1571810784.104:54): avc: denied { write } for pid=29014 comm="syz-executor.3" name="net" dev="proc" ino=49730 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 312.514350] CPU: 0 PID: 29010 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 312.529421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.538832] Call Trace: [ 312.541458] dump_stack+0x172/0x1f0 [ 312.545117] should_fail.cold+0xa/0x1b [ 312.549036] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 312.553215] audit: type=1400 audit(1571810784.144:55): avc: denied { add_name } for pid=29014 comm="syz-executor.3" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 312.554165] ? lock_downgrade+0x880/0x880 [ 312.554191] __should_failslab+0x121/0x190 [ 312.584466] audit: type=1400 audit(1571810784.144:56): avc: denied { create } for pid=29014 comm="syz-executor.3" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 [ 312.586287] should_failslab+0x9/0x14 [ 312.586305] kmem_cache_alloc+0x2ae/0x700 [ 312.586320] ? cache_grow_end+0xa4/0x190 [ 312.586344] getname_flags+0xd6/0x5b0 [ 312.586364] user_path_at_empty+0x2f/0x50 [ 312.586380] do_mount+0x150/0x2bc0 [ 312.586399] ? rcu_read_lock_sched_held+0x110/0x130 [ 312.637599] ? copy_mount_string+0x40/0x40 [ 312.641950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.647516] ? copy_mount_options+0x280/0x3a0 [ 312.652041] ksys_mount+0xdb/0x150 [ 312.655621] __x64_sys_mount+0xbe/0x150 [ 312.660043] do_syscall_64+0xfd/0x620 [ 312.663960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.669183] RIP: 0033:0x45c94a [ 312.672503] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 06:06:24 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = gettid() tkill(r2, 0x1000000000013) rt_tgsigqueueinfo(r0, r2, 0x10000000016, &(0x7f0000000080)={0x0, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#\x8b\x00', 0x8, 0x40) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000100)=0x5, 0x4) r5 = dup(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000240)='.\x00', 0xc0000080) inotify_rm_watch(r6, 0x0) syz_open_dev$admmidi(0x0, 0x8000, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ptrace(0x10, r0) 06:06:24 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x0, 0x0, 0xffffff80}, 0x0) [ 312.692197] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 312.700135] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 312.707526] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 312.714896] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 312.722431] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 312.722440] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCSKEYCODE(r3, 0x40084504, &(0x7f0000000000)=[0x80000000, 0x5]) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10108000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@deltaction={0xe4, 0x31, 0x20c, 0x70bd2d, 0x25dfdbfc, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x7, @TCA_ACT_INDEX={0x8, 0x3, 0x52}}]}, @TCA_ACT_TAB={0xa8, 0x1, [{0x10, 0xd, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x12, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x10, 0x1e, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x14, 0xa, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x10, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x7, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x19b, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffe00}}]}, @TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x11, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4820}, 0x4000000) 06:06:24 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:24 executing program 1 (fault-call:3 fault-nth:42): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:24 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x2) [ 312.932295] FAT-fs (loop5): bogus number of reserved sectors [ 312.940994] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000180)={0x7, 0x1ff, 0x1, @remote, 'bond_slave_0\x00'}) r2 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x178, 0x200000) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f00000003c0)={{0x9f, 0x81}, {0x5, 0x1}, 0x96, 0x0, 0x8}) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x22080) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000240)=@sha1={0x1, "07dcda5069d6dbb95740dadd6060d48250fa1ad8"}, 0x15, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f00000002c0)={0x3fd5, 0x1, 0x1f}) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="010f0000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000300)={r6, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000000c0)={r6, @in={{0x2, 0x4e22, @broadcast}}}, 0x84) [ 312.991350] FAT-fs (loop5): bogus number of reserved sectors [ 312.997536] FAT-fs (loop5): Can't find a valid FAT filesystem [ 313.011830] FAULT_INJECTION: forcing a failure. [ 313.011830] name failslab, interval 1, probability 0, space 0, times 0 [ 313.027184] CPU: 1 PID: 29336 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 313.034283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.043743] Call Trace: [ 313.046388] dump_stack+0x172/0x1f0 [ 313.050054] should_fail.cold+0xa/0x1b [ 313.053981] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 313.059205] ? lock_downgrade+0x880/0x880 [ 313.063390] __should_failslab+0x121/0x190 [ 313.067650] should_failslab+0x9/0x14 [ 313.071475] kmem_cache_alloc+0x2ae/0x700 [ 313.075645] ? trace_hardirqs_on+0x67/0x220 [ 313.079993] ? kasan_check_read+0x11/0x20 [ 313.084174] getname_kernel+0x53/0x370 [ 313.088322] kern_path+0x20/0x40 [ 313.091721] lookup_bdev.part.0+0x7b/0x1b0 [ 313.096805] ? blkdev_open+0x290/0x290 [ 313.100729] ? __free_pages+0x72/0xb0 [ 313.104564] blkdev_get_by_path+0x81/0x130 [ 313.108906] mount_bdev+0x5d/0x3c0 [ 313.112562] ? finish_unfinished+0x1120/0x1120 [ 313.117172] get_super_block+0x35/0x40 [ 313.121085] mount_fs+0xa8/0x31f [ 313.124476] vfs_kern_mount.part.0+0x6f/0x410 [ 313.128999] do_mount+0x53e/0x2bc0 [ 313.132681] ? copy_mount_string+0x40/0x40 [ 313.137098] ? _copy_from_user+0xdd/0x150 [ 313.141277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.146866] ? copy_mount_options+0x280/0x3a0 [ 313.151395] ksys_mount+0xdb/0x150 [ 313.154953] __x64_sys_mount+0xbe/0x150 [ 313.158956] do_syscall_64+0xfd/0x620 [ 313.162787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.167987] RIP: 0033:0x45c94a [ 313.171227] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 313.190751] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 313.198486] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 313.205773] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 313.213064] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 313.220347] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 313.227627] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:24 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x4) 06:06:24 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x71, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:24 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:24 executing program 1 (fault-call:3 fault-nth:43): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x2000) [ 313.429061] FAULT_INJECTION: forcing a failure. [ 313.429061] name failslab, interval 1, probability 0, space 0, times 0 [ 313.461191] CPU: 0 PID: 29448 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 313.468284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.477827] Call Trace: [ 313.480439] dump_stack+0x172/0x1f0 [ 313.484121] should_fail.cold+0xa/0x1b [ 313.488046] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 313.493175] ? lock_downgrade+0x880/0x880 [ 313.497482] ? kill_litter_super+0x60/0x60 [ 313.501743] __should_failslab+0x121/0x190 [ 313.505999] should_failslab+0x9/0x14 [ 313.509838] kmem_cache_alloc_trace+0x2cc/0x760 [ 313.514528] ? kasan_check_read+0x11/0x20 [ 313.518690] ? do_raw_spin_unlock+0x57/0x270 [ 313.523210] ? kill_litter_super+0x60/0x60 [ 313.527463] sget_userns+0x11b/0xd30 [ 313.531194] ? kill_litter_super+0x60/0x60 [ 313.535448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.541004] ? ns_test_super+0x50/0x50 [ 313.545086] ? ns_test_super+0x50/0x50 [ 313.548982] ? kill_litter_super+0x60/0x60 [ 313.553931] sget+0x10c/0x150 [ 313.558024] mount_bdev+0xff/0x3c0 [ 313.561586] ? finish_unfinished+0x1120/0x1120 [ 313.566277] get_super_block+0x35/0x40 [ 313.570187] mount_fs+0xa8/0x31f [ 313.573577] vfs_kern_mount.part.0+0x6f/0x410 [ 313.578123] do_mount+0x53e/0x2bc0 [ 313.581690] ? copy_mount_string+0x40/0x40 [ 313.585951] ? _copy_from_user+0xdd/0x150 [ 313.590121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.596013] ? copy_mount_options+0x280/0x3a0 [ 313.601089] ksys_mount+0xdb/0x150 [ 313.604669] __x64_sys_mount+0xbe/0x150 [ 313.608677] do_syscall_64+0xfd/0x620 [ 313.612592] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.617880] RIP: 0033:0x45c94a [ 313.621173] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 313.640613] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 313.648349] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 313.655739] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 313.663201] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 313.670751] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 313.678118] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:27 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r3}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r5}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) mount$9p_virtio(&(0x7f0000000040)='%vboxnet1ppp0keyring\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x304143c, &(0x7f0000000180)={'trans=virtio,', {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'self][$keyringem1ppp0'}}, {@aname={'aname', 0x3d, '}md5sum#wlan0ppp1{trusted+'}}, {@version_u='version=9p2000.u'}, {@cache_fscache='cache=fscache'}, {@privport='privport'}, {@access_uid={'access', 0x3d, r3}}, {@cache_none='cache=none'}], [{@uid_eq={'uid', 0x3d, r5}}, {@audit='audit'}, {@hash='hash'}, {@appraise_type='appraise_type=imasig'}, {@smackfsroot={'smackfsroot'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@seclabel='seclabel'}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}]}}) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) seccomp(0x0, 0x1, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x5, 0x1, 0x10000}]}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:27 executing program 1 (fault-call:3 fault-nth:44): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x34000) 06:06:27 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:27 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x72, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 315.822999] FAT-fs (loop5): bogus number of reserved sectors [ 315.831641] FAULT_INJECTION: forcing a failure. [ 315.831641] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 315.847292] FAT-fs (loop5): Can't find a valid FAT filesystem [ 315.854722] CPU: 1 PID: 29462 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 315.861842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.871217] Call Trace: [ 315.873835] dump_stack+0x172/0x1f0 [ 315.877493] should_fail.cold+0xa/0x1b [ 315.881524] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 315.886657] ? __might_sleep+0x95/0x190 [ 315.890664] __alloc_pages_nodemask+0x1ee/0x750 [ 315.895440] ? rcu_read_lock_sched_held+0x110/0x130 [ 315.900597] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 315.906171] ? __alloc_pages_slowpath+0x2870/0x2870 [ 315.911224] ? pcpu_balance_workfn+0x1270/0x1270 [ 315.916006] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 315.921580] alloc_pages_current+0x107/0x210 [ 315.926022] get_zeroed_page+0x14/0x50 [ 315.929955] mount_fs+0x20a/0x31f [ 315.933707] vfs_kern_mount.part.0+0x6f/0x410 [ 315.938232] do_mount+0x53e/0x2bc0 [ 315.941828] ? copy_mount_string+0x40/0x40 [ 315.946271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.951913] ? copy_mount_options+0x280/0x3a0 [ 315.956607] ksys_mount+0xdb/0x150 [ 315.960173] __x64_sys_mount+0xbe/0x150 [ 315.964378] do_syscall_64+0xfd/0x620 [ 315.968198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.973513] RIP: 0033:0x45c94a [ 315.976719] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 315.996093] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 316.004018] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 316.011328] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 316.019480] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 316.026866] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 316.034160] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:27 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) move_pages(r0, 0xa, &(0x7f0000000400)=[&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000feb000/0x14000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000feb000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil], &(0x7f0000000480)=[0x5, 0x7, 0x1], &(0x7f00000004c0)=[0x0, 0x0], 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={r5, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept4$nfc_llcp(r7, &(0x7f0000000280), &(0x7f00000003c0)=0x60, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x4, 0x8, 0x2692, 0x7fff, r5}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e24, 0x9, @empty, 0x4}}, [0x9, 0x0, 0x81, 0x8, 0xfffffffffffffffa, 0x0, 0x7fffffff, 0x7291, 0x7, 0xff, 0x2, 0x1000, 0x1f, 0x47, 0x7fcb]}, &(0x7f0000000240)=0x100) r9 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r9) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ptrace(0x10, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$SCSI_IOCTL_START_UNIT(r13, 0x5) 06:06:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x400300) 06:06:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) getrusage(0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmsg$kcm(r3, &(0x7f0000000440)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/102, 0x66}], 0x1, &(0x7f0000000340)=""/223, 0xdf}, 0x10000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fgetxattr(r5, &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000180)=""/91, 0x5b) setsockopt$bt_BT_DEFER_SETUP(r5, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x4) r6 = syz_open_dev$adsp(&(0x7f0000000480)='/dev/adsp#\x00', 0x8000, 0x80041) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000540)={0x0, 0x2c, &(0x7f0000000500)=[@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e22, 0x101, @local, 0x101}]}, &(0x7f0000000580)=0x10) memfd_create(&(0x7f00000005c0)='\x00', 0x2) 06:06:27 executing program 1 (fault-call:3 fault-nth:45): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 316.160922] FAT-fs (loop5): bogus number of reserved sectors [ 316.182065] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:27 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:27 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000100)=0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet(r7, &(0x7f0000000180)="a7a9b1bcc3de1701cd6bc1351c8d73fee4581a36568769e9a083fe1695dc9927d788a95ce0525cf26e8923be5ecf59d0e1807a94acf60859855f6dc1b14899050aa7cd551cb96f4bba8637ce98b00e8c1bc4264c3e685e1e8578453d92bbf5e8f5791762fcae1ada6ee14d23f66f98e617487a401f59e1d8d1be6bde6487ee8ba1da823409c52471cf96f007797b63d4", 0x90, 0x2040081, &(0x7f0000000240)={0x2, 0x4e22, @remote}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) write(r8, &(0x7f0000000140)="2c465f2a6faed94c47ec", 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x1000000) [ 316.322451] FAULT_INJECTION: forcing a failure. [ 316.322451] name failslab, interval 1, probability 0, space 0, times 0 [ 316.366109] FAT-fs (loop5): bogus number of reserved sectors [ 316.377787] CPU: 1 PID: 29786 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 316.384775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.385793] FAT-fs (loop5): Can't find a valid FAT filesystem [ 316.394147] Call Trace: [ 316.394177] dump_stack+0x172/0x1f0 [ 316.394199] should_fail.cold+0xa/0x1b [ 316.394218] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 316.394235] ? lock_downgrade+0x880/0x880 [ 316.394253] ? kill_litter_super+0x60/0x60 [ 316.394267] __should_failslab+0x121/0x190 [ 316.394283] should_failslab+0x9/0x14 [ 316.394297] kmem_cache_alloc_trace+0x2cc/0x760 [ 316.394312] ? kasan_check_read+0x11/0x20 [ 316.394324] ? do_raw_spin_unlock+0x57/0x270 [ 316.394336] ? kill_litter_super+0x60/0x60 [ 316.394362] sget_userns+0x11b/0xd30 [ 316.410372] ? kill_litter_super+0x60/0x60 [ 316.410391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.410406] ? ns_test_super+0x50/0x50 [ 316.410421] ? ns_test_super+0x50/0x50 [ 316.410432] ? kill_litter_super+0x60/0x60 [ 316.410448] sget+0x10c/0x150 [ 316.419814] mount_bdev+0xff/0x3c0 [ 316.419833] ? finish_unfinished+0x1120/0x1120 [ 316.419853] get_super_block+0x35/0x40 [ 316.419868] mount_fs+0xa8/0x31f [ 316.419887] vfs_kern_mount.part.0+0x6f/0x410 [ 316.419904] do_mount+0x53e/0x2bc0 [ 316.419921] ? copy_mount_string+0x40/0x40 [ 316.419936] ? _copy_from_user+0xdd/0x150 [ 316.419953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.516447] ? copy_mount_options+0x280/0x3a0 [ 316.520969] ksys_mount+0xdb/0x150 [ 316.524532] __x64_sys_mount+0xbe/0x150 [ 316.528531] do_syscall_64+0xfd/0x620 [ 316.532444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.537645] RIP: 0033:0x45c94a [ 316.540956] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 06:06:28 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = semget(0x3, 0x3, 0x20) semctl$IPC_RMID(r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:28 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x73, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 316.560274] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 316.568010] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 316.575308] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 316.582696] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 316.590105] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 316.597413] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0xa58a42266fac26e, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000000)={0xd000, 0x0, 0x0, 0xffffffffffffffff, 0x561d5d9bbbcae403}) 06:06:28 executing program 1 (fault-call:3 fault-nth:46): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:28 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x2000000) 06:06:28 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(r0, &(0x7f0000000080)='personality\x00') getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) r4 = dup(r2) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000040)={0x8, 0x35, 0x2, 0x2}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='gre0\x00', 0x10) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 316.838049] FAT-fs (loop5): bogus number of reserved sectors [ 316.852823] FAULT_INJECTION: forcing a failure. [ 316.852823] name failslab, interval 1, probability 0, space 0, times 0 [ 316.878712] FAT-fs (loop5): Can't find a valid FAT filesystem [ 316.892532] CPU: 1 PID: 30182 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 316.899777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.899840] Call Trace: [ 316.899865] dump_stack+0x172/0x1f0 [ 316.899886] should_fail.cold+0xa/0x1b [ 316.919782] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 316.919801] ? lock_downgrade+0x880/0x880 [ 316.919829] __should_failslab+0x121/0x190 [ 316.933544] should_failslab+0x9/0x14 [ 316.937487] kmem_cache_alloc_node_trace+0x274/0x720 [ 316.942632] __kmalloc_node+0x3d/0x80 [ 316.946638] kvmalloc_node+0x68/0x100 [ 316.950460] __list_lru_init+0x4d9/0x720 [ 316.954564] sget_userns+0x81b/0xd30 [ 316.958384] ? kill_litter_super+0x60/0x60 [ 316.962897] ? ns_test_super+0x50/0x50 [ 316.966804] ? ns_test_super+0x50/0x50 [ 316.970706] ? kill_litter_super+0x60/0x60 [ 316.974957] sget+0x10c/0x150 [ 316.978077] mount_bdev+0xff/0x3c0 [ 316.981636] ? finish_unfinished+0x1120/0x1120 [ 316.986331] get_super_block+0x35/0x40 [ 316.990262] mount_fs+0xa8/0x31f [ 316.993659] vfs_kern_mount.part.0+0x6f/0x410 [ 316.998203] do_mount+0x53e/0x2bc0 [ 317.001772] ? copy_mount_string+0x40/0x40 [ 317.006022] ? _copy_from_user+0xdd/0x150 [ 317.010193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.015748] ? copy_mount_options+0x280/0x3a0 [ 317.021149] ksys_mount+0xdb/0x150 [ 317.024735] __x64_sys_mount+0xbe/0x150 [ 317.029034] do_syscall_64+0xfd/0x620 [ 317.032900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.038363] RIP: 0033:0x45c94a [ 317.041570] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 317.061110] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 317.068852] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 317.076319] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 317.083712] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 317.091239] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 317.098694] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 [ 317.132699] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 06:06:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x4000000) [ 317.164041] FAT-fs (loop5): bogus number of reserved sectors [ 317.174598] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:28 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:28 executing program 1 (fault-call:3 fault-nth:47): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x100001, 0xc) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000040)=0x631, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x4, 0x3ff, 0x4db2}}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r5, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x84, r6, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x84}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x91}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x400}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0x84}, 0x1, 0x0, 0x0, 0x80}, 0x41) r7 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000280)) ioctl$KVM_IOEVENTFD(r7, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) sendto$ax25(r1, &(0x7f00000000c0)="c68869432d441b404f357c2a226d4c33bf49973e28ef97e09956c10606636ba38b4f13dfeb8773fbdf871b7cada03a53c6787954ee769d5d30d9426b7574593a6f1076fcf6d6bbaf1acff6522612d45e5e2f0469e262ab423683a4f9133bd01207c0821a083deca07c6e911eb91268b37d3d41b317e1fcf29e69fd94080de01514f2c3b77b1084f36042c80ec23ce6d1e241edb26b6c300af2f3a38d43ce1c9c3e1132a32b61dbbfb9b324cf4b8fe10b2f9ed944802f2d86f05899279f4c64336e46ab582ec183dc9233485962", 0xcd, 0x40, &(0x7f00000001c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 06:06:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x20000000) [ 317.388608] FAT-fs (loop5): bogus number of reserved sectors [ 317.392871] FAULT_INJECTION: forcing a failure. [ 317.392871] name failslab, interval 1, probability 0, space 0, times 0 [ 317.413266] FAT-fs (loop5): Can't find a valid FAT filesystem [ 317.441463] CPU: 1 PID: 30429 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 317.448458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.457929] Call Trace: [ 317.460565] dump_stack+0x172/0x1f0 [ 317.464238] should_fail.cold+0xa/0x1b [ 317.468171] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 317.474096] ? lock_downgrade+0x880/0x880 [ 317.478331] __should_failslab+0x121/0x190 [ 317.482609] should_failslab+0x9/0x14 [ 317.486461] kmem_cache_alloc_trace+0x2cc/0x760 [ 317.491174] ? lock_acquire+0x16f/0x3f0 [ 317.495204] selinux_sb_alloc_security+0x46/0x220 [ 317.500227] security_sb_alloc+0x63/0xa0 [ 317.504682] ? kill_litter_super+0x60/0x60 [ 317.508995] sget_userns+0x210/0xd30 [ 317.512749] ? kill_litter_super+0x60/0x60 [ 317.517029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.522632] ? ns_test_super+0x50/0x50 [ 317.526638] ? ns_test_super+0x50/0x50 [ 317.530558] ? kill_litter_super+0x60/0x60 [ 317.534937] sget+0x10c/0x150 [ 317.538104] mount_bdev+0xff/0x3c0 [ 317.541679] ? finish_unfinished+0x1120/0x1120 [ 317.546396] get_super_block+0x35/0x40 [ 317.550418] mount_fs+0xa8/0x31f [ 317.553832] vfs_kern_mount.part.0+0x6f/0x410 [ 317.558412] do_mount+0x53e/0x2bc0 [ 317.562087] ? copy_mount_string+0x40/0x40 [ 317.566384] ? _copy_from_user+0xdd/0x150 [ 317.570603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.576266] ? copy_mount_options+0x280/0x3a0 [ 317.580807] ksys_mount+0xdb/0x150 [ 317.584393] __x64_sys_mount+0xbe/0x150 [ 317.588406] do_syscall_64+0xfd/0x620 [ 317.592280] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.597674] RIP: 0033:0x45c94a [ 317.600997] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 317.620549] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 317.628533] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 317.636055] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 317.643357] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 317.650738] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 317.658028] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 [ 317.722206] FAT-fs (loop5): bogus number of reserved sectors [ 317.729811] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:29 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x74, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x80ffffff) 06:06:29 executing program 1 (fault-call:3 fault-nth:48): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:29 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos&', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:29 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xb02, 0x30000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000980)=""/1, 0x1}, {&(0x7f00000009c0)=""/27, 0x1b}, {&(0x7f0000000a00)=""/227, 0xe3}], 0x3, &(0x7f0000000b40)=""/194, 0xc2}, 0x20140) bind$can_raw(r0, &(0x7f0000000c80)={0x1d, r1}, 0x10) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x18800, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0xffffff7f) 06:06:29 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\n', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 318.028545] FAULT_INJECTION: forcing a failure. [ 318.028545] name failslab, interval 1, probability 0, space 0, times 0 [ 318.101431] CPU: 0 PID: 30551 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 318.108417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.117798] Call Trace: [ 318.120406] dump_stack+0x172/0x1f0 [ 318.124251] should_fail.cold+0xa/0x1b [ 318.128199] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 318.133336] ? lock_downgrade+0x880/0x880 [ 318.137640] __should_failslab+0x121/0x190 [ 318.141988] should_failslab+0x9/0x14 [ 318.146191] __kmalloc+0x2e2/0x750 06:06:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f00000000c0)={{0x2, 0x0, 0x5, 0x2, 0x889}, 0x1, 0x200, 'id0\x00', 'timer0\x00', 0x0, 0x7, 0x8, 0x4, 0x6}) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 318.149775] ? __list_lru_init+0xd5/0x720 [ 318.153956] __list_lru_init+0xd5/0x720 [ 318.158051] sget_userns+0x81b/0xd30 [ 318.162014] ? kill_litter_super+0x60/0x60 [ 318.166314] ? ns_test_super+0x50/0x50 [ 318.170241] ? ns_test_super+0x50/0x50 [ 318.174156] ? kill_litter_super+0x60/0x60 [ 318.178428] sget+0x10c/0x150 [ 318.181646] mount_bdev+0xff/0x3c0 [ 318.185213] ? finish_unfinished+0x1120/0x1120 [ 318.190102] get_super_block+0x35/0x40 [ 318.194025] mount_fs+0xa8/0x31f [ 318.197429] vfs_kern_mount.part.0+0x6f/0x410 06:06:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0xffffff80) [ 318.201955] do_mount+0x53e/0x2bc0 [ 318.205525] ? copy_mount_string+0x40/0x40 [ 318.209796] ? copy_mount_options+0x198/0x3a0 [ 318.214313] ? copy_mount_options+0x1c3/0x3a0 [ 318.214329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.214342] ? copy_mount_options+0x280/0x3a0 [ 318.214359] ksys_mount+0xdb/0x150 [ 318.232629] __x64_sys_mount+0xbe/0x150 [ 318.236712] do_syscall_64+0xfd/0x620 [ 318.236733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.236749] RIP: 0033:0x45c94a [ 318.249282] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 318.268973] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 318.277053] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 318.284429] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 318.291739] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 318.299477] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 318.307718] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x40030000000000) 06:06:30 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos$', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) r2 = socket(0x8, 0x800, 0x3) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e20, @rand_addr=0x7ff}], 0x10) 06:06:30 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x75, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x100000000000000) 06:06:30 executing program 1 (fault-call:3 fault-nth:49): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:30 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x200, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x200000000000000) [ 318.916663] FAULT_INJECTION: forcing a failure. [ 318.916663] name failslab, interval 1, probability 0, space 0, times 0 [ 318.953312] CPU: 1 PID: 30893 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 318.960385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.970158] Call Trace: [ 318.972821] dump_stack+0x172/0x1f0 [ 318.978227] should_fail.cold+0xa/0x1b [ 318.982500] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 318.987621] ? lock_downgrade+0x880/0x880 [ 318.991813] __should_failslab+0x121/0x190 [ 318.996080] should_failslab+0x9/0x14 [ 319.000080] kmem_cache_alloc_trace+0x2cc/0x760 [ 319.004858] ? kasan_unpoison_shadow+0x35/0x50 [ 319.009636] ? kasan_kmalloc+0xce/0xf0 [ 319.013632] __memcg_init_list_lru_node+0x8a/0x1e0 [ 319.018582] __list_lru_init+0x402/0x720 [ 319.022862] sget_userns+0x81b/0xd30 [ 319.026776] ? kill_litter_super+0x60/0x60 [ 319.031126] ? ns_test_super+0x50/0x50 [ 319.035207] ? ns_test_super+0x50/0x50 [ 319.039105] ? kill_litter_super+0x60/0x60 [ 319.043456] sget+0x10c/0x150 [ 319.046592] mount_bdev+0xff/0x3c0 [ 319.050147] ? finish_unfinished+0x1120/0x1120 [ 319.054783] get_super_block+0x35/0x40 [ 319.058864] mount_fs+0xa8/0x31f [ 319.062510] vfs_kern_mount.part.0+0x6f/0x410 [ 319.067027] do_mount+0x53e/0x2bc0 [ 319.071209] ? copy_mount_string+0x40/0x40 [ 319.075546] ? _copy_from_user+0xdd/0x150 [ 319.079715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.085273] ? copy_mount_options+0x280/0x3a0 [ 319.089969] ksys_mount+0xdb/0x150 [ 319.094395] __x64_sys_mount+0xbe/0x150 [ 319.098716] do_syscall_64+0xfd/0x620 [ 319.102539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.107741] RIP: 0033:0x45c94a [ 319.111046] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 319.131000] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 319.138721] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 319.146003] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 319.153285] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 06:06:30 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 319.160564] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 319.168017] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r3 = openat(r2, &(0x7f0000000040)='./file0\x00', 0x10d001, 0x25) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) 06:06:30 executing program 1 (fault-call:3 fault-nth:50): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x400000000000000) [ 319.344302] FAT-fs (loop5): bogus number of reserved sectors [ 319.375319] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f00000000c0)={0x5, 0x4, 0xff, 0x800, [], [], [], 0x100, 0x8000, 0x5, 0x3, "110557eaefc8784b98481ec7cf06d8af"}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r5 = gettid() tkill(r5, 0x1000000000013) write$cgroup_pid(r4, &(0x7f0000000040)=r5, 0x12) r6 = gettid() tkill(r6, 0x1000000000013) tkill(r6, 0x9) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000240)=@assoc_value, &(0x7f0000000280)=0x8) [ 319.425961] FAT-fs (loop5): bogus number of reserved sectors [ 319.457144] FAT-fs (loop5): Can't find a valid FAT filesystem [ 319.469071] FAULT_INJECTION: forcing a failure. [ 319.469071] name failslab, interval 1, probability 0, space 0, times 0 [ 319.490166] CPU: 0 PID: 31104 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 319.497148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.506536] Call Trace: [ 319.506568] dump_stack+0x172/0x1f0 [ 319.506591] should_fail.cold+0xa/0x1b [ 319.506614] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 319.522131] ? lock_downgrade+0x880/0x880 [ 319.526393] __should_failslab+0x121/0x190 [ 319.526411] should_failslab+0x9/0x14 [ 319.526427] __kmalloc+0x2e2/0x750 [ 319.526451] ? __list_lru_init+0xd5/0x720 [ 319.542406] __list_lru_init+0xd5/0x720 [ 319.542428] sget_userns+0x81b/0xd30 [ 319.542442] ? kill_litter_super+0x60/0x60 [ 319.542458] ? ns_test_super+0x50/0x50 [ 319.558584] ? ns_test_super+0x50/0x50 [ 319.562509] ? kill_litter_super+0x60/0x60 [ 319.566801] sget+0x10c/0x150 [ 319.570050] mount_bdev+0xff/0x3c0 [ 319.573627] ? finish_unfinished+0x1120/0x1120 [ 319.578424] get_super_block+0x35/0x40 [ 319.582437] mount_fs+0xa8/0x31f [ 319.585843] vfs_kern_mount.part.0+0x6f/0x410 [ 319.590388] do_mount+0x53e/0x2bc0 [ 319.594080] ? copy_mount_string+0x40/0x40 [ 319.598370] ? _copy_from_user+0xdd/0x150 [ 319.602663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.608234] ? copy_mount_options+0x280/0x3a0 [ 319.612784] ksys_mount+0xdb/0x150 [ 319.616456] __x64_sys_mount+0xbe/0x150 [ 319.620587] do_syscall_64+0xfd/0x620 [ 319.624430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.629669] RIP: 0033:0x45c94a [ 319.632987] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 319.652270] RSP: 002b:00007fae6b7eaa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 319.660438] RAX: ffffffffffffffda RBX: 00007fae6b7eab40 RCX: 000000000045c94a [ 319.667980] RDX: 00007fae6b7eaae0 RSI: 0000000020000140 RDI: 00007fae6b7eab00 06:06:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x2000000000000000) [ 319.675455] RBP: 0000000000000000 R08: 00007fae6b7eab40 R09: 00007fae6b7eaae0 [ 319.683353] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 319.690939] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000003 06:06:31 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x76, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:31 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/j|h\x00', 0x8000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:31 executing program 1 (fault-call:3 fault-nth:51): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x80ffffff00000000) [ 319.902531] FAT-fs (loop5): bogus number of reserved sectors [ 319.953785] FAT-fs (loop5): Can't find a valid FAT filesystem [ 320.025215] FAULT_INJECTION: forcing a failure. [ 320.025215] name failslab, interval 1, probability 0, space 0, times 0 [ 320.026152] FAT-fs (loop5): bogus number of reserved sectors [ 320.042651] FAT-fs (loop5): Can't find a valid FAT filesystem [ 320.057917] CPU: 0 PID: 31221 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 320.065106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.074474] Call Trace: [ 320.077117] dump_stack+0x172/0x1f0 [ 320.080778] should_fail.cold+0xa/0x1b [ 320.084724] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 320.089869] ? lock_downgrade+0x880/0x880 [ 320.094509] __should_failslab+0x121/0x190 [ 320.098955] should_failslab+0x9/0x14 [ 320.102902] __kmalloc+0x2e2/0x750 [ 320.106472] ? __lockdep_init_map+0x10c/0x5b0 [ 320.110992] ? prealloc_shrinker+0xdf/0x340 [ 320.115420] prealloc_shrinker+0xdf/0x340 [ 320.119603] sget_userns+0x7ec/0xd30 06:06:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0xffffff7f00000000) 06:06:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0xc, 0xffffffffffffffff, 0xd}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)={0x9}) [ 320.123348] ? kill_litter_super+0x60/0x60 [ 320.127800] ? ns_test_super+0x50/0x50 [ 320.131826] ? ns_test_super+0x50/0x50 [ 320.135741] ? kill_litter_super+0x60/0x60 [ 320.140093] sget+0x10c/0x150 [ 320.143240] mount_bdev+0xff/0x3c0 [ 320.147428] ? finish_unfinished+0x1120/0x1120 [ 320.152159] get_super_block+0x35/0x40 [ 320.156084] mount_fs+0xa8/0x31f [ 320.159490] vfs_kern_mount.part.0+0x6f/0x410 [ 320.164029] do_mount+0x53e/0x2bc0 [ 320.167744] ? copy_mount_string+0x40/0x40 [ 320.172014] ? _copy_from_user+0xdd/0x150 [ 320.176426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.182098] ? copy_mount_options+0x280/0x3a0 [ 320.186835] ksys_mount+0xdb/0x150 [ 320.190408] __x64_sys_mount+0xbe/0x150 [ 320.194423] do_syscall_64+0xfd/0x620 [ 320.198264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.203507] RIP: 0033:0x45c94a [ 320.206758] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 320.226408] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 320.234439] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 320.242520] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 320.250061] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 320.257642] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 320.265115] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:31 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={@bcast, @null, 0x0, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) [ 320.401273] FAT-fs (loop5): bogus number of reserved sectors [ 320.451629] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:32 executing program 1 (fault-call:3 fault-nth:52): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 320.573126] FAT-fs (loop5): bogus number of reserved sectors [ 320.598853] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:32 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x7a, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x8000, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$TIOCGETD(r9, 0x5424, &(0x7f0000000000)) 06:06:32 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 320.778745] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 320.833791] FAULT_INJECTION: forcing a failure. [ 320.833791] name failslab, interval 1, probability 0, space 0, times 0 [ 320.861280] CPU: 0 PID: 31441 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 320.868883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.878341] Call Trace: [ 320.878369] dump_stack+0x172/0x1f0 [ 320.878392] should_fail.cold+0xa/0x1b [ 320.878409] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 320.878425] ? lock_downgrade+0x880/0x880 [ 320.878446] __should_failslab+0x121/0x190 [ 320.878461] should_failslab+0x9/0x14 [ 320.878478] __kmalloc+0x2e2/0x750 [ 320.878492] ? __lockdep_init_map+0x10c/0x5b0 [ 320.878507] ? prealloc_shrinker+0xdf/0x340 [ 320.878524] prealloc_shrinker+0xdf/0x340 [ 320.888735] sget_userns+0x7ec/0xd30 [ 320.927443] ? kill_litter_super+0x60/0x60 [ 320.931923] ? ns_test_super+0x50/0x50 [ 320.935949] ? ns_test_super+0x50/0x50 [ 320.939952] ? kill_litter_super+0x60/0x60 [ 320.944587] sget+0x10c/0x150 [ 320.947745] mount_bdev+0xff/0x3c0 [ 320.951422] ? finish_unfinished+0x1120/0x1120 [ 320.956235] get_super_block+0x35/0x40 [ 320.960247] mount_fs+0xa8/0x31f [ 320.963862] vfs_kern_mount.part.0+0x6f/0x410 [ 320.968402] do_mount+0x53e/0x2bc0 [ 320.972011] ? copy_mount_string+0x40/0x40 [ 320.976309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.981961] ? copy_mount_options+0x280/0x3a0 [ 320.986669] ksys_mount+0xdb/0x150 [ 320.990267] __x64_sys_mount+0xbe/0x150 [ 320.994307] do_syscall_64+0xfd/0x620 [ 320.998164] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.003388] RIP: 0033:0x45c94a [ 321.007361] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 06:06:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001540)=ANY=[@ANYBLOB="00511be63d8d35e5fcf0795b6956931215ac530000003c66ac243fbd616d706ab7e22c99385055e4993bef714eb1d82e425b1fffaee9f1347f29691df05219896aa2e7ff10f6da687371ab74f426b00e4785c65f96e44d6bb7d456d989d00c8342402117ed1bbb9ded2eac6d9b0e28eab247eaac68363a581b388e2d6c4b56ee6019099397d8cdf68d1c1cf5a424d13dc4c2bb0af5112a89f802de7c50b141bc1c0edcc23a3cafc183fb2429251beb7f19440af63cb3bb3c397886f0", @ANYRES16=r1, @ANYBLOB], 0x3}}, 0x4000) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) r3 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f00000003c0)=[@in6={0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, [], 0x26}, 0x5}, @in6={0xa, 0x4e24, 0x4, @rand_addr="f5892b5f3d77092645db62b91425328a"}, @in6={0xa, 0x4e21, 0xa4f2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, @in6={0xa, 0x4e24, 0xd, @loopback, 0xff}, @in6={0xa, 0x4e23, 0xfffffffd, @local, 0xc67}, @in={0x2, 0x4e23, @broadcast}], 0x9c) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, r1, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7ff}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r5}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4008840) [ 321.029251] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 321.037081] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 321.044644] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 321.051934] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 321.059305] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 321.067318] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:32 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:32 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1489884}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x238, 0x70bd2d, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x8020}, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) 06:06:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020d00000a008000000000000000000005000500000000000a00002000000000fe8800000000000000000000000000000003000640c5628f3f8b79bb00e000000100000000000000008f2d05bfaeb8bcd8e583b990225e7eb4b02a41dd6a2ef8347ba23f7574d164ef6436999ac430a0f02e5509d12ba66565635cb42c33762cf90d8f180208a470e126a9e519b74fe0a8ae46f2d5a1c6a11150a2c3b5bdd0b566ce3bbefae5e85fc58ffad6af29b06daa320d00"/191], 0xbf}}, 0x2ee861e93bb11bd8) 06:06:32 executing program 1 (fault-call:3 fault-nth:53): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000040)={0x8, 0x2}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) 06:06:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000080)={0x2, 0x3, 0x5, 0x100}) 06:06:33 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 321.437135] FAULT_INJECTION: forcing a failure. [ 321.437135] name failslab, interval 1, probability 0, space 0, times 0 [ 321.483342] CPU: 0 PID: 31669 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 321.490430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.499901] Call Trace: [ 321.502509] dump_stack+0x172/0x1f0 [ 321.506153] should_fail.cold+0xa/0x1b [ 321.510059] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 321.515166] ? lock_downgrade+0x880/0x880 [ 321.519429] __should_failslab+0x121/0x190 [ 321.523753] should_failslab+0x9/0x14 [ 321.527565] kmem_cache_alloc_trace+0x2cc/0x760 [ 321.532411] ? kasan_unpoison_shadow+0x35/0x50 [ 321.536991] ? kasan_kmalloc+0xce/0xf0 [ 321.540892] __memcg_init_list_lru_node+0x8a/0x1e0 [ 321.545832] __list_lru_init+0x402/0x720 [ 321.550162] sget_userns+0x81b/0xd30 [ 321.553975] ? kill_litter_super+0x60/0x60 [ 321.558212] ? ns_test_super+0x50/0x50 [ 321.562119] ? ns_test_super+0x50/0x50 [ 321.566012] ? kill_litter_super+0x60/0x60 [ 321.570533] sget+0x10c/0x150 [ 321.573902] mount_bdev+0xff/0x3c0 [ 321.577616] ? finish_unfinished+0x1120/0x1120 [ 321.582303] get_super_block+0x35/0x40 [ 321.586203] mount_fs+0xa8/0x31f [ 321.589572] vfs_kern_mount.part.0+0x6f/0x410 [ 321.594093] do_mount+0x53e/0x2bc0 [ 321.597720] ? copy_mount_string+0x40/0x40 [ 321.601953] ? _copy_from_user+0xdd/0x150 [ 321.606124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.611697] ? copy_mount_options+0x280/0x3a0 [ 321.616197] ksys_mount+0xdb/0x150 [ 321.619828] __x64_sys_mount+0xbe/0x150 [ 321.623806] do_syscall_64+0xfd/0x620 [ 321.627787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.633082] RIP: 0033:0x45c94a [ 321.636417] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 321.655593] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 321.663314] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 321.670576] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 06:06:33 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x7b, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 321.677848] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 321.685374] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 321.692734] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:33 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000000c0)={'bpq0\x00', {0x2, 0x4e24, @multicast2}}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:06:33 executing program 1 (fault-call:3 fault-nth:54): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000000)) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:33 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000240)={0x0, 0xed, 0x72, "e37a37c5d0982af0f227e305bdac3e4495959a50a7817b79296fcaba9bfa9766bbfbe0f76b9b87b5ab37047d2cb78f6dfca55e17ee59f13cf7018b7a8bac9fa1a9fbd8a21d0f9cfb8e57374b8c2b283d194e6c657d89d7cc2055522f8e0b3a0564508f2477f34bb5f8d7cbb09bb111d03f8a"}, 0x7a) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r5, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={r5, 0x14187a1c}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r6, 0x6}, &(0x7f00000001c0)=0x8) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="153ee7319edae0b44a83bc37e428a52736e071e65100cc90caa6133bffa622578d3af6fd7afb9e7837f9ce3dcd4530ba8b5f5b4e0159d5c37002eaddb961627b7cc50dbd86b4cc6b3ed086fd5070606669b82f34284ecebf4660dd74387aa38a421f2d09dae8521a536351dd605f94b3f5efed55f7340e96397857ad411a28a7c3ac24f6673772"], 0x10}}, 0x0) 06:06:33 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 322.163494] FAULT_INJECTION: forcing a failure. [ 322.163494] name failslab, interval 1, probability 0, space 0, times 0 [ 322.175832] CPU: 1 PID: 31878 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 322.183147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.193924] Call Trace: [ 322.196635] dump_stack+0x172/0x1f0 [ 322.200306] should_fail.cold+0xa/0x1b [ 322.204236] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 322.209654] ? lock_downgrade+0x880/0x880 [ 322.213897] __should_failslab+0x121/0x190 [ 322.218130] should_failslab+0x9/0x14 [ 322.221941] kmem_cache_alloc_trace+0x2cc/0x760 [ 322.226700] ? kasan_unpoison_shadow+0x35/0x50 [ 322.231307] ? kasan_kmalloc+0xce/0xf0 [ 322.235216] __memcg_init_list_lru_node+0x8a/0x1e0 [ 322.240164] __list_lru_init+0x402/0x720 [ 322.244234] sget_userns+0x81b/0xd30 [ 322.248124] ? kill_litter_super+0x60/0x60 [ 322.252354] ? ns_test_super+0x50/0x50 [ 322.256495] ? ns_test_super+0x50/0x50 [ 322.260472] ? kill_litter_super+0x60/0x60 [ 322.264793] sget+0x10c/0x150 [ 322.267996] mount_bdev+0xff/0x3c0 [ 322.271620] ? finish_unfinished+0x1120/0x1120 [ 322.276289] get_super_block+0x35/0x40 [ 322.280294] mount_fs+0xa8/0x31f [ 322.283659] vfs_kern_mount.part.0+0x6f/0x410 [ 322.288166] do_mount+0x53e/0x2bc0 [ 322.291806] ? copy_mount_string+0x40/0x40 [ 322.296226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.301773] ? copy_mount_options+0x280/0x3a0 [ 322.306312] ksys_mount+0xdb/0x150 [ 322.309960] __x64_sys_mount+0xbe/0x150 [ 322.314304] do_syscall_64+0xfd/0x620 [ 322.318101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.323848] RIP: 0033:0x45c94a [ 322.327470] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 322.346560] RSP: 002b:00007fae6b7a8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 322.354311] RAX: ffffffffffffffda RBX: 00007fae6b7a8b40 RCX: 000000000045c94a [ 322.361670] RDX: 00007fae6b7a8ae0 RSI: 0000000020000140 RDI: 00007fae6b7a8b00 [ 322.369160] RBP: 0000000000000000 R08: 00007fae6b7a8b40 R09: 00007fae6b7a8ae0 [ 322.376601] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 322.383980] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:34 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) r2 = getpgrp(0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x840, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_XSAVE(r4, 0x9000aea4, &(0x7f0000000240)) prctl$PR_SET_PTRACER(0x59616d61, r2) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000100)={0x1000, 0x0, 0x1}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(r8, 0xc0206434, &(0x7f0000000000)={0x5, 0x0, 0x975b1672f5d32b83, 0xfffffffffffffb21}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r11, 0x84, 0x20, &(0x7f0000000200)=0x1, 0x4) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000080)={0x3ff, r9, 0x2, 0x5}) ptrace(0x10, r0) 06:06:34 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:34 executing program 1 (fault-call:3 fault-nth:55): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:34 executing program 3: r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:34 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x7c, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 322.639209] FAULT_INJECTION: forcing a failure. [ 322.639209] name failslab, interval 1, probability 0, space 0, times 0 [ 322.657876] CPU: 0 PID: 31990 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 322.664863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.674441] Call Trace: [ 322.677086] dump_stack+0x172/0x1f0 [ 322.680753] should_fail.cold+0xa/0x1b [ 322.684710] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 322.689855] ? lock_downgrade+0x880/0x880 [ 322.694223] __should_failslab+0x121/0x190 [ 322.698575] should_failslab+0x9/0x14 [ 322.702418] kmem_cache_alloc_trace+0x2cc/0x760 [ 322.707300] ? kasan_unpoison_shadow+0x35/0x50 [ 322.712088] ? kasan_kmalloc+0xce/0xf0 [ 322.716272] __memcg_init_list_lru_node+0x8a/0x1e0 [ 322.722292] __list_lru_init+0x402/0x720 [ 322.726459] sget_userns+0x81b/0xd30 [ 322.730273] ? kill_litter_super+0x60/0x60 [ 322.735407] ? ns_test_super+0x50/0x50 [ 322.739315] ? ns_test_super+0x50/0x50 [ 322.743567] ? kill_litter_super+0x60/0x60 [ 322.748032] sget+0x10c/0x150 [ 322.751235] mount_bdev+0xff/0x3c0 [ 322.754773] ? finish_unfinished+0x1120/0x1120 [ 322.760090] get_super_block+0x35/0x40 [ 322.764318] mount_fs+0xa8/0x31f [ 322.767792] vfs_kern_mount.part.0+0x6f/0x410 [ 322.772460] do_mount+0x53e/0x2bc0 [ 322.776182] ? copy_mount_string+0x40/0x40 [ 322.780423] ? _copy_from_user+0xdd/0x150 [ 322.784751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.790290] ? copy_mount_options+0x280/0x3a0 [ 322.794790] ksys_mount+0xdb/0x150 [ 322.798612] __x64_sys_mount+0xbe/0x150 [ 322.802694] do_syscall_64+0xfd/0x620 [ 322.806499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.811707] RIP: 0033:0x45c94a [ 322.814987] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 322.834164] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 322.841973] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 322.849238] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 322.856507] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 322.863774] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 322.871386] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='\xae\x89\xd7\xbc\x80\x92\xb5.\x00', 0x183100, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x400) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) 06:06:34 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:34 executing program 1 (fault-call:3 fault-nth:56): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:34 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) 06:06:34 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = gettid() tkill(r3, 0x1000000000013) getpgrp(r3) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x101000, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x44, r6, 0xd2eacf3fa4f5893d, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PORT={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4c04010a}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r6, 0x908, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9c8c}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x4) r7 = dup(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$bt_BT_RCVMTU(r9, 0x112, 0xd, &(0x7f00000002c0)=0xfffb, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS(r11, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x1, 0xe8c1aeb4d3432786, "8623058c419d14ce9f1a60daec6c09cd0e24231e9caae333faaf1f95b5871bcedfa71c026c64df7478b5fc5d261a0d06d0380172b5663cd224931df7eef56d13", "98d90227c7894efc3686705c66e496507f14e347439bf33514f6fe8c5e955c80", [0xff, 0x8]}) ptrace(0x10, r0) [ 323.101465] FAT-fs (loop5): bogus number of reserved sectors [ 323.109329] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0xa0903, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) flistxattr(r0, &(0x7f0000000000)=""/102, 0x66) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 323.151140] FAULT_INJECTION: forcing a failure. [ 323.151140] name failslab, interval 1, probability 0, space 0, times 0 [ 323.177030] CPU: 1 PID: 32170 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 323.185577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.194950] Call Trace: [ 323.197572] dump_stack+0x172/0x1f0 [ 323.201221] should_fail.cold+0xa/0x1b [ 323.205130] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 323.210256] ? lock_downgrade+0x880/0x880 [ 323.214436] __should_failslab+0x121/0x190 [ 323.218712] should_failslab+0x9/0x14 [ 323.222561] kmem_cache_alloc_trace+0x2cc/0x760 [ 323.227520] ? kasan_unpoison_shadow+0x35/0x50 [ 323.232123] ? kasan_kmalloc+0xce/0xf0 [ 323.236033] __memcg_init_list_lru_node+0x8a/0x1e0 [ 323.241069] __list_lru_init+0x402/0x720 [ 323.245250] sget_userns+0x81b/0xd30 [ 323.248982] ? kill_litter_super+0x60/0x60 [ 323.253321] ? ns_test_super+0x50/0x50 [ 323.257222] ? ns_test_super+0x50/0x50 [ 323.261121] ? kill_litter_super+0x60/0x60 [ 323.265553] sget+0x10c/0x150 [ 323.268704] mount_bdev+0xff/0x3c0 [ 323.272256] ? finish_unfinished+0x1120/0x1120 [ 323.276859] get_super_block+0x35/0x40 [ 323.280762] mount_fs+0xa8/0x31f [ 323.284152] vfs_kern_mount.part.0+0x6f/0x410 [ 323.288696] do_mount+0x53e/0x2bc0 [ 323.292277] ? copy_mount_string+0x40/0x40 [ 323.296540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.302179] ? copy_mount_options+0x280/0x3a0 [ 323.306695] ksys_mount+0xdb/0x150 [ 323.310402] __x64_sys_mount+0xbe/0x150 [ 323.314397] do_syscall_64+0xfd/0x620 [ 323.318239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.323447] RIP: 0033:0x45c94a [ 323.326669] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 323.345802] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 323.353527] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 323.360807] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 323.368092] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 323.375375] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 323.382657] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:35 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x200, 0x400002) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000040)=0x1) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)={0x2, 0x2d, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0xe0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x0, @mcast2, 0x10000000}}]}, 0x60}}, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000080)) 06:06:35 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:35 executing program 1 (fault-call:3 fault-nth:57): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket(0x0, 0x0, 0x4) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 323.626675] FAULT_INJECTION: forcing a failure. [ 323.626675] name failslab, interval 1, probability 0, space 0, times 0 [ 323.645366] CPU: 1 PID: 32356 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 323.652464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.662020] Call Trace: [ 323.664700] dump_stack+0x172/0x1f0 [ 323.668355] should_fail.cold+0xa/0x1b [ 323.672275] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 323.677493] ? lock_downgrade+0x880/0x880 [ 323.681792] __should_failslab+0x121/0x190 [ 323.686267] should_failslab+0x9/0x14 [ 323.690102] kmem_cache_alloc_trace+0x2cc/0x760 [ 323.694800] ? kasan_unpoison_shadow+0x35/0x50 [ 323.699401] ? kasan_kmalloc+0xce/0xf0 [ 323.703308] __memcg_init_list_lru_node+0x8a/0x1e0 [ 323.708261] __list_lru_init+0x402/0x720 [ 323.712345] sget_userns+0x81b/0xd30 [ 323.716074] ? kill_litter_super+0x60/0x60 [ 323.720378] ? ns_test_super+0x50/0x50 [ 323.724883] ? ns_test_super+0x50/0x50 [ 323.728783] ? kill_litter_super+0x60/0x60 [ 323.733033] sget+0x10c/0x150 [ 323.736161] mount_bdev+0xff/0x3c0 [ 323.739985] ? finish_unfinished+0x1120/0x1120 [ 323.744612] get_super_block+0x35/0x40 [ 323.748523] mount_fs+0xa8/0x31f [ 323.751916] vfs_kern_mount.part.0+0x6f/0x410 [ 323.756541] do_mount+0x53e/0x2bc0 [ 323.760105] ? copy_mount_string+0x40/0x40 [ 323.764468] ? _copy_from_user+0xdd/0x150 [ 323.768638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.774368] ? copy_mount_options+0x280/0x3a0 [ 323.779013] ksys_mount+0xdb/0x150 [ 323.782576] __x64_sys_mount+0xbe/0x150 [ 323.786845] do_syscall_64+0xfd/0x620 [ 323.790674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.795876] RIP: 0033:0x45c94a [ 323.799086] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 323.818495] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:06:35 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x404080, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) ioctl$PPPIOCGUNIT(r3, 0x80047456, &(0x7f0000000200)) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f00000000c0)=""/248) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d00000a000000000000000000000005000500000000000a00000000000000fe88000000ebcb6cb5fd2200000000000000000000010000000000000000030006000000000002000000e00000010000"], 0x50}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0xffffffff, 0x3, 0xfffffffd}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x8, 0x101000) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) ioctl$LOOP_CHANGE_FD(r7, 0x4c06, r8) dup(r6) r9 = dup2(0xffffffffffffffff, r6) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000380)=r9) [ 323.826418] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 323.833878] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 323.841251] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 323.848631] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 323.856013] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:35 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x7d, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:35 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:35 executing program 1 (fault-call:3 fault-nth:58): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:35 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, &(0x7f0000000080)=""/139) [ 324.013034] FAULT_INJECTION: forcing a failure. [ 324.013034] name failslab, interval 1, probability 0, space 0, times 0 [ 324.051134] CPU: 0 PID: 32459 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 324.058117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.058124] Call Trace: [ 324.058150] dump_stack+0x172/0x1f0 [ 324.058171] should_fail.cold+0xa/0x1b [ 324.058191] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 324.058208] ? lock_downgrade+0x880/0x880 [ 324.058231] __should_failslab+0x121/0x190 [ 324.058244] should_failslab+0x9/0x14 [ 324.058265] kmem_cache_alloc_trace+0x2cc/0x760 [ 324.074582] ? kasan_unpoison_shadow+0x35/0x50 [ 324.074597] ? kasan_kmalloc+0xce/0xf0 [ 324.074617] __memcg_init_list_lru_node+0x8a/0x1e0 [ 324.114407] __list_lru_init+0x402/0x720 [ 324.118469] sget_userns+0x81b/0xd30 [ 324.122180] ? kill_litter_super+0x60/0x60 [ 324.126424] ? ns_test_super+0x50/0x50 [ 324.130508] ? ns_test_super+0x50/0x50 [ 324.134389] ? kill_litter_super+0x60/0x60 [ 324.138707] sget+0x10c/0x150 [ 324.141811] mount_bdev+0xff/0x3c0 [ 324.145356] ? finish_unfinished+0x1120/0x1120 [ 324.149947] get_super_block+0x35/0x40 [ 324.153835] mount_fs+0xa8/0x31f [ 324.157228] vfs_kern_mount.part.0+0x6f/0x410 [ 324.161936] do_mount+0x53e/0x2bc0 [ 324.165474] ? copy_mount_string+0x40/0x40 [ 324.169704] ? _copy_from_user+0xdd/0x150 [ 324.173937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.179674] ? copy_mount_options+0x280/0x3a0 [ 324.184203] ksys_mount+0xdb/0x150 [ 324.187917] __x64_sys_mount+0xbe/0x150 [ 324.192074] do_syscall_64+0xfd/0x620 [ 324.195884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.201071] RIP: 0033:0x45c94a [ 324.204257] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 324.223417] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 324.231136] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 324.238417] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 324.245696] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 324.253156] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 06:06:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f0000001280)) fgetxattr(r1, &(0x7f0000000000)=@random={'osx.', 'keyring^\x00'}, &(0x7f00000000c0)=""/246, 0xf6) r4 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3, 0x800) sendto$ax25(r4, &(0x7f0000000200)="6122d5e4b02b0b92df59143378d24e1cfb9493599dcb046c60e2c381260238c142a8d6464db06d3703b5f9a7ba007981e8ddc5bf6729f353ab31f7b0eb902b0544f3ff0099f09088a609408f12fce565c4a2407b82ce224fb41a0672e02133f42077373d22ae3856c3a2b827a42a60059af3f605b2b18f666ccc50c9a743a5cacb49f7e920bc86ed782ec76b48288ec3182af54c7fc8b183560c8d7652767382bd33a782df546ea9eec1060cd93797d7c8086703ad845f457b33edf75213224ebe9ee103fbdf825ca8e0ddf5c7d59a256f5bc9674650258431ee0dc331e31d0a82867c10e03ae666f3cbc59a754f54b2083d7df609c46333c260187ff73b199aecb1c7cac04022850f02124b336d35571318905209221a5c2c3e087ef14bc193bc91891f2be8ef09c1c7d542f4812080a0ebede0d6e76bdfd80666646ece6366a082fa7823f4d79bb80ca1eca159c8999bbe13a575fdf5e545ad16daac68a519fa359e32f20349154ed9cf6c399801745694ead8fdb0f2aa68ff7e1082f0d4944abdf41213aa1e3b513f2787fe919f5114c052af00b11a41df54089725af030cf238280c3ce311f81bd28e3e9c1ca2722674dfc6dab34562a2164a9a7aba0b3caf3d2523eb58804d01b0af4294356092cc754b95c986d0086801d8dbe53ffa7556b299a9228bfcbb44d86663b282fafc320e30a082be8943b6e216aad5137493e3728ea2a2f4dcb9632afa30278cd2ed4ff82462488b09f0c8d10932426fe9d5f8d3e98b7b4dcd0d8b1ec97a95d6df1a8cef0c50b2e7944ee60d0d74df72832f079223689b38c4e07487233584a265c6e50ebf95e0678808df466d3d5e1bd42abc71a3c4d1808fd53f5ae08eacfb84a1ae8e8f3bfef76faaf8115af66e725a441c2ddb37886be8f65f61a63811fc72bc71107d5b3b06fdc96d48ef13172997e34413c1eba09039c14a1fe41b930a14c8af33b4abdb5e32c51322456e5fd011c3e95db20174130a09055b3defc4dbc0a530a542d8d47bbfed1a517a578639ff2cdbc35f6c52507349372f6c2103730212a04bff1872d40f52c8d24fb8da2604b830da9110f4f1687705bceff0e26deb3c9c4b763b26023958ed50224c4449db908c31fc2042cae8b1d0a5c6d008dd955830c23a30dba1d1fffc99e1fa5db3e061a009ffed8b994d881aaba883c434258b6c85882c2dfe6b86408d071a709d3d5277add980d602ec970af192a1aa9373e8424cc3ace7ecdcbb1447d9d2da6e8e413237aeba23ed013172ce544f778ef3fa300a0db11ef34ac0fcc6c615077562123f6b88a04f12a1b5d60f35906de0c332a258b936e895767f6e60fa918438240ffe4d66a7af2574819fe38e7f0661446757d436afb267bd7208836bc0df986f0b6324b75682f3b7102c42d978e8258a13ec2d735f1d6c91529e40c691d00780f54bc8583bfb83cd2a245610ebd57d982a2c0fa06bc43a530a8e505669aaedaa9a79c26e6194a6503a089c93b681a4dba806d7c6c6a612d350b3a981ac100252ec0bc96b5dbcd75d16d763fd947c58af1370d1aa82ac14dd036a30557d9639c709fefa272b2109b7ceb13abd2ea7428a8c4b9b0f210ce0f3b5681323d41193696bbb2cd83ffab5fa68d9ddc26fa8b9881b303f8761a1b83be73f804334c1fabefb8d5472a8eae3d3bf4820fb4ab86d3b4821ff016807d81b80fc444c93ab410a7fa3451c8ab6776ab6da4fefa78c09dad29e8d88649e1fcf6d93fad9fcf161a66194320bbe1a9b5d1cd4afbb7dbc5255e01be080f25c80bd24591b55f0a28009ce27ae1913f0562edc72825c599ce5cf2f28ff74339a2e49e04c6ac46fbbe7408288de11147ece435865cb3f1a456b93da3fbc9a43dd53946a8c83f419f081d1b76c654319161a5c0a801fcb85201315f3370ae1dd31cb2925e8261cd7ba8010dfed01e19e73158ce2bf5a2038eb8275645474364e2d5a61a41fd387017882d317be47bc51ecf492c45b2fe42cb1a6eb992df65db3e1cbb4f601bbd72023891b2924302d13faee405592e7030868e7862b8016819fa75569144c4f3a6ce7f5bfb2f5fb80d76bf46f25728ee5f6271e2a4dcc67f2047793337efdb421ca151a4a0c0a4c47ac52a050423ce749518be55cd66ba2e42ab2655b5ae39ac4c2f21e65954ca481d005fe3693348eabc3d065b2ab27e0e401a967d69c3d6d13e092c0f5cd7c8ea623580eafe8c4dbe9cbd1004f9756be8ec47b3c404cdcd18b1fb3b476f6fff7131d379463c0ad65fbdd3f7a95bee5dfc46186a86cfa4b46b19c8ca00860bb8f46dd61fef54e7bf812f25453ab3def8d6da5d9c71f1b3315c4cb25951cef27c3d6caf57d956a41b38a09a6542bd9ee850d6264bf45456ddcdbf42e0493f7629953198a3fe28c59fe4f5379d29c8bfaceb2da27d8f1ab86e864994130f08526a841a2a95e241b4e0a7ee2ae72820a4d041c8cb75ea9d7399662f689908ae67aa4a7ecb971fb0d5cc023ca839e357a4c91ade9648e878fc27f1b0b4b49e0e92bdd4ace0d8624a47adfe57d2f2d6686954d0d89a8207f32d780225705dbe556f1436a9b79131db0eb2c14a0e96d93935b05f34542287c42e29ed8db2c7761e3ca627da95fd95815fb974e4871089491d780e9709ef5b9bddc03569e5d4849bc6cfef3b5b7b485df7ca8a04d815cd0306030c3e10baadf42b84068ced995d5341c01a2ec731d2085e673300936b86f5cacc206b31d89e822ed36cd7b8a770b973e329e247cc0cac5643962fb0843f7ca02447785e4b464cab275d609d489b28a8cdc6d26efb4bbb105a720501bb69444fa5cf66ffd0b0343efd50cf764818940520a560881492305071ec2149d752ab8dcd75789b76d67fdc833e046539fc75aab79a4a8d7a5e41976c58784f2d27461ffac7df124779a70f4b54bcc72efdf5c811525787d1846f2c1bd774a762f28b1bee348e12ead921b640df62abb33799ddfa3b245e5926ab82a2cef63c0884ecc86af8d2f0ebb333cb0c05a4167d69ee1365850ef6ed488ed4c88c6270310f4719c51009c1c8e50c24c9088330e762a4dbf07531cf0bb93a41da20b39ce282d2bf3aac51e28b469fc577292e3bdadaf6e53bfdf3e4881499588e9130cf62035f177039324cde9ba150c15d5ee9c10a4b35a4822d884da02e0c3c5672b5c80c7a217fa8146ee0fcfeec7c97345e538a6bb07d027ebed937545f67adeb24b905b78c55f6cbbc8c68e91e1e213f118306d8d5130f0e2c89af9c1fc18875919f02ac2285e53cc81c9506a02db5ec9b4e2579a09414f26504893e87a7297f93ff4fa2d619ea1dcd727f0808823b401da0016a25566cf01532abbefdb88d87ac8f0aec62f8d8c17d36d222c3846373bada17179aad17d9ab5325fad1b953d8a6ece5d332e43e1f910ee06606e6edfcb02e967e5b507ec7ab0393e3cef603072a0a20a8552b24d95446cfe7542f57d37b12f0cf78e705325f781c96594a6bb04ec523f86ee3d2f7d33023f2598df87715540dca1f06ab94bd852c837bdac63564b6c4104e31d292e82641cbb202c9340c032b4e3a3bae6f5630f95b661f7d2aafe5494527d0e844574d5b6637bc3f5692a57289aaa6484e97b928bf3ca43de1b3410fb6fd1c8b6d5962d64ac37d2215ce3cc7ab79e958443813c7a5512232b7a7f492652f700b04c32548b83be866afc7bc8354c37b7a72226fb2cf79e4b38527705b8f27aadf0876eba278422bbce2b1a8f4b593fd43664bcb78799f2bfca290e2202712627c3a1124fa253626661b0794d2adf4853bc5e1257e0c71ee6b855fb2b9a26c8fde91b274355a34ae58aeba61a3fe92805f73328af2429a231593ec0fffb92a61b9f61e02abd7925efe722db8a3375de3f2c9e51bcef8bad5f068b8249b179f3f006d5d9291414c846e071cd75b9000c37391ae916083a5e2c666169ed5ea78d69d80eaacd0ced29f4db9057adc3e7125d4ccdc7be6b3e4c8fd0eb895f489f9d3e8851d236a898099f327a2bd8c355b8f3a03aaf990e28719ffd7edcaa6e92b120dc7352512b421f856811b226052e221eec9ddfa79982fd9d39b58cd741fbaca4736fe8b58c0edab13c5183e49209236a90b821687c239caa14e81b445173b793a0b72d0d22897551887f0c65bc0cb2754e13eaa6381dc6f960a1a5747b8b7eea30948602d768ebd2e8935511cef08d98fe3c46e232302b226052dc55e06f77b41ccba04bdc5d6fd96d06e03278a66324b654933fd7d80f637956f039bd62b8c0393d8c581d5efa8d2a0974ea2e6681df6ab60f18650375f9b98113d7fa0cb359cc7e86e88b4b30dc64179175e5ec17e08ecf8f7332a093e4f9c7e39634b22542db7fcf06e4041dd401252b66013809578961a49a6e66456cf67de66cdda773e222239fcc552f5405e0beb0918d114c97153f82e7088c39f22f67664779833ca7646173950b1546f207630cb471eb5f308def0274a95652b8cd70617e5464d2d94026e68614b3f6be06f7b495fcf0093cd622f3a86234aca1cb08c832b7b40d63c180677629f7a430f5dc6adac0b243250c578fb3f976b324255f980e04489d7d1f6df76d6754ebfa4d7ae228ae2043ad18d88327e4ce1c3a037b28e3a39fce26c6c9a436933a3f7114f3a41b1806b6751e4b946d203b45b3e226340f10f7636afb92f964bcb0e9ffe4609b53c12311ab8df52eab112e7d891b24168c078b07b7426efa4ced58907b07d552170b12f152e02d3cbf9292632460836edce0f429102d638ab8af36ac25ddc4f3a06deadeadfc0b39a807b35bba6749ab0f391b7b24a6bf0c8fd4318115828615292f8be089752b1fded458a416dd91c255530f2ae8825f25aa0cb2f68432f84925d40d587314f0c0f5ae8652f43ce3a12228ae10e5b028731eeb82b915b27e2fce61dad3f901a12801f82695dde681b3abd66c56b795f50c1bc1d328f075a8442b1827b32e3641d5749103feffe269bf349b66b4e46446e5a5b15a1fa5b90fe1e5f056141c3ab06fdc535a34a012b9671fa697f0e609a54d6cd50c0e2d47383703ff9e8f61a741752b95e7d24a52c1b57cc238d72d762d400b088007ea90fb568f336bb0be0bd5aed125fcbc0ad1f70e1079c4d22b8f6d85591e8d1f8e2dd56d9d4261d493c73d7befbc242f66a6f19cedac2144ab2c83f3c5f3378fc0d1f8be90fb51fc09f435333f3068167bdd661c49dc54cdbc09443104e3f22ca53b09f8c48e5d66b34926fa9410511fec02196527cc48ef7a97b4bd1624038c32b2ed752f347445252533107cab2474e97d19c6a8519d82375b743733163e199c40f3362597369de3a6976ab571138cf560d627998fea01f3541cc7ea2788c105f796ffbb24a5a38a0757ef48da5efbebae81429999fdbad69da22698d3f78b297c7c9428d2eabdfd3e985847e28930338de0463c4b9d1bafcf9fafdc8080e220c534e9649c06e6f006f95525d925ba0a66b8defa2e01917687af0c420c656dd0fd761227162f39f17624daa695634001b562e47e94a6cbd025c0a237a0a62414c642445d10bdccd1a05a2e05f371c1aae4e785c51c03083e78ee822197c0e41d502f7d285ccda6aee94503c49647168d29aae5d8b9b76e9416d3dfaacabd77fcb0f5b9d311aaf5ec86d05cc4c980bdf37c5efcae4baf99ece532c2e4ae2d3af76f9243f5343227f8637b530c8cbb55f72e03498a34c11e2043cc4177686898bfeeaafcfba6e75e15e3151176717a7cfee899b82769348a54b37b76dacb9473ae6add50a3746d", 0x1000, 0x42, &(0x7f0000001200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x4, 0xffffffffffffffff, 0x2}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) [ 324.260470] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:37 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r3, 0xc018620c, &(0x7f0000000100)={0x3}) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:37 executing program 1 (fault-call:3 fault-nth:59): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:37 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:37 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x7, 0x0, 0x2000000000000219, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x21f2161e9cf3ae2b, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x8) 06:06:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000040)={0x40, 0x4, 0x0, 0x400}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000300)={r7, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000000c0)={r7, 0x80000000}, &(0x7f0000000100)=0xc) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:37 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0xa, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 326.189022] FAULT_INJECTION: forcing a failure. [ 326.189022] name failslab, interval 1, probability 0, space 0, times 0 [ 326.211960] CPU: 1 PID: 32497 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 326.218950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.228569] Call Trace: [ 326.231912] dump_stack+0x172/0x1f0 [ 326.235577] should_fail.cold+0xa/0x1b [ 326.239621] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 326.244765] ? lock_downgrade+0x880/0x880 [ 326.249062] __should_failslab+0x121/0x190 [ 326.253768] should_failslab+0x9/0x14 [ 326.257812] kmem_cache_alloc_trace+0x2cc/0x760 [ 326.262495] ? kasan_unpoison_shadow+0x35/0x50 [ 326.267183] ? kasan_kmalloc+0xce/0xf0 [ 326.271119] __memcg_init_list_lru_node+0x8a/0x1e0 [ 326.276074] __list_lru_init+0x402/0x720 [ 326.280162] sget_userns+0x81b/0xd30 [ 326.283917] ? kill_litter_super+0x60/0x60 [ 326.288186] ? ns_test_super+0x50/0x50 [ 326.292092] ? ns_test_super+0x50/0x50 [ 326.296410] ? kill_litter_super+0x60/0x60 [ 326.300851] sget+0x10c/0x150 [ 326.304010] mount_bdev+0xff/0x3c0 [ 326.307572] ? finish_unfinished+0x1120/0x1120 [ 326.312298] get_super_block+0x35/0x40 [ 326.316316] mount_fs+0xa8/0x31f [ 326.319807] vfs_kern_mount.part.0+0x6f/0x410 [ 326.324332] do_mount+0x53e/0x2bc0 [ 326.327981] ? copy_mount_string+0x40/0x40 [ 326.332410] ? _copy_from_user+0xdd/0x150 [ 326.336670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.342388] ? copy_mount_options+0x280/0x3a0 [ 326.346922] ksys_mount+0xdb/0x150 [ 326.350572] __x64_sys_mount+0xbe/0x150 [ 326.354583] do_syscall_64+0xfd/0x620 [ 326.358412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.363614] RIP: 0033:0x45c94a [ 326.366825] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 06:06:38 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r3, r5) ioctl$VFIO_IOMMU_UNMAP_DMA(r6, 0x3b72, &(0x7f0000000040)={0x20, 0x1, 0x4, 0x9, 0x71}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r5, 0x40605346, &(0x7f0000000100)={0x5, 0x3, {0xffffffffffffffff, 0x2, 0x9, 0x3, 0x7fffffff}}) ptrace(0x10, r0) [ 326.385919] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 326.394086] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 326.401370] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 326.408653] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 326.416219] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 326.423515] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:38 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:38 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000100)={{0x2, 0x4e23, @remote}, {0x6, @dev={[], 0x14}}, 0x10, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2a}}, 'bond_slave_0\x00'}) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x100) dup(r8) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r1, @ANYPTR64, @ANYBLOB="80e862629dccb73fd28a5010f7e8cd72b3059adbfce879f0322aa928a1de91f3a0c4b2023beb5f31f5904c060f5f7ec2fc9fc9179adf29051724d9f7943e42618c6468ded78e762d1defadd621cb651251c25bcdf586b1d4b16cc19b646ba52c03ccea2d53e67744296151abc58ea00e7e710dcdd5e16f67548dcba978b6b18d71dd69ab2bcde56b5401709f5541cda8eb2e4f030f6b38e641160c41c5a0b635b0a52ee7fed63e056d937abb62b3fc00da8cbd3e210a665a302d7d3fda876b5c8e3aeb8a0c8f583c9d60115875b5", @ANYRES32=r0, @ANYRES16=r3, @ANYPTR, @ANYRES16, @ANYRES32=r4, @ANYRES64]], @ANYRES32=r1, @ANYRESHEX, @ANYRES32, @ANYRES16=r7, @ANYRESHEX, @ANYRES32=r1, @ANYRES64=r8, @ANYPTR64], 0x34}}, 0x2008000) 06:06:38 executing program 1 (fault-call:3 fault-nth:60): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x400000, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x600683, 0x0) write$input_event(r1, &(0x7f0000000040)={{}, 0x1f, 0x2557}, 0x18) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$apparmor_exec(r2, &(0x7f0000000100)={'exec ', '/dev/qat_adf_ctl\x00'}, 0x16) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 326.619455] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 06:06:38 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) sendfile(r4, r2, 0x0, 0x6) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$IMDELTIMER(r5, 0x80044941, &(0x7f0000000040)=0x1) ptrace(0x10, r0) [ 326.702461] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 326.734034] FAULT_INJECTION: forcing a failure. [ 326.734034] name failslab, interval 1, probability 0, space 0, times 0 [ 326.775507] CPU: 1 PID: 32725 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 326.782582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.792282] Call Trace: [ 326.794907] dump_stack+0x172/0x1f0 [ 326.798665] should_fail.cold+0xa/0x1b [ 326.801985] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 326.802611] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 326.802631] ? lock_downgrade+0x880/0x880 [ 326.802656] __should_failslab+0x121/0x190 [ 326.831752] should_failslab+0x9/0x14 [ 326.835757] kmem_cache_alloc_trace+0x2cc/0x760 [ 326.840539] ? kasan_unpoison_shadow+0x35/0x50 [ 326.845331] ? kasan_kmalloc+0xce/0xf0 [ 326.849368] __memcg_init_list_lru_node+0x8a/0x1e0 [ 326.854425] __list_lru_init+0x402/0x720 [ 326.858529] sget_userns+0x81b/0xd30 [ 326.862391] ? kill_litter_super+0x60/0x60 [ 326.866775] ? ns_test_super+0x50/0x50 [ 326.871319] ? ns_test_super+0x50/0x50 [ 326.875401] ? kill_litter_super+0x60/0x60 [ 326.879846] sget+0x10c/0x150 [ 326.882983] mount_bdev+0xff/0x3c0 [ 326.886637] ? finish_unfinished+0x1120/0x1120 [ 326.891247] get_super_block+0x35/0x40 [ 326.891266] mount_fs+0xa8/0x31f [ 326.891288] vfs_kern_mount.part.0+0x6f/0x410 [ 326.891305] do_mount+0x53e/0x2bc0 [ 326.891323] ? copy_mount_string+0x40/0x40 [ 326.898582] ? _copy_from_user+0xdd/0x150 [ 326.915393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.921079] ? copy_mount_options+0x280/0x3a0 06:06:38 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SIOCAX25CTLCON(r8, 0x89e8, &(0x7f0000000240)={@bcast, @null, @default, 0x63, 0x4, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) r9 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r12, 0x4040ae79, &(0x7f0000000080)={0x1000, 0x0, 0x0, 0xffffffffffffffff, 0xd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) r15 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x400) setsockopt$RDS_GET_MR(r15, 0x114, 0x2, &(0x7f00000001c0)={{&(0x7f00000000c0)=""/237, 0xed}, &(0x7f0000000040), 0xc5ec531a5750f110}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup(r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_CONGESTION(r17, 0x6, 0xd, &(0x7f0000000200)='htcp\x00', 0x5) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r14, 0x6612) [ 326.925614] ksys_mount+0xdb/0x150 [ 326.929188] __x64_sys_mount+0xbe/0x150 [ 326.933367] do_syscall_64+0xfd/0x620 [ 326.937389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.943558] RIP: 0033:0x45c94a [ 326.943573] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 326.943581] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:06:38 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000100)={[], 0x0, 0x1, 0xfd8f, 0x5, 0x0, r1}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x2000, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0016001800010014000b000000000000000000000000000000000008001b0000000000407ae4560982bd8f9404286053c07cf0dd7b372516b9a40390c76edfb70ea770d88e321aecc858112aa0d5afbb28b94166e3c6dd3145fefbabd79c62cc6c88df6d8528624f2749ac3071787080eb32180d6d7381a3e31a45845794c69c84dd4e92"], 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = accept4(r13, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80, 0xc0c00) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:38 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:38 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x1b, 'O'}) [ 326.943597] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 326.943604] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 326.943616] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 326.965981] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 326.965990] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:38 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xc0586300}}}, &(0x7f00000000c0)=0x90) [ 327.034369] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 06:06:38 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x2, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:06:38 executing program 1 (fault-call:3 fault-nth:61): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 327.119420] FAT-fs (loop5): bogus number of reserved sectors [ 327.158083] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:38 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r1, r0, 0x1e, &(0x7f0000000080)={0x0, 0x6}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = gettid() tkill(r3, 0x1000000000013) r4 = gettid() tkill(r4, 0x1000000000013) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x9) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000100)=r4) ptrace$getregs(0xc, r3, 0xf756, &(0x7f0000000300)=""/53) r5 = dup(r2) ioctl$TIOCSWINSZ(r5, 0x5414, &(0x7f00000002c0)={0x1ff, 0x8, 0x9, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_group_source_req(r5, 0x0, 0x2e, &(0x7f0000000180)={0x7fff, {{0x2, 0x4e23, @local}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$EVIOCGLED(r7, 0x80404519, &(0x7f0000000140)=""/34) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x44000) ioctl$KDSIGACCEPT(r8, 0x4b4e, 0x2c) ptrace(0x10, r0) [ 327.235210] FAT-fs (loop5): bogus number of reserved sectors [ 327.250958] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:38 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x1b, 'O'}) 06:06:38 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', r1}) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d00000a000000000000000000000005000500000000000a00000000000000fe8800070000000000000000000000010000000000000000030006000000000002000000e00000010000000000000000"], 0x50}}, 0x0) 06:06:38 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 327.321823] FAULT_INJECTION: forcing a failure. [ 327.321823] name failslab, interval 1, probability 0, space 0, times 0 [ 327.366077] CPU: 0 PID: 783 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 327.372889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.382259] Call Trace: [ 327.384879] dump_stack+0x172/0x1f0 [ 327.388533] should_fail.cold+0xa/0x1b [ 327.392541] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 327.397674] ? lock_downgrade+0x880/0x880 [ 327.401853] __should_failslab+0x121/0x190 [ 327.406119] should_failslab+0x9/0x14 [ 327.409942] kmem_cache_alloc_node_trace+0x274/0x720 [ 327.415076] ? kmem_cache_alloc_trace+0x348/0x760 [ 327.419934] ? kasan_unpoison_shadow+0x35/0x50 [ 327.424540] __kmalloc_node+0x3d/0x80 [ 327.428354] kvmalloc_node+0x68/0x100 [ 327.432266] __list_lru_init+0x4d9/0x720 [ 327.436364] sget_userns+0x81b/0xd30 [ 327.440175] ? kill_litter_super+0x60/0x60 [ 327.444421] ? ns_test_super+0x50/0x50 [ 327.448412] ? ns_test_super+0x50/0x50 [ 327.452419] ? kill_litter_super+0x60/0x60 [ 327.456670] sget+0x10c/0x150 [ 327.459793] mount_bdev+0xff/0x3c0 [ 327.463564] ? finish_unfinished+0x1120/0x1120 [ 327.468175] get_super_block+0x35/0x40 [ 327.472083] mount_fs+0xa8/0x31f [ 327.475465] vfs_kern_mount.part.0+0x6f/0x410 [ 327.480288] do_mount+0x53e/0x2bc0 [ 327.483903] ? copy_mount_string+0x40/0x40 [ 327.488167] ? _copy_from_user+0xdd/0x150 [ 327.492329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.497886] ? copy_mount_options+0x280/0x3a0 [ 327.502611] ksys_mount+0xdb/0x150 [ 327.506166] __x64_sys_mount+0xbe/0x150 [ 327.510356] do_syscall_64+0xfd/0x620 [ 327.514274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.519478] RIP: 0033:0x45c94a [ 327.522698] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 327.541705] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 327.549433] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 327.556887] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 327.564169] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 327.571450] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 327.578730] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:39 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x1b, 'O'}) 06:06:39 executing program 1 (fault-call:3 fault-nth:62): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:39 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d00000a000000000000000000000005000500000000000a00000000000000fe8800000000000000000000000000010000000000000000030006000000000015000000e00000010000000000000000"], 0x50}}, 0x0) 06:06:39 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x1b, 'O'}) [ 327.758283] FAULT_INJECTION: forcing a failure. [ 327.758283] name failslab, interval 1, probability 0, space 0, times 0 [ 327.776583] CPU: 0 PID: 801 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 327.783473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.792862] Call Trace: [ 327.795476] dump_stack+0x172/0x1f0 [ 327.799218] should_fail.cold+0xa/0x1b [ 327.803157] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 327.808293] ? lock_downgrade+0x880/0x880 [ 327.812471] __should_failslab+0x121/0x190 [ 327.816726] should_failslab+0x9/0x14 [ 327.820632] kmem_cache_alloc_trace+0x2cc/0x760 [ 327.825494] ? kasan_unpoison_shadow+0x35/0x50 [ 327.830094] ? kasan_kmalloc+0xce/0xf0 [ 327.834024] __memcg_init_list_lru_node+0x8a/0x1e0 [ 327.839150] __list_lru_init+0x402/0x720 [ 327.843332] sget_userns+0x81b/0xd30 [ 327.847151] ? kill_litter_super+0x60/0x60 [ 327.851408] ? ns_test_super+0x50/0x50 [ 327.855319] ? ns_test_super+0x50/0x50 [ 327.859221] ? kill_litter_super+0x60/0x60 [ 327.863585] sget+0x10c/0x150 [ 327.866755] mount_bdev+0xff/0x3c0 [ 327.870403] ? finish_unfinished+0x1120/0x1120 [ 327.875009] get_super_block+0x35/0x40 [ 327.878942] mount_fs+0xa8/0x31f [ 327.882440] vfs_kern_mount.part.0+0x6f/0x410 [ 327.887058] do_mount+0x53e/0x2bc0 [ 327.890647] ? copy_mount_string+0x40/0x40 [ 327.895017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.900583] ? copy_mount_options+0x280/0x3a0 [ 327.905186] ksys_mount+0xdb/0x150 [ 327.908799] __x64_sys_mount+0xbe/0x150 [ 327.913084] do_syscall_64+0xfd/0x620 [ 327.916903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.922108] RIP: 0033:0x45c94a [ 327.925312] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 327.944360] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:06:39 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) socket$inet6(0xa, 0x80003, 0xff) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x1b, 'O'}) 06:06:39 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x8f) 06:06:39 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 327.952113] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 327.959650] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 327.966929] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 327.974228] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 327.981598] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:39 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000080)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x17, 0x6c, 0xa0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @remote}}]}, 0x50}}, 0x0) 06:06:41 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x50}}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x80a02, 0x0) 06:06:41 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x1b, 'O'}) 06:06:41 executing program 1 (fault-call:3 fault-nth:63): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:41 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000100)=""/146) clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r3) rt_tgsigqueueinfo(r2, r2, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x88ac42cc9280fb75, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace(0x10, r2) 06:06:41 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x20000390) 06:06:42 executing program 2: ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x1b, 'O'}) [ 330.342643] FAT-fs (loop5): bogus number of reserved sectors [ 330.356876] FAULT_INJECTION: forcing a failure. [ 330.356876] name failslab, interval 1, probability 0, space 0, times 0 [ 330.376590] FAT-fs (loop5): Can't find a valid FAT filesystem [ 330.420384] CPU: 0 PID: 931 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 330.427196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.436680] Call Trace: [ 330.439299] dump_stack+0x172/0x1f0 [ 330.442965] should_fail.cold+0xa/0x1b [ 330.446972] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 330.452138] ? lock_downgrade+0x880/0x880 [ 330.456323] __should_failslab+0x121/0x190 [ 330.460697] should_failslab+0x9/0x14 [ 330.464539] kmem_cache_alloc_trace+0x2cc/0x760 [ 330.469224] ? kasan_unpoison_shadow+0x35/0x50 [ 330.473822] ? kasan_kmalloc+0xce/0xf0 [ 330.477729] __memcg_init_list_lru_node+0x8a/0x1e0 [ 330.482766] __list_lru_init+0x402/0x720 [ 330.486852] sget_userns+0x81b/0xd30 [ 330.490579] ? kill_litter_super+0x60/0x60 [ 330.494872] ? ns_test_super+0x50/0x50 [ 330.498776] ? ns_test_super+0x50/0x50 [ 330.502672] ? kill_litter_super+0x60/0x60 [ 330.506921] sget+0x10c/0x150 [ 330.510080] mount_bdev+0xff/0x3c0 [ 330.513642] ? finish_unfinished+0x1120/0x1120 [ 330.518246] get_super_block+0x35/0x40 [ 330.522377] mount_fs+0xa8/0x31f [ 330.525765] vfs_kern_mount.part.0+0x6f/0x410 [ 330.530286] do_mount+0x53e/0x2bc0 [ 330.533856] ? copy_mount_string+0x40/0x40 [ 330.538113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.543665] ? copy_mount_options+0x280/0x3a0 [ 330.548184] ksys_mount+0xdb/0x150 [ 330.551745] __x64_sys_mount+0xbe/0x150 [ 330.555741] do_syscall_64+0xfd/0x620 [ 330.559665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.564956] RIP: 0033:0x45c94a [ 330.568164] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 330.587862] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 330.595678] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 330.603053] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 330.610614] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 06:06:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000080)) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 330.617922] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 330.625490] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 [ 330.661054] FAT-fs (loop5): bogus number of reserved sectors 06:06:42 executing program 2: ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x1b, 'O'}) 06:06:42 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000100)="86290e93ec1a318c5e1e913d4571f32edf0fef782cc305be0c9f69c1d9c2d3df65a3658dc3b2b9621c90986e749e93ff03124679d9331d430c656f2bb607f232c96ede7f44adb03388c02ae29a26ef2253df46d3e772a22fc930dddf60abf45315118fd8569525086b36b9") prctl$PR_GET_FP_MODE(0x2e) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKIOOPT(r5, 0x1279, &(0x7f0000000200)) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ptrace(0x10, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$DRM_IOCTL_CONTROL(r8, 0x40086414, &(0x7f0000000180)={0x2, 0x2}) [ 330.674090] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:42 executing program 1 (fault-call:3 fault-nth:64): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:42 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x125, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @remote}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x35855004df518233, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r4, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r4, 0x9, 0xb159}, 0xc) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/187) 06:06:42 executing program 2: ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x1b, 'O'}) [ 330.893369] FAULT_INJECTION: forcing a failure. [ 330.893369] name failslab, interval 1, probability 0, space 0, times 0 [ 330.911276] FAT-fs (loop5): bogus number of reserved sectors [ 330.924275] FAT-fs (loop5): Can't find a valid FAT filesystem [ 330.926645] CPU: 1 PID: 1063 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 330.937531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.946906] Call Trace: [ 330.949528] dump_stack+0x172/0x1f0 [ 330.953184] should_fail.cold+0xa/0x1b [ 330.957096] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 330.962227] ? lock_downgrade+0x880/0x880 [ 330.966488] __should_failslab+0x121/0x190 [ 330.970751] should_failslab+0x9/0x14 [ 330.974677] kmem_cache_alloc_trace+0x2cc/0x760 [ 330.979535] ? kasan_unpoison_shadow+0x35/0x50 [ 330.984161] ? kasan_kmalloc+0xce/0xf0 [ 330.988084] __memcg_init_list_lru_node+0x8a/0x1e0 [ 330.993144] __list_lru_init+0x402/0x720 [ 330.997233] sget_userns+0x81b/0xd30 [ 331.001829] ? kill_litter_super+0x60/0x60 [ 331.006078] ? ns_test_super+0x50/0x50 [ 331.010193] ? ns_test_super+0x50/0x50 [ 331.014094] ? kill_litter_super+0x60/0x60 [ 331.018345] sget+0x10c/0x150 [ 331.021468] mount_bdev+0xff/0x3c0 [ 331.025023] ? finish_unfinished+0x1120/0x1120 [ 331.029756] get_super_block+0x35/0x40 [ 331.033665] mount_fs+0xa8/0x31f [ 331.037054] vfs_kern_mount.part.0+0x6f/0x410 [ 331.041567] do_mount+0x53e/0x2bc0 [ 331.045121] ? retint_kernel+0x2d/0x2d [ 331.049201] ? copy_mount_string+0x40/0x40 [ 331.053535] ? copy_mount_options+0x1ea/0x3a0 [ 331.058048] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 331.062935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.068574] ? copy_mount_options+0x280/0x3a0 [ 331.073094] ksys_mount+0xdb/0x150 [ 331.076739] __x64_sys_mount+0xbe/0x150 [ 331.080743] do_syscall_64+0xfd/0x620 [ 331.084567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.090385] RIP: 0033:0x45c94a [ 331.093590] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 331.112683] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 331.120671] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 331.128391] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 331.135869] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 331.143167] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 331.150449] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:42 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x1b, 'O'}) 06:06:42 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) rt_sigprocmask(0x1, &(0x7f0000000000), &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:42 executing program 1 (fault-call:3 fault-nth:65): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:42 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:42 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000100)={"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"}) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) [ 331.354091] FAULT_INJECTION: forcing a failure. [ 331.354091] name failslab, interval 1, probability 0, space 0, times 0 [ 331.362013] FAT-fs (loop5): bogus number of reserved sectors [ 331.379449] CPU: 0 PID: 1190 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 331.386345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.396061] Call Trace: [ 331.398684] dump_stack+0x172/0x1f0 [ 331.402347] should_fail.cold+0xa/0x1b [ 331.406355] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 331.406486] FAT-fs (loop5): Can't find a valid FAT filesystem [ 331.411490] ? lock_downgrade+0x880/0x880 [ 331.411518] __should_failslab+0x121/0x190 [ 331.411535] should_failslab+0x9/0x14 [ 331.411558] kmem_cache_alloc_trace+0x2cc/0x760 [ 331.411573] ? kasan_unpoison_shadow+0x35/0x50 [ 331.411586] ? kasan_kmalloc+0xce/0xf0 [ 331.411606] __memcg_init_list_lru_node+0x8a/0x1e0 [ 331.411622] __list_lru_init+0x402/0x720 06:06:43 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x1b, 'O'}) 06:06:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000100)='ns/cgroup\x00') clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() r4 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r4) rt_tgsigqueueinfo(r3, r3, 0x10000000016, &(0x7f0000000080)={0xfffffffc, 0x7, 0x10001}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ptrace(0x10, r3) 06:06:43 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000140)="c1f5c1ed58091ffc2f6b5e9819bafa0f275fe6b8c2239e93145b463122cbcd828fdfe1d6b73e718f7ef552a28082e80321cb169f14c468009e20b82033169d4d6cd8fb67ec990123b154530622d0649687997cc32a0a7ee4a3b2fa402cf54251ed6f449a71ba2214a2cc0c7e0400cc034afe21a8d5", &(0x7f00000001c0)=""/150}, 0x20) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) [ 331.411646] sget_userns+0x81b/0xd30 [ 331.411658] ? kill_litter_super+0x60/0x60 [ 331.411673] ? ns_test_super+0x50/0x50 [ 331.411693] ? ns_test_super+0x50/0x50 [ 331.468076] ? kill_litter_super+0x60/0x60 [ 331.472326] sget+0x10c/0x150 [ 331.475451] mount_bdev+0xff/0x3c0 [ 331.479003] ? finish_unfinished+0x1120/0x1120 [ 331.483603] get_super_block+0x35/0x40 [ 331.487516] mount_fs+0xa8/0x31f [ 331.491092] vfs_kern_mount.part.0+0x6f/0x410 [ 331.495624] do_mount+0x53e/0x2bc0 [ 331.499363] ? copy_mount_string+0x40/0x40 [ 331.503730] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.509292] ? copy_mount_options+0x280/0x3a0 [ 331.513901] ksys_mount+0xdb/0x150 [ 331.517459] __x64_sys_mount+0xbe/0x150 [ 331.525460] do_syscall_64+0xfd/0x620 [ 331.529281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.534586] RIP: 0033:0x45c94a [ 331.537823] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 331.557263] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 331.565262] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 331.572756] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 331.580154] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 331.587541] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 331.594913] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:43 executing program 1 (fault-call:3 fault-nth:66): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 331.657475] FAT-fs (loop5): bogus number of reserved sectors [ 331.668168] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:43 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x1b, 'O'}) [ 331.792399] FAULT_INJECTION: forcing a failure. [ 331.792399] name failslab, interval 1, probability 0, space 0, times 0 [ 331.812379] CPU: 1 PID: 1414 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 331.819301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.828671] Call Trace: [ 331.831287] dump_stack+0x172/0x1f0 [ 331.835045] should_fail.cold+0xa/0x1b [ 331.838962] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 331.844188] ? lock_downgrade+0x880/0x880 [ 331.848368] __should_failslab+0x121/0x190 [ 331.852637] should_failslab+0x9/0x14 [ 331.856533] kmem_cache_alloc_trace+0x2cc/0x760 [ 331.861308] ? kasan_unpoison_shadow+0x35/0x50 [ 331.865905] ? kasan_kmalloc+0xce/0xf0 [ 331.869812] __memcg_init_list_lru_node+0x8a/0x1e0 [ 331.874772] __list_lru_init+0x402/0x720 [ 331.878941] sget_userns+0x81b/0xd30 [ 331.883040] ? kill_litter_super+0x60/0x60 [ 331.887296] ? ns_test_super+0x50/0x50 [ 331.891286] ? ns_test_super+0x50/0x50 [ 331.895185] ? kill_litter_super+0x60/0x60 [ 331.899523] sget+0x10c/0x150 [ 331.902648] mount_bdev+0xff/0x3c0 [ 331.906252] ? finish_unfinished+0x1120/0x1120 [ 331.910861] get_super_block+0x35/0x40 [ 331.914766] mount_fs+0xa8/0x31f [ 331.918152] vfs_kern_mount.part.0+0x6f/0x410 [ 331.922925] do_mount+0x53e/0x2bc0 [ 331.926484] ? copy_mount_string+0x40/0x40 [ 331.930862] ? _copy_from_user+0xdd/0x150 [ 331.935175] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.940737] ? copy_mount_options+0x280/0x3a0 [ 331.945343] ksys_mount+0xdb/0x150 [ 331.949035] __x64_sys_mount+0xbe/0x150 [ 331.953024] do_syscall_64+0xfd/0x620 [ 331.957204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.962517] RIP: 0033:0x45c94a [ 331.965861] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 331.984777] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:06:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000017c0)={@rand_addr, @broadcast, 0x0}, &(0x7f0000001800)=0xc) ioctl$int_out(r0, 0x6ff8460fbd4f0a10, &(0x7f0000002b80)) sendmmsg(r0, &(0x7f0000002b00)=[{{&(0x7f0000000140)=@xdp={0x2c, 0x1, 0x0, 0x6}, 0x80, &(0x7f0000001580)=[{&(0x7f00000001c0)="3e58181e03a7b61b60325a2332fb402879bc45de0e78eb0a41adce3b04f1ed007150ab57a10c29c582df14b107c9b2a0300ad3b7ca88ecf52e23432f91ad19160a1059b98caa2f941c34be7efafad08ef30e8b4d7087307c2994128139845abe5351feb9e17c8e4b9ed148191bd6f3d230", 0x71}, {&(0x7f0000000240)="99a28d8d534a4d810a5ad4da456fb50645d1d206f8081d2beffa89ae76a01b36a776b26df787f23fb4cb5b40d232de0a9550f77320c55c784ea50942889e6e71b36647ed7201803c906c6daf96545df0eccd92becf5399d2f09acdd0a435fef58fd7bcb9c178deb5f07a66b4d3c491f67b41dac97522564144d03a60ffc8d63285099df181f544669fb7390d7724c1f463952f116aa9c73502f49abb5928bcac0c4151cffd3fbe7bf206837ea96af2c60c39fddf6b78b350a372f72d179ff7c741713510000963e3a218eba2b29dc7f3524788f69c134999a95d7fe786b22d1f1a2360a2cdcc9cdef9a5345a08be24d0d6", 0xf1}, {&(0x7f0000000340)="361a28681403562b79e541e60abda6af0379c799e0c7bc42c110c07473a3af396b72355194856a165323d7e1c2f664dcdc70eb200193ce61cc350122fa5de9303692f9bdf3a2863ea6677947cb41e3070cdd1c0c71b1c3c21525be61bab91ba9cfe9efa00879e01a08596595197641", 0x6f}, {&(0x7f00000003c0)="241dcaae14f301cdb95f0ff3e6e5b6a6186ac1e7ee396b90d1019726ba51323a6a51ce3e6d99799d3d2236b44110d506aae896943f318db080337687970f8b796f78570c02c20f683a7c1b2ee16e31220c5e7c05a35541334602ca8cb09bcbe17271e9081c8d769a5ac7f3cfbb2cc2aeccbf13162b1238c25e4c732a3fa61f1f227f1d43cfbe3f9fd131c6d03fc1d427efcfd93acead174e9d3349c2d1e11d04552c5a0204c77c253ce3f23483298e182ace639267ec4c94c88afc6098dd5cafa1c7feae9c7427acdd638cf28a80109aefe51ad221c16f588371a92ad912c4491432424e61da8fa5215ac3598c82d954f638e36483f31f4316580347466ff41c6afafbdd53268abe60ab66ec7d3a4183eb1418545d8a931c0460d6c160de6ca9e5cc351d27c06b4a9a67518f99da178fb2b9f6d780f538e80ff0887ea2b31155423a540343d686eba16c0009456762254b5f1325dda6f70d5ec953d8e7a2e710d7fcd8e3b9771ad32ac243a55525be2223b64124681c564dcce0d090c03d2206146c764c24a236f9b6c2e2a33ba94fe6542573b7ff28e6fc4cde7217a03d0093a3e1d55db978170914a96c46a13d5ad055f99f512f1b6774ed7d5428448332f2fccce74e35198a14871ad1845635f0a6494b257d95232755ccf787ec95584dad78e88b4e2d2a8094285a38499a0f2decb22835987adbbfd18b2c186a0990fba0edd6ff9fa74504dfb78afcb281b2e1296dff7f65f4a74a62a023a1cbc859aa2ca4eda7e7b529c0943ffebdc0f197706667d96fbc5bcd28e59166a93596a6b7349b246aba9a951af74ac9aaa427719d01f64bb4351e4c30eb80bae34241ab278743160e2819df74b16d6dbd3abd9d49ff7b99e4c61c2407ecd4c1e8fdf688602873f1f4aebde2b9936f029411a09643cceeab01b67eb152b72d2d4979b3c723bf5eac3176790f902078670c5486d25f0cf11fe779b2faac5e0bdf361ce16c1ecc413f01bbdfa6b5c13be04d10540732ffb10fe312606ddbe961fb44112b75541326668ff43bd5c2f88692c8c7ae6a803c7c522359fc44781dc7721c0a2bb71482190c2a3960f600fcb47e619b9498a8256f5069668cf4d9cd6ab3ea9490de6183f16cad1bd91b5427c52c152c4cd9f49911bfbfc9a924814405e92897d2b6e18598a927d096eb734a4055c036b770faad6c7f89eeaeb9d9314f4d10f1141b8d07fbf129085ca80a9096e7a6617c832f129b5b6a6bb2acfb7811442e1d182a462eccb1b70b87886ea253265082d70d1712e26ac975a4f5cbc984f78036c5b2ec860743af448c049df4242d368fe115ec6e1e72d10f1c711ceeeacc40f4f66ee23709ca02a0f0cdced6214f848c42a08e428383636ad735f381a10b700e4d770d466c275c07b4976792ac449e80bb7a5ca9399a1d8e1d22d20ed7f9aa6804affd231e52afdcd2134e8dc733b8bd4885876a7cb85e5a55c76aee7a09a6a61ec78aa5f2579f9e80170960e73b3841c98185abce16ea433e0070201e4d19aa8499866c829c0dedf329b8aa9e3e32c2a700a394adce41a1ab55bdff7658c0c9c6b211e8846c1f3133b39990bc4c0092a3f645fa077b571dafa60aabb337b26eba27afd30043421f9573413b76cf041fb58990ad073b6d12d9af6d0008fc5be7288f42b3374c24630bbeec15922e9ca8a762b4e2d2bb78cd91bcef1dae0770783a089c2f852d9aebee91228a5ca706fd913f6d5ed1ed911fc4f8b9a398094d7b14a3c902347731204d91c96284361d11a49043fcf26ddedab9074e94bff6be5147de3abb556a10969ead434a76e44e313a64bbef4305cb62d67e715a6cfd509a2a6751c9aa7d743d000a89a5cec719fbad51c73bb4d56a000c5b016b5c2c4c63b71e95ab115d0a251901f9f7b2e715c71504d503bfa5f60a326c467f1cba495d79bc83bca0d708a198ac51727dd7f355616fd88039edd2ac250d800344a7e0917005793666b597303903ced0d8c864fe47afc1c192bf0cec4317b747249f67d7d6960e29562f0b03fe4cfaad56c9321258233dae32c03bd21de4f03c62a31fb0c4346aafd4fbc3d4769c4c85045469edfb6a1b388bef994d98e90934ce8ac51f28d86e390f88f918a7339b0dc9e98c25892bb5ab6cfdedd516185a4d5a056ce2c390174b3fa1b26ade56fb72c2f6859f67344d582d277a2d08ba9c2d16b6d8449f1d9cc5ba45a6bc2fa55593aaf089933ab9a9d44c0de84b73f38c2ab13ed56672ba98336311dd1e9873eeadaffaad07de14c8ce462fec2748eb0fd1f15d4f19761328f4556f81c91d81f90eb3d57891e20126ff75ff325e69029acb7b237e121ceb14cbd8d88c53c42f6e683f7de8aa12f5b0484d50f9d631aa23ec1ef173e898ce1c435da0adff15fcc1568656610ed7792abcf898d1b759bc4b70061692f9c5690bc11a52f16f86b675ac886335c3a70a2f712b2b19737a804700bdb7c32414ab3e1b7bce0e2ec1d9258004d2aa7aa8b88676757c9bd3c81533a30924d1b4b4cbdfecf79061f994032eec7cf6ae14447773e907b86f4427cd73aa7a336fbfa80463d286c81268be2a44f9d51db46a840d7b6db34c656ab5e948ed9cf76c9e3603bbdd4c7e2e36dd3d561161ce4f7af7b6b78aa141eb9626e708ada36d4cf4e618cf1d3956c68ad58b3686b53f8e8a7e32036bfa20d158478fdb650b036fa3f834cbd07de93d3269f2a86892951e2b63e326c9a142d998aec59aca958ce0a0c9a8a1c2a6587612d72ba1d6d433b988ed6ed1dbe954aadf6b5c7cde11cfb4dbcb5a36cb94013a6963aa2ec948f96cf3699eea44afedfe177d06bab95369f4a5c920419627c25c527648511fc921b60bd3d66cd0db87ba52457821491f6ba98011b7e2dda58180991fc2c3896c3c3729d7f17912ad33637edd853f918f9ca77249af2747e5cb8ce5e0745378ffe4206b2ac33cefc11f15ab52c85f13839a3cdc42f3478bf6ad650d9d50f611d7291cf5caecae28db3954444e378bb016ceb1130a0f01f72c54abcaed2259cba4290db4293371fc45b384ce4572b94d3c8d842ea81af8bdb1a0dd01fd9d2286569596a95da20818de6634b126f51d5aa768fc91e6fb178ada7e61710c9c734ac54293bfb49176e7f29280bffde6fc9334234d309b1562274a6a1dc860656a2fb3896197ddf159abcbc65fa46bfd76aaecc60b89df7e6ac21d3b40c246eb6ff9363c14079b7a688ee720988dfd9a3570113d0a4ed9ef19ca718887d04f07cfa8a0817a80fa3b73da767638d9556b33c9a0ff36fd93e3b294649fa3e9355231c8f4c5604e7d79215273fe3e076627741130c208351768dfb8bdcf4ed684774963e52e14e495c969bc0791802d23d1f4ff36a8ded1c0a9d9a6b83c33e9487d2408a7c4e2f68a7ef809af9b98d39860cdd4fe14e9b5b88c05f8c4581b43f98a6b8e6af1f7093b2388ac09160b92ea468bbf7dc234ccac198054970c9c11ee7d077e28f7e2f3479d85b9cbc6158858154a17b7113779d883afaf3eb81d564b346cb1d2c3aecb629f815d471cc365583ccb7633222d5acba8c2d79408f9c8961466093f0bf26e6d06470b05f6d4ef88e1b5048517ddddaf3c3c0ee65d326fb99e710aa4cbc6f8bcabca031e1c68f32ccbe5e078545c45db310708dbb0e09b8484357cc30cf39f9b7d27618263b620f0ef0c8531e96a296fbe0f4814cf51b550b8473e33e6cddb0b8339ba407822934fa6c068cf8eaf259c77a60f3d882ba0f0e65a603c6dd2b6c23abb86da1cba106e870eb4a44f372ca5b2c5ddd43b817847ecd9ccb81e7f1379f57cc617da036d0b589def29a6cd3afc82ae7e596e24a9e2e05862e89ab7feb85b415b8eeb51eb49792e1e4cda0aed034994b10d779002aab2e0ef40c5c560ad4a80f563c28663c80481a93f57f156e65a5c32fd251dc1027ac2210cc9cb8afcd4c0a13dc9b920beb46e0d713c9dd8698490228a6668e08cfb2b7b4619d7916e26232ea1671d3056b532a62df1fb620e1fd2156e3ce5c85897fb9969d9eb393734dcd2ce3a544b99fa2e2143ce96d21d0540459dc326fd0c5fe943c145f006a3d74df668ad5d4e508628597b3e34a7ca254daa43c848719b1e4e60e94a0fa96110511c867561810c24b0fb60736a659975cf20257d06ef63a0500279049eb4a5c60438dc1242e7a0bcfd098fc154977b58ae3a9665b188e454bc831d3d8b6203663eb610d99c477ad6e08e0bc66b78a79101fa97c1d499686d81d6e32fd0956bfb52434da64a29637887de03297b7eedb242454d7e0580ee3493eb9a37602c7a6f07664909b708078d3a40e3409678a47c2957aed9dba89dc53297055430e475ef3e5be8a0eec0f5d612e38d7d93af151ed561e7bfbd6864c3670569dcbd5d018f7c1a3131a13d04230e2ebc9733b7e2fa0c71dac802eb60ff036e2d353d03d86511453c71b2aedfc2636e5a9e23a042e0e633549a1c16edc290cc244136f15295286cc7abbb753d81fec6b4468feadb68182ccd6611e50641a07307531206e3c1d75183dc9ef6df702581ece42e0d73b40e19082dc7939fe8fa31f05c9c5f1ab413eeb2b8f9002fa4bd8c11cc6328d9aa767c3e3b7a8d2ed5371dfcdd7d2eb36318db1652d24321762126261a5b764731d9267fce1f92153d4440fd833df47369785a2051ec10d88c24bc9268725daf28ed60d46eb29ae860f022db9b3e4fd3e5d7b74300c42421cce37f711041332e0aa14cd379a29973d6c652a953dd40fa951339246e23866ce56ca75c5a32a4b85dc27a3f4ff3a4b7c7451af888222f8ba39b493a94e8c0a0ce0d75aaca0da78869889baca4523ea90b3daa88323092c6660e879a71cb72cc1f68bdbe1fa3451025ab96a8ac74140c381a68a0a07fc71fb73be76722b2aae03563e3429d25300c24067415a9daaa56c8b3e7c7ddead1e5c0ab76c6657b1719c841766f25046784685f57b6fa2a951f7e05a7d62176c5382bc6fdf2a0bd86b2ded09790674316a482833e591c4236e371799b2bc4cf003c4c69b539c2b6bf4f1247d301511ab84c21a30ec0d1dad065950f41fa1eca75c3eddffe3a71b52d71c9eefbe94714e6e1d5df6f79189a2c92a3a2c6ae42a6ad2e814eeef21ea20611fab4ca7c24d1caf23cdb61b829ee11baffd107dfbd87ac13bfc40c83f757fb32f107295b8e00c6acb4fa4a22163c8686d26512c9daaf8297c6c5713b9b654815bbeeca281be146b09cc8f54758d92f363424d19a7b7da5d58d3fdcc84ae978381a66d6ffd35761c12b2916b06a0d12a9e4a390197fa1fe961d6a42e5c858b96cba370d86eb7d2db1cbf4ff11e37c68d9a99466b8a61657fdadd42603727067161e45baed650b512e505893640386c3c75352d8eba36e26d77bd4071bf71321a608f3657f59d242b54b6672e2005556a74a4437309eb0356d601056c7bad20a752321210e5e46a41f3a6a1e3ab4ffe302a8e6ebd96775c74afab0f6c14c5bbba3b4c9c8e10ab8eede07a8cdbd11b0b743563bb14db91845346b97fbb3a43ac79ddfbc646f511a36d50120987a36913f5b2214e2c599ded4ab846c3e4ae73a5e526952d6220b0edd8d381298eade34d81edb0e971d055bdcdcc4d5ec646ade4615a2dc812ccc1f360397077f2bbbefa03f7e355e5f2103e3045d7464aa992aaee1b7594e5b262729681eb916e7380601c4a965bf40b67d4393c0538e71dc564888426753865ceb277ca8447dd377877c9f3186e55a6d2d2b096938bfb616ae66f82a37947610d47a4adef0e9", 0x1000}, {&(0x7f00000013c0)="6aea59efbb426a2ab80260c22cd75d186e1ee9c0b35c3505359dcdb7c750f24ff2887bcbf74284237ed0e6375cbef73ab1c2d34076531c7d1a4acd38091303823f2d1c4ff58db00bf53a48bde18f73d1ffca8a2a3c0268726567d77a57cd8d75a05cac20b6823ac7de24b5ff5a0a306303084a1dfe29d980bfa98bf3e557e413cc01f5300118c8b83c5fdb2705b68de446d3d2a58abcefd04e18b7258d15527b98", 0xa1}, {&(0x7f0000001480)="bb3fb37933f5c7a48b7683b6219247a790ed5fe7af97ffa7977ae71fb18046c922290aa9bef02d8ff5b14c801cbdb3748ddb22fc2ee05cb69be74b0c8c7dad1301ce0301c0b5bb840cc8bcf0c097060886b9b2cfee563280e82ac429574a9cbb5013170f6a98b521d5b109af0e25216776a6c097dc84f660d40f53c6f217b34f7859738c02e372f4ba3ac0596510cd35b95d4ed651cf287a9b6044bb020414ab2b1ac14255951fd55301", 0xaa}, {&(0x7f0000001540)="472181cf4e5ff3c141a0ba9fe2e5ca79490ec25bdab39ddfc5772d41119f97ebc37ece2f14c8dfe618", 0x29}], 0x7, &(0x7f0000001600)=[{0xb8, 0x29, 0x2, "caba5a82b432b29fb680cbbd110bd1b6964407a8e5176745279c0e83f344d43404b9afb3d8324f191978024b190c59ea4e34165f1fc108c31243a7296c2acb349334033ef17eb445721ad31dec2e37e836f602c67ad3e6259ef8cc4b929337fed8f2b5481a05c591212f592e40cdee3a0458bd3ab0c8b75d303ecc6567a7bc95d44ccb972b8154720b0ea3eb16763b40778951cb080db80b74b88ae1a72c24042b"}, {0x48, 0x113, 0x4, "c13df99796b38f268a79dfbb08e830b20eaab32d3ba8213cee3b8d3485098648a3910f8237dcc43a7918f62103cd91fdfa"}, {0xc0, 0x119, 0x9, "7d3f7e33609220668e7510b33847afcd50eb913149bbd539ed668913e3b9eb98f26495b8b5f2cdd3d0c04ac217c6f1de01e83858e86710b2c74b865cb6399bdc33078066a7f076c698b9cd54d4380e0333706a4f250bcc5c61a65346aa8bde1f27e995d5918147674ad436b5e67447111e087c08b82cf8709e5607816385179017435e6c815ed708d9156df447212fcbfc48b0347fd8f077e65c52c78f6c2dd4f3621112a106f351d8c614211f"}], 0x1c0}}, {{&(0x7f0000001840)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000002a40)=[{&(0x7f00000018c0)="dad60551c32f34b8832282d4ff9f1c6c42f679d0123bf012f4dc66f550e98cbc394c59d442555bba90f8b1b730eaad8384d1559ced82d7dde5c3ed6b9cb2831c921ce3cbada137793f8dc6a2ed9b48d35f8a8a16d847eb4bd5ec4cbfe9e518804a55384e0a6e4665bcddde39ee55a00faab5d8079298a0ca1d2361b01f74222639fa96ff130a751820fe92b3f494c8ce9633ba509dd76d7f74628cb7bb92580bf2e8754538a1dc1c4875480213255ce0076c7cb84eba031fe34ee0c907f4919adbb6683fc743f075ae859ad6da53f322c7de955646", 0xd5}, {&(0x7f00000019c0)="b9f7911c97a152871efb23a03113e5e0c6581420c66ec5f44c0a56ef336a941a637a2ccd9473bfaaf3c702449acf6d7832aede21742a894ec414da5d0efee0fc70e152c0a16406c429d7cbc59ba967726767e775983b0002f779c3e3250e5e69739b6c6a411291daa788fcf27473548843821122eaa28857612e248ef29d68693b7d865d39a02b6e5ed869451ec1789e5a80a07afb9206556f86e36cd413f48e084eec6171cb19da88c2acfa0b5f2a9ec5700bc3bbe293b2062135437c5288a979b21ef8426aa57b06dde388a088689fc92f38c5a4211b6beeabd30e389c3794d13a431cd2d3701ef7ce5e5bba37f25c074b5e9290527aee5115524472cec3561d9efc616f932147f6ffed998ab6956a30c5c3ee7e3df49932aad943c81aa8bb7248a07b6b9ba47adbc051670e3be79dd28f729c6beb7a400e79de925cde2ed9f99086e6fa89987d95e544a55a56af157c49d1c9a6feb7cd5495059fb9fdbb79136d5a384d5f502122f0aa68fd6b8bb3f74964949659ce5b04fa6d8344e7e07145359d0d6a6a78622e677fe8be2756ec8bbd5285fc550d6d65d8a97c810fd46d7ac075f163874e3fa1c95a26c230ce8587ba051d4b1f4e9eabde5f997ce33d1061b2dca8763efe26cfe9ede3e5b4ccc8363f540c948a3d040690f3bcd08cd43e8c16ee22aabda266c127fade7c7e02f372af74317172e31ad4cfd6f0f45b01107f68fb7e07b379b3e8e714654ee8e6e354af52f0f63761b77bb1508a71f73609cdbc7d7e81d749e681a7f011e4a437f131bb4ab3a1c77cace75779a022115bcbebb2597a90fd8656f776b8a6d64c53dc5f9466603aeeab5f5c2b3c8ad17661680c0e65696af985d5c9783636b29ede81d2278e20a712549c2c78e0ded39186ef2d2316f9075604c223063f0753b160121f23561137f4b83c7608c58de69f23c6cedd7ef3ea031a3645309e4425e8813bd461350e2c638a46b965ad803421994221f324472fddf9f627a8d0d30dd16b809373d4c64bff966055f478e0814d1d0745bc9c8dadbff99cdd70d6127d482a2ebe2c90eab4b11312eca494cff2710d0b425f10e6fc8b4c6bdd80cae1501ff9c7818b2cb7609a657fd51e2a91b8d791609672a8955a9bb368945f39f113d996ff38058121a09c42389255b628ae1b39082b74d71d8711e6737a45b333d7146d62164a44eacd0bebd76b49ba2b7499a3707a5bf6d5f35b35a15e49c5c64066e0912dcffce4a75f93b77fa2bbfe515b5951c972a3fabc4c8d2f5d7de0ee1abb2e587fa0c082e58196123c02999be5818b5aa3a509519bcf714e22baae20e495b4a00f9fa725f1a1d06fcc4acf5742e16295a92e9a836e7c85ac3764ceaaecbfd4918b8587bba1fe38fdf0942c15bbed42b1b530803f31c361c4c7d4dc3607d73aa9c4974299e3ba2c5e7486ec582152b6a4ef331ef37103f1b5dc47cb57ffc1f694c5487d5c054b29f8493c1a46c58d2f5a7a5d33a3f55fc03569c3010f45849fc79fea7e3c1f98a0b9f9881b097de717221527272cdf4303045f8d3432a6b10facb8a0a6498f6a2cba435136a78ed924eccb12c84b9d46bfd3be80af09145b7df720cd4bec0c5512b152afd436be7670ae4daa4d7dbbf046145f70b49fa3884c8a0c142645c238f97487d61e02ff75861a0ad81b517f6bd78e89f5a86fe8395eebef0906433f462fcd795e447f9645fec0ae7509111e77779ae7028082f6206235bd384f4295c219b1251743a13b72ae02b5a27f8e11a5c15c042f9b7fc71b0062d40c42b834ea00d8cc8d62c3d52b9e0887438b2c9cfef0718f12cb1241a38d8a0624424a57fb49ab1a89c7ff7899041888ea90ac39ff4150a01a102717310ec3ce4f247fa28bbf1629e1a3835d638be5843c782bfc19357e29cf9a9952a816d54fa512dcdef355efa9f45d26a4b3bc510bc986a3d4dcd60a3b0d3386c688a1a578f7c929e603c694f1e91267e0a5bb146ac862a688bfbda7108ca0e70f5476a9b4cfccee1afe28d86a169863bbdc9078ffe431ad56a8ac73b93a0af6176dd89d644fc2e85c6a4343d743211c088baad946e5dff99f75e88e173e2485e677d62c8fab59b071b22ff73ca201d1dd50722ca760320c8e23f2762f05065d5d6aca2da376246410a8b7fd5e9dcb81015276a308de5ddd88a53822937bad475989cbada82e687dce6d6dbcbc5f6a0df3a43837b9a1a7b0c7dca88010e933b3bf4d2b8f9e0fa631ab72fd32e5cc2fcb155ae2c3f34f8f5642035087ea0618ab5a980d507dc6d55be62878a9041528bceb084d05096d9983dfd0a83137744b5ce89a48829a88258ceefdd51f465554f814f6e31b03ac9bbf88a7382f58f3f957ec806d5bfee905823f2879b62f2c951dcf27778bd1dcfcac311d0288669e483e14ca884818a52dc1188363f0c5efe299d03c5aa3af2c9b5f2e1c3e01c4874d35788682caa692d2ec4eb2273b3deb74e2fb572524d6dd2914a1b7c78f67f141a4592ada7e40cea6f4448797794d4e0705d3e484d406bec7a3d0e83640f2060cb3ba603d65ad0e229d24b773b281d8fa438d584a7923b24087f4450754bf3ce1602e56d9f57009e33d72e08ecd98538b6f256e50e1321d9eb7d66cce0261814cf6e716bdb6cf3607c34042dc1c144dc9eed6f9a1949308f3715ad69a07bccf286a5f7992532a4bb8f07f297bc3baff73c3f6ecb3d06c2a355e8b304e7539567d6c2922b9b16a272b3d4b47bd6111fb7657bb7866f1977714019b74a7a286cac5e7c6e6fdc731e3b8da9f870dab7cc3c5ecf2d01c94119f48019dee8d9efdf876a92171e2d29b79558162f4b02febd6ef2eda339aec9308395aac0b5937c7ddd284377201d9f3a3cc4413c98f31a5ff55fc81eaa2d962717bfd9df0fb51b457441f73ab81e824c8a6240d132c0e841323153e6539844b8d07c1120c458af1a55de1ba6384d9257c62b139243c44f6c00ebfb0a0828056a31572606456bdd29eb1e8d9ef9cf3575682ae608e6a2c9f2d024e495eb9c5942d13906879656f97c2942377a2a64ac3fc85c1dfc793566627dd1b0e98b14cf5d2fb7fcd28aa8baceeb23310227c51e0125be0d089623442692293c70be6ad00f97d6d419bcfa8682aa6d1f0c8c9e3b76cd3fb2a141dabb8ae87b0f013ec0635cb6798ab48b94520c720ad873b52b61c372b36ff730dd4f452f08b9f048ce57e3638de289b240823e52edbaf488e99d5988a788325c189645dfba2acaffed2b5ef50fd611552f6d0ee3e69c70a33bb7f9032938000e0c04197f1155bcd4e3115bf28d5404c15f095d2499b9cc02fe0171d7956733947827566885938e0885bb74e91036900b4a335386568ea8b1fc24efc975afaf8dea40bdaa484cc5ec4a2b21ff9539696cf5d33ace0bdaf87c367d3b6ca3747dc2ce6479206227bc21cc9fc04837a06e61b529348880c71e78e2155d8106e605bf542df375dd8a16003ae6e7eca314d9f8bc4b58f600aa984c2b6e308bcbeb01db7e4f531187dca915d5debabde2dd1c41bda7be019e72a82671652eebbe7c2270b7444938b169a3a0bbfe15195b7674ee9472b72bf1aad59b6f60da9738326e6fd3604993ce95415392610ea9a26ec2ac748542944c188a9772fb66ecaef856fc1cfb995db313ae39e455ac791d0820e9edeb9b84013863da0e9aa6b408bc9f17b01c7840024cf36adc2e950782562cd710f5f48eac0cb3aba7bfe8392a4cdf83259a38b34e7528c658233cafa354bf64a92fb50f9172f4d47e86b59430766c2a5547156c11e22e80b0ff4db78dd448c671d8ca574c186ff9c41465fb6bc9e432a1213a10838acf468e4c46b4b70d2b718c8e1901f37c83d545a04f12c2ac0b7cb2af1b8dea968634957e3f7982538168d4fa68a54901f71db2159716cbdf4651b820259fc277fdbcf5ce94e6e880f6cb2b862f7c79c39168bebd13c326640c9822bb14d0586269307b7ef8b17b41ff58e6560ab6b2db21df8f192e4e5c43a0ad680f6dbda34d574b0adfa1d0675383fb5e197d943626c8c9abb7c86fe914390e29231a943e01812221e1fe3496926eefa9ee6f660b06c5ed0835b74c8fb4b2456d56c5bea9770c90c706b4e81f4b920ef0248e1f4fcf18648e412665e7a352cb78c2aed6554e47e7e5da7942e84537cb33a26baf25ddf52c9232c6e32eb178b0fdd8315feaca10e5a538fd8631fbd52e7604a7909f2c4cbb6b7e15cc54569b15b24a38514ec968ce00679fe44c3c18f15fed6d1768d302cca1d0dae2fe00164fcd5e2adaccf523b3bd825dceb73a410b8afcb8a656e0e0dfc2435f9bccee305af91f0c0cf68fc3cc5fa6a9c6e8005cc8e37bb1158ae0ae84aebbfac49c8d2d6d98496782935be107ae49c7111b78956e5526010c205b73c8b039bb604c99c44b4f97522f0dd9d784c7b0c123d65df2cd70d04f0c4f13ace092fc893676f4f2324ff3823e0b4c5a585e16ef69ab426136cabffb11c7241e8f9c3de353e07647befa89723132edf90cba3aba436e088d30a70446a00ec92856729c9e81ff876cf7d7abf27dec2948d15b273a49494b8899b6f256ed5c9e65b8959d7227c3118efac8aeb7f615c7f294eea82db91103cb34457759d9c4339dd754c5fbd06ab8666e3865598f099763c3bbff8868b736d6881887a566e32cfee7d8237dc988ab6ce22cc50d3c3126276f2c19081698f85fcce902210f797a65197caeb96c62e38d1f67ff09abac112543f2de258d182de5f26800feb0948a79a31d455082e061ca5d9e7ac5d3742e087997451093e14354ffc17f03cbe2af429641eb73f797d2f6158895b0a77ea854185f9bbe0478665de8885aaa35092d2be9717c554bbd5bffc936386dae6f1e7f195f4e0e5ab7746195c8682db867fbb7a4b4829a9357a706b663c19874b18feb4a4870d135146e7706e647020d74a21641071263ba0dfb80f5f07ca10054693f3cbf4a85816365107f1f46ce07b52e2c70e6050e056c63cf33f6e44dbf281c1b83b1de08e42592739a10a4048f6d0eb3f5f682d2b71a2ff7c46049e7803104129420c5a9bfb56dd9d2f6d455ac687de192ed41d55c7d340e121711536fc8d24875711c8305a87be4dd0cd516627ebeddc714ddb1238d3e6db35092dbcbb5b84e27256b0407bd317d454a57111cb464fddabce6d0ed8221ae5e1edd7bfa4bb66ba24ceba26bf7f4abd99149ab3b982d2cf2c45a504a91a5d3e631ffed3d80fa24da33389d70b452ca44ff37349df9e2e72f531aae5ae48bbfb13d1a973b823f808f5585b660f14a648786b2dde7985e708e46c1a7583a1690b6fa68851d49df0a6467e67c1f0c6f225ba5eb8e783462e8cb6aa2ae7607bb140b08918800f5be2ae6aba0486c1df9a476384d945c7840629e204050087b829a5b460321f0b8a5d00f2d30dc2bf2a2c9aeb6b737342ea6bca83192fd6cc144589281beca6b745b12c03b0afaf6603878438970fb27a356b99d3b7cecfdbe0eda2d3266642ff9e28299c6ad36785a53b6864af5f9bef8a4a0164aa3349cb32a239a0a57934232ebc429e3c4fd79d5e1fe87503fdcf574b0cfd8410648055f750403d8aae5574cbd612fc0f9d7686877a84bf720a071c80a9d321f93cb8dd28eb058bfb51aa8bc025c7e6463ae8fae498b812030d679dad4d5c26ad97d4e43e76ffd1d475a4c8fec76c019f4d62fce880f2901a49d9e3a65c87be0bd22397b0c3858841399ed86a38c480978fd65ea7940dc633649effcbd52ef694643901324a01847d0c245ec639aab1f0", 0x1000}, {&(0x7f00000029c0)="6e28970a25800a692cef6e72190fada1783a8ba2b67c78bad6dd37bf2b72460d1d1c377e95fc67f9990dbf8c53900676a3f6c6f37d7201343ceea7b7b446102803198eac136e", 0x46}], 0x3, &(0x7f0000002a80)=[{0x18, 0x117, 0x40, '(c'}, {0x28, 0x91, 0x8, "bc9116aade3f405a8b3af95d7bd2640e4d40be071344"}, {0x38, 0x0, 0x100, "d6496d63af8ded2fc662a1631c2ad13ab88bf4fc3fabfc0d1df0db9dd095535413"}], 0x78}}], 0x2, 0x20000000) ioctl$VIDIOC_ENCODER_CMD(0xffffffffffffffff, 0xc028564d, &(0x7f0000000080)={0x2, 0x0, [0x81, 0x1, 0xc9d, 0x7ffffffd, 0x9, 0x80000000, 0xff, 0x5]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000000)={0x8, 0x6b, 0x20}) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020d00000a000000000000000000000005000500000000000a00000000000000fe880030f487f7800000000000000000000000000100000000000000000300060000f4000002000000e00000010000000000000000"], 0x50}}, 0x0) 06:06:43 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:43 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x3000) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xfffffffffffffd9d) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r9, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8, 0x1, 'cbs\x00'}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x48, 0x24, 0x509, 0x0, 0x0, {0x0, r9, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8, 0x1, 'cbs\x00'}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18}}}]}, 0x3d8}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec}}, &(0x7f0000000200)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0x1, [], r9, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x5, 0x5, 0x9}, 0x10}, 0x70) ptrace(0x10, r0) 06:06:43 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x1b, 'O'}) [ 331.992674] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 331.999957] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 332.007257] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 332.014553] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 332.021833] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:43 executing program 3: clone(0x12000600, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)={0x0, 0x0, 0x9}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$netrom(r2, &(0x7f0000000240)={{0x3, @default, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @default, @bcast, @default, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140)={0x0, 0xffffffff, 0x18}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r4, 0x40}, 0x8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{0x304}, "52c3d8aaa8cb81c7", "5671db76cd0bdf0e05287b069278a65f", "0fcb420c", "ba90351f401131f2"}, 0x28) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:43 executing program 1 (fault-call:3 fault-nth:67): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:43 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x1b, 'O'}) [ 332.147869] FAT-fs (loop5): bogus number of reserved sectors [ 332.175841] FAT-fs (loop5): Can't find a valid FAT filesystem [ 332.252235] FAULT_INJECTION: forcing a failure. [ 332.252235] name failslab, interval 1, probability 0, space 0, times 0 [ 332.266819] FAT-fs (loop5): bogus number of reserved sectors [ 332.272150] CPU: 1 PID: 1445 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 332.279526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.288986] Call Trace: [ 332.291613] dump_stack+0x172/0x1f0 [ 332.294157] FAT-fs (loop5): Can't find a valid FAT filesystem [ 332.295355] should_fail.cold+0xa/0x1b [ 332.305340] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 332.310578] ? lock_downgrade+0x880/0x880 [ 332.314749] __should_failslab+0x121/0x190 [ 332.319257] should_failslab+0x9/0x14 [ 332.323341] kmem_cache_alloc_trace+0x2cc/0x760 [ 332.328037] ? kasan_unpoison_shadow+0x35/0x50 [ 332.332640] ? kasan_kmalloc+0xce/0xf0 [ 332.336557] __memcg_init_list_lru_node+0x8a/0x1e0 [ 332.341513] __list_lru_init+0x402/0x720 [ 332.345698] sget_userns+0x81b/0xd30 [ 332.349615] ? kill_litter_super+0x60/0x60 [ 332.353877] ? ns_test_super+0x50/0x50 [ 332.358741] ? ns_test_super+0x50/0x50 [ 332.362643] ? kill_litter_super+0x60/0x60 [ 332.367001] sget+0x10c/0x150 [ 332.370223] mount_bdev+0xff/0x3c0 [ 332.373782] ? finish_unfinished+0x1120/0x1120 [ 332.378393] get_super_block+0x35/0x40 [ 332.382426] mount_fs+0xa8/0x31f [ 332.385816] vfs_kern_mount.part.0+0x6f/0x410 [ 332.391027] do_mount+0x53e/0x2bc0 [ 332.394587] ? copy_mount_string+0x40/0x40 [ 332.398846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 332.405178] ? copy_mount_options+0x280/0x3a0 [ 332.409693] ksys_mount+0xdb/0x150 [ 332.413337] __x64_sys_mount+0xbe/0x150 [ 332.417683] do_syscall_64+0xfd/0x620 [ 332.421934] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 332.427780] RIP: 0033:0x45c94a [ 332.431013] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 06:06:44 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x1b, 'O'}) 06:06:44 executing program 0: socket$xdp(0x2c, 0x3, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d00000a00000000000000000005000500000000000a00000000000000fe880000000000000000000000000001000000000000000003000600000000000200a6a4f67c0000e0000001000000000000"], 0x50}}, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8, 0x1, 'cbs\x00'}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x48, 0x24, 0x509, 0x0, 0x0, {0x0, r7, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8, 0x1, 'cbs\x00'}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18}}}]}, 0x3d8}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000028c0)={'team0\x00', r7}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000002900)={'team0\x00', r8}) [ 332.450109] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 332.458009] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 332.465299] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 332.472577] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 332.479863] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 332.487506] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:44 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 332.580418] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 06:06:44 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, 0x0) 06:06:44 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = open(&(0x7f0000000040)='./file0\x00', 0x10a000, 0x40) read$alg(r2, &(0x7f0000000100)=""/254, 0xfe) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)={0x0, 0x2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r0) 06:06:44 executing program 1 (fault-call:3 fault-nth:68): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:44 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1b) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000300)={r9, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f0000000140)={r9, 0x9}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000001c0)={r10, 0xb4, "126780a4a211e4ca34d30edde5bdc5b16bb69bf7f17d5c69292b2b8e63856cb78e372dae2aba2c9bc8227fbd469f6fe535aed6bb420fa8853096917e054fc6a47cb95f77fc9a8a5d01164feecdaa75144407dac73c2285ef443c3b779a642b01852eac75fae29a17d54c98c99b82814d50085e26f737eec0d75bbf27ad8a4734684af9fed3d1dd34a011108aa9bc95ee8db4afc8aff49a926b7c4402eec620ee64ff765196ad5bb9d36f2d6cc54ca981965556f2"}, &(0x7f0000000280)=0xbc) r11 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) r15 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x10}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup(r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x1}, {r11, 0x1002}, {r7, 0x400}, {r12, 0x80}, {r14, 0x10}, {r15, 0x20}, {r17}], 0x7, &(0x7f00000004c0)={r18, r19+30000000}, &(0x7f0000000500)={0x5}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:44 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, 0x0) [ 332.706839] FAT-fs (loop5): bogus number of reserved sectors [ 332.732724] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:44 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0xb, &(0x7f0000000100)={0x6, 0x0, 0x9aac}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x10, r0) [ 332.788857] FAULT_INJECTION: forcing a failure. [ 332.788857] name failslab, interval 1, probability 0, space 0, times 0 [ 332.805444] FAT-fs (loop5): bogus number of reserved sectors [ 332.809675] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 332.820002] FAT-fs (loop5): Can't find a valid FAT filesystem [ 332.858645] CPU: 1 PID: 1679 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 332.865635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.875092] Call Trace: [ 332.877734] dump_stack+0x172/0x1f0 [ 332.881396] should_fail.cold+0xa/0x1b [ 332.885348] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 332.890609] ? lock_downgrade+0x880/0x880 [ 332.894804] __should_failslab+0x121/0x190 [ 332.899153] should_failslab+0x9/0x14 [ 332.903074] __kmalloc+0x2e2/0x750 [ 332.906651] ? __list_lru_init+0xd5/0x720 [ 332.911212] __list_lru_init+0xd5/0x720 [ 332.915491] sget_userns+0x84a/0xd30 [ 332.919286] ? kill_litter_super+0x60/0x60 [ 332.923675] ? ns_test_super+0x50/0x50 [ 332.927797] ? ns_test_super+0x50/0x50 [ 332.931705] ? kill_litter_super+0x60/0x60 [ 332.935980] sget+0x10c/0x150 [ 332.939438] mount_bdev+0xff/0x3c0 [ 332.943086] ? finish_unfinished+0x1120/0x1120 06:06:44 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup(r2) r3 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r3) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace(0x10, r0) [ 332.945965] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1658 comm=syz-executor.0 [ 332.947869] get_super_block+0x35/0x40 [ 332.947887] mount_fs+0xa8/0x31f [ 332.947905] vfs_kern_mount.part.0+0x6f/0x410 [ 332.947924] do_mount+0x53e/0x2bc0 [ 332.975845] ? retint_kernel+0x2d/0x2d [ 332.979937] ? copy_mount_string+0x40/0x40 [ 332.984336] ? copy_mount_options+0x1d9/0x3a0 [ 332.989147] ? write_comp_data+0x1e/0x70 [ 332.993409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 332.999150] ? copy_mount_options+0x280/0x3a0 [ 333.003777] ksys_mount+0xdb/0x150 [ 333.007418] __x64_sys_mount+0xbe/0x150 [ 333.011500] do_syscall_64+0xfd/0x620 [ 333.015324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.020708] RIP: 0033:0x45c94a [ 333.023917] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 333.043233] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 333.051186] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a 06:06:44 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, 0x0) [ 333.058640] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 333.065920] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 333.073313] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 333.080868] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:44 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\xc0', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0xc80) 06:06:44 executing program 1 (fault-call:3 fault-nth:69): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:44 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x0, 'O'}) [ 333.264270] FAULT_INJECTION: forcing a failure. [ 333.264270] name failslab, interval 1, probability 0, space 0, times 0 [ 333.287526] CPU: 1 PID: 1979 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 333.294418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.303865] Call Trace: [ 333.303891] dump_stack+0x172/0x1f0 [ 333.303912] should_fail.cold+0xa/0x1b [ 333.314039] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 333.319173] ? lock_downgrade+0x880/0x880 [ 333.323351] __should_failslab+0x121/0x190 [ 333.323366] should_failslab+0x9/0x14 [ 333.323385] kmem_cache_alloc_trace+0x2cc/0x760 [ 333.336172] ? kasan_unpoison_shadow+0x35/0x50 [ 333.340782] ? kasan_kmalloc+0xce/0xf0 [ 333.344715] __memcg_init_list_lru_node+0x8a/0x1e0 [ 333.349694] __list_lru_init+0x402/0x720 [ 333.354004] sget_userns+0x81b/0xd30 [ 333.357838] ? kill_litter_super+0x60/0x60 [ 333.362454] ? ns_test_super+0x50/0x50 [ 333.366379] ? ns_test_super+0x50/0x50 [ 333.370317] ? kill_litter_super+0x60/0x60 [ 333.374608] sget+0x10c/0x150 [ 333.377845] mount_bdev+0xff/0x3c0 [ 333.381549] ? finish_unfinished+0x1120/0x1120 [ 333.386169] get_super_block+0x35/0x40 [ 333.390087] mount_fs+0xa8/0x31f [ 333.393494] vfs_kern_mount.part.0+0x6f/0x410 [ 333.398059] do_mount+0x53e/0x2bc0 [ 333.401896] ? copy_mount_string+0x40/0x40 [ 333.406246] ? _copy_from_user+0xdd/0x150 [ 333.410428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.415998] ? copy_mount_options+0x280/0x3a0 [ 333.420654] ksys_mount+0xdb/0x150 [ 333.424251] __x64_sys_mount+0xbe/0x150 [ 333.428263] do_syscall_64+0xfd/0x620 [ 333.432292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.437592] RIP: 0033:0x45c94a [ 333.440898] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 333.459994] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 333.467727] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 333.475027] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 333.482323] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 333.489728] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 333.497230] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:45 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x0, 'O'}) 06:06:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000280)={0x4, 0xfb, 0x4, 0x6, 0x5, 0xb1, 0x40, 0x4, 0x1, 0x20, 0x2}, 0xb) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}}, @sadb_x_nat_t_type={0x2000000000000031, 0x14, 0x2}]}, 0x40}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x7, 0x50600) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x81, 0x4, 0x3, 'queue0\x00', 0x400}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_dccp_buf(r4, 0x21, 0xcf, &(0x7f0000000040)=""/141, &(0x7f0000000100)=0x8d) 06:06:45 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x0f', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:45 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, [], 0x1c}, 0x74300}}}, &(0x7f00000000c0)=0x18e) 06:06:45 executing program 1 (fault-call:3 fault-nth:70): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:45 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x1, 0x0, 0x0, 'O'}) [ 333.748333] FAULT_INJECTION: forcing a failure. [ 333.748333] name failslab, interval 1, probability 0, space 0, times 0 [ 333.778144] CPU: 1 PID: 2125 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 333.785234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.794811] Call Trace: [ 333.797444] dump_stack+0x172/0x1f0 [ 333.801114] should_fail.cold+0xa/0x1b [ 333.805064] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 333.810309] ? lock_downgrade+0x880/0x880 [ 333.814496] __should_failslab+0x121/0x190 [ 333.818894] should_failslab+0x9/0x14 [ 333.822728] kmem_cache_alloc_trace+0x2cc/0x760 [ 333.827436] ? kasan_unpoison_shadow+0x35/0x50 [ 333.832224] ? kasan_kmalloc+0xce/0xf0 [ 333.836181] __memcg_init_list_lru_node+0x8a/0x1e0 [ 333.841236] __list_lru_init+0x402/0x720 [ 333.845428] sget_userns+0x84a/0xd30 [ 333.849257] ? kill_litter_super+0x60/0x60 [ 333.853626] ? ns_test_super+0x50/0x50 [ 333.857556] ? ns_test_super+0x50/0x50 [ 333.861504] ? kill_litter_super+0x60/0x60 [ 333.865985] sget+0x10c/0x150 [ 333.869121] mount_bdev+0xff/0x3c0 [ 333.872694] ? finish_unfinished+0x1120/0x1120 [ 333.877405] get_super_block+0x35/0x40 [ 333.881345] mount_fs+0xa8/0x31f [ 333.884752] vfs_kern_mount.part.0+0x6f/0x410 [ 333.889905] do_mount+0x53e/0x2bc0 [ 333.893771] ? copy_mount_string+0x40/0x40 [ 333.898168] ? copy_mount_options+0x1ea/0x3a0 [ 333.902705] ? copy_mount_options+0x1f0/0x3a0 [ 333.907229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.912805] ? copy_mount_options+0x280/0x3a0 [ 333.917432] ksys_mount+0xdb/0x150 [ 333.921233] __x64_sys_mount+0xbe/0x150 [ 333.927021] do_syscall_64+0xfd/0x620 [ 333.930860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.936092] RIP: 0033:0x45c94a [ 333.939504] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 333.958863] RSP: 002b:00007fae6b80ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 333.966724] RAX: ffffffffffffffda RBX: 00007fae6b80bb40 RCX: 000000000045c94a [ 333.974039] RDX: 00007fae6b80bae0 RSI: 0000000020000140 RDI: 00007fae6b80bb00 [ 333.983758] RBP: 0000000000000000 R08: 00007fae6b80bb40 R09: 00007fae6b80bae0 [ 333.991066] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 06:06:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020d00000a0000000000000051b62d54b10fa03298785b1b7402d4ba0000000000fe8800000000000000000000000000010000000000000000030006000000000002000000e00000010000000000000000"], 0x50}}, 0x0) [ 333.998364] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 06:06:45 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:45 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d00000a000000000000000000000005000500368fa7340a00000000000000fe8800000000000000000000000000010000000000000000030006000000000002000000e00000010000000000000000"], 0x50}}, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000080)) [ 334.198912] FAT-fs (loop5): bogus number of reserved sectors [ 334.216015] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:45 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x0, 0x143) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) creat(&(0x7f0000000100)='./file0\x00', 0x4) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 334.276148] FAT-fs (loop5): bogus number of reserved sectors [ 334.297738] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socket$inet6_sctp(0xa, 0x0, 0x84) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:06:46 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:46 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xd, 0x8031, 0xffffffffffffffff, 0x0) 06:06:46 executing program 1 (fault-call:3 fault-nth:71): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 334.518128] FAT-fs (loop5): bogus number of reserved sectors [ 334.537727] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:46 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="0200000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0016001800010014000b000000000000000000000000000000000008001b0000000000"], 0x44}}, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f00000004c0)={0x7, 0x4c, "3094fd1d46575ccfd059a6b214e9a11e7d1410c3ae7888fa2c954cc2525ed1636a1bfabdbb1963177e5d9756089b4363c37924e244e498a9961389223705819da225808d26b98f3e9b60b010"}) dup(r3) r4 = dup3(0xffffffffffffffff, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) pipe2(&(0x7f0000000540), 0x100800) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0xffff, 0x108000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$nl_netfilter(r9, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100802}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0080000f0388a1d926cfe9ba8d67bfb421388a9f269736", @ANYRES32=r7], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x1004c0a1) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0x200000, 0x0) ioctl$sock_inet_SIOCADDRT(r12, 0x890b, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e21, @remote}, {0x2, 0x4e22, @rand_addr=0x8}, 0x1b3, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x1000, 0x4}) r13 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r13, 0x4008240b, &(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0xa5, 0x4, 0x0, 0x3, 0x1908, 0x9, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_config_ext={0x8, 0x7}, 0xecf90324d1aa6e55, 0x2, 0x5, 0x6, 0x7ff, 0x2, 0x635}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r10, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r10, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d00000a000000000000000000000005000500000000000a00000000000000fe88000000000000060000000000000100"/80], 0x50}}, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="0af49c7037beb2ca42c8fd02446a8958c45eb36229d6ad66b26bbb2e34ae825f9f5555", 0x23, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000340)={r1, 0x1000, 0x25}, &(0x7f0000000380)={'enc=', 'oaep', ' hash=', {'sha1-generic\x00'}}, &(0x7f0000000400)="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", &(0x7f0000001400)=""/37) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000001c0)={0xfff, {{0x2, 0x4e24, @broadcast}}}, 0x88) r3 = dup(r2) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000080)={0x1, @bcast, @rose={'rose', 0x0}, 0x3, 'syz1\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5a, 0x1, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000180)) [ 334.627053] FAT-fs (loop5): bogus number of reserved sectors [ 334.656700] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:46 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 334.747465] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 334.780950] FAULT_INJECTION: forcing a failure. [ 334.780950] name failslab, interval 1, probability 0, space 0, times 0 [ 334.823745] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2270 comm=syz-executor.4 [ 334.854264] CPU: 0 PID: 2269 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 334.861264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.861269] Call Trace: [ 334.861294] dump_stack+0x172/0x1f0 [ 334.861314] should_fail.cold+0xa/0x1b [ 334.881317] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 334.886529] ? lock_downgrade+0x880/0x880 [ 334.890717] __should_failslab+0x121/0x190 [ 334.895079] should_failslab+0x9/0x14 [ 334.899029] kmem_cache_alloc_trace+0x2cc/0x760 [ 334.903818] ? kasan_unpoison_shadow+0x35/0x50 [ 334.908433] ? kasan_kmalloc+0xce/0xf0 [ 334.912362] __memcg_init_list_lru_node+0x8a/0x1e0 [ 334.917421] __list_lru_init+0x402/0x720 [ 334.922059] sget_userns+0x81b/0xd30 [ 334.925970] ? kill_litter_super+0x60/0x60 [ 334.925992] ? ns_test_super+0x50/0x50 [ 334.926011] ? ns_test_super+0x50/0x50 [ 334.938615] ? kill_litter_super+0x60/0x60 [ 334.942908] sget+0x10c/0x150 [ 334.946049] mount_bdev+0xff/0x3c0 [ 334.949603] ? finish_unfinished+0x1120/0x1120 [ 334.954226] get_super_block+0x35/0x40 [ 334.958146] mount_fs+0xa8/0x31f [ 334.961726] vfs_kern_mount.part.0+0x6f/0x410 [ 334.963704] FAT-fs (loop5): bogus number of reserved sectors [ 334.966668] do_mount+0x53e/0x2bc0 [ 334.966690] ? copy_mount_string+0x40/0x40 [ 334.966711] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.966723] ? copy_mount_options+0x280/0x3a0 [ 334.966741] ksys_mount+0xdb/0x150 [ 334.995648] __x64_sys_mount+0xbe/0x150 [ 334.999663] do_syscall_64+0xfd/0x620 [ 334.999881] FAT-fs (loop5): Can't find a valid FAT filesystem [ 335.003514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.003531] RIP: 0033:0x45c94a [ 335.003545] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 335.003557] RSP: 002b:00007fae6b7eaa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 335.046648] RAX: ffffffffffffffda RBX: 00007fae6b7eab40 RCX: 000000000045c94a [ 335.054119] RDX: 00007fae6b7eaae0 RSI: 0000000020000140 RDI: 00007fae6b7eab00 [ 335.061599] RBP: 0000000000000000 R08: 00007fae6b7eab40 R09: 00007fae6b7eaae0 [ 335.069042] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 335.076916] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000003 [ 335.135688] FAT-fs (loop5): bogus number of reserved sectors [ 335.158733] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_dccp_buf(r3, 0x21, 0xc0, &(0x7f0000000100)="13baabfcc76d66665c1b2c0a7e66ba07233ee697f9f48433d1672266d9ed21385e03c77fd82b45cf2dd304160168dc5ab55920129e0715046e27bc543d9e47ecba8ac692a5344cac713ea71c05bb445639cb857744551f1d5d58096ad9749f89f14d1f210ab113ee1dbd20a74e26f3aa227435b30c6e53585cd9654b2de21e8d7a72ed542c631472f0e21fe8b37d3fc3cfd1dd3a1594e17bc580158ef0ef70d8d8c8ad7322ecab60ac60fa83ef967d5dd3da13593fa1a0a91d3a24a70ffc8d0a275e86416643de579a0c", 0xca) fcntl$setlease(r1, 0x400, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:06:46 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$getown(r0, 0x9) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000000)={@ipv4={[], [], @broadcast}, 0x0}, &(0x7f0000000140)=0x14) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r9, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r9}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in=@loopback, 0x4e23, 0x7, 0x4e23, 0xff, 0x2, 0x0, 0x20, 0x2b, r7, r9}, {0x4, 0x8, 0x800, 0xe2, 0x3, 0x0, 0x3f, 0xd4}, {0x5, 0x7, 0x6}, 0x2, 0x6e6bbc, 0x2, 0x0, 0x0, 0x6}, {{@in=@remote, 0x4d5}, 0x16, @in=@empty, 0x3507, 0x4, 0x7, 0xbd, 0x4, 0x7f, 0xffffff3d}}, 0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000300)={r11, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:46 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 335.248705] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 06:06:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) 06:06:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="0003dd9174036e00e08f93dd8864"], 0xe) 06:06:47 executing program 1 (fault-call:3 fault-nth:72): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:47 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 335.630765] device nr0 entered promiscuous mode [ 335.647358] FAULT_INJECTION: forcing a failure. [ 335.647358] name failslab, interval 1, probability 0, space 0, times 0 [ 335.692279] FAT-fs (loop5): bogus number of reserved sectors [ 335.720936] CPU: 0 PID: 2362 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 335.727841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.737481] Call Trace: [ 335.740182] dump_stack+0x172/0x1f0 [ 335.743929] should_fail.cold+0xa/0x1b [ 335.747943] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 335.753092] ? lock_downgrade+0x880/0x880 [ 335.757360] __should_failslab+0x121/0x190 [ 335.761651] should_failslab+0x9/0x14 [ 335.765474] kmem_cache_alloc_trace+0x2cc/0x760 [ 335.770159] ? kasan_unpoison_shadow+0x35/0x50 [ 335.774757] ? kasan_kmalloc+0xce/0xf0 [ 335.777727] FAT-fs (loop5): Can't find a valid FAT filesystem [ 335.778940] __memcg_init_list_lru_node+0x8a/0x1e0 [ 335.778968] __list_lru_init+0x402/0x720 [ 335.778986] sget_userns+0x81b/0xd30 [ 335.779004] ? kill_litter_super+0x60/0x60 [ 335.802015] ? ns_test_super+0x50/0x50 [ 335.806004] ? ns_test_super+0x50/0x50 [ 335.809899] ? kill_litter_super+0x60/0x60 [ 335.814235] sget+0x10c/0x150 [ 335.817542] mount_bdev+0xff/0x3c0 [ 335.821097] ? finish_unfinished+0x1120/0x1120 [ 335.825914] get_super_block+0x35/0x40 [ 335.829910] mount_fs+0xa8/0x31f [ 335.833613] vfs_kern_mount.part.0+0x6f/0x410 [ 335.838149] do_mount+0x53e/0x2bc0 [ 335.841717] ? copy_mount_string+0x40/0x40 [ 335.845974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 335.851542] ? copy_mount_options+0x280/0x3a0 [ 335.856162] ksys_mount+0xdb/0x150 [ 335.859739] __x64_sys_mount+0xbe/0x150 [ 335.863857] do_syscall_64+0xfd/0x620 [ 335.867696] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.872955] RIP: 0033:0x45c94a 06:06:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e22, 0x9, @mcast1, 0x6}}, 0x24) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={r5, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000300)={r8, @in6={{0xa, 0x4e23, 0x7, @remote, 0x5}}, 0xa4, 0x7f}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000000c0)={r5, 0x3f, 0x7, 0x9, 0x80, 0x3, 0x9, 0xfffeffff, {r8, @in6={{0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0xd}, 0x7f}}, 0x6, 0x5, 0x4, 0x5000, 0x3f}}, &(0x7f0000000180)=0xb0) [ 335.876175] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 335.895368] RSP: 002b:00007fae6b7eaa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 335.903209] RAX: ffffffffffffffda RBX: 00007fae6b7eab40 RCX: 000000000045c94a [ 335.910585] RDX: 00007fae6b7eaae0 RSI: 0000000020000140 RDI: 00007fae6b7eab00 [ 335.917879] RBP: 0000000000000000 R08: 00007fae6b7eab40 R09: 00007fae6b7eaae0 [ 335.926691] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 335.934168] R13: 00000000004c954e R14: 00000000004e0c68 R15: 0000000000000004 [ 335.975526] FAT-fs (loop5): bogus number of reserved sectors [ 335.990480] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:47 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdosk', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:48 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 336.455173] FAT-fs (loop5): bogus number of reserved sectors [ 336.479303] FAT-fs (loop5): Can't find a valid FAT filesystem [ 336.561642] FAT-fs (loop5): bogus number of reserved sectors [ 336.585821] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x80000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3030, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 336.609563] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 06:06:48 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 336.738740] FAT-fs (loop5): bogus number of reserved sectors [ 336.757259] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r2}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r3 = getegid() r4 = getgid() r5 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r6, 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)={{}, {0x1, 0x8}, [{0x2, 0x6, r2}], {0x4, 0x4}, [{0x8, 0x2, r3}, {0x8, 0x1, r4}, {0x8, 0x4, r6}], {0x10, 0x8}, {0x20, 0x6}}, 0x44, 0x1) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup3(r8, r7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r10, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r10, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @rand_addr=0x20}}, 0x0, 0xfffd}, &(0x7f00000000c0)=0x90) r11 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x0) ioctl$KDGKBLED(r11, 0x4b64, &(0x7f0000000080)) 06:06:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='\neiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 336.831442] FAT-fs (loop5): bogus number of reserved sectors [ 336.845055] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:48 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:48 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r0) 06:06:48 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$MON_IOCT_RING_SIZE(r4, 0x9204, 0x3221c) r5 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r10, 0x0) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f00000005c0)={0x134, 0x0, &(0x7f0000000480)=[@transaction={0x40406300, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000140)={@fda={0x66646185, 0x5, 0x1, 0x1e}, @fd={0x66642a85, 0x0, r4}, @flat=@binder={0x73622a85, 0x0, 0x1}}, &(0x7f0000000000)={0x0, 0x20, 0x38}}}, @reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x18, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000240)={@ptr={0x70742a85, 0x0, &(0x7f00000001c0)=""/90, 0x5a, 0x2, 0x7}, @fda={0x66646185, 0x6, 0x2, 0x3d}, @fd={0x66642a85, 0x0, r2}}, &(0x7f00000002c0)={0x0, 0x28, 0x48}}}, @reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x18, &(0x7f00000003c0)={@flat=@handle={0x73682a85, 0x100f}, @fda={0x66646185, 0x0, 0x1, 0x18}, @fd}, &(0x7f0000000440)={0x0, 0x18, 0x38}}}, @increfs_done={0x40106308, 0x1}, @increfs_done, @increfs_done={0x40106308, 0x2}, @dead_binder_done, @request_death, @free_buffer={0x40086303, r11}, @register_looper], 0xf4, 0x0, &(0x7f0000000640)="4885a3728dc349cdbcf9b0bd675c9c330958d69bc0fa68ca4f11df9278772bb2f866a7aeba74dee829176baa740cd1505d9a1a5c0b9414702e66982df8197fbf4e0faff981a638c0831f025936566bd785d2c3188a35948bc6ffc68bafcc26501c15ce63be931f03ec9c818977445757d93146c62643ee4f0f7bfd3e706066633f8d94e1f8b1bf8130aee9651e31e5d1c6020bbf8816df7ba96a4020b886b516a3735fe2555bd56e74469e263ffd82e3d24686d995a8d0886dfa372f86759c4c9942f23843c3bc1783c67e09bdfb5e2433fcc35e5d69668758b7b0477e5c532bfc200bc1ec9e77ef8aa2b2b46b9af44c28c73c14"}) 06:06:48 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f00000000c0)={0xf1, 0x81, 0x29b, 0x5b, 0x9}) r1 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)=ANY=[@ANYRES32=r2], 0x4}}, 0x0) [ 337.070570] FAT-fs (loop5): bogus number of reserved sectors [ 337.116826] Unknown ioctl 22018 [ 337.123248] FAT-fs (loop5): Can't find a valid FAT filesystem [ 337.180147] Unknown ioctl 22018 [ 337.186936] audit: type=1400 audit(1571810808.794:57): avc: denied { map } for pid=2562 comm="syz-executor.4" path="socket:[53597]" dev="sockfs" ino=53597 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=unix_dgram_socket permissive=1 06:06:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='%eiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 337.261749] FAT-fs (loop5): bogus number of reserved sectors [ 337.277344] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:48 executing program 2: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) r2 = getpgrp(0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x840, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_XSAVE(r4, 0x9000aea4, &(0x7f0000000240)) prctl$PR_SET_PTRACER(0x59616d61, r2) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000100)={0x1000, 0x0, 0x1}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(r8, 0xc0206434, &(0x7f0000000000)={0x5, 0x0, 0x975b1672f5d32b83, 0xfffffffffffffb21}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r11, 0x84, 0x20, &(0x7f0000000200)=0x1, 0x4) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000080)={0x3ff, r9, 0x2, 0x5}) ptrace(0x10, r0) 06:06:49 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x17, 0x0, 0x8, 0x10, 0x0, 0x70bd29, 0x25dfdbff, [@sadb_x_nat_t_type={0x1, 0x14, 0x3}, @sadb_x_policy={0x8, 0x12, 0x4, 0x2, 0x0, 0x0, 0xf1, {0x6, 0x6c, 0x3, 0x6, 0x0, 0x8, 0x0, @in6=@mcast1, @in=@broadcast}}, @sadb_address={0x5, 0x17, 0x6c, 0x20, 0x0, @in6={0xa, 0x4e21, 0x3, @dev={0xfe, 0x80, [], 0x1f}, 0xf4}}]}, 0x80}}, 0x40) openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x802, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @local}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:06:49 executing program 2: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xb307113b8f391d83, 0x180) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x30, r6, 0x491, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000400}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x15c, r6, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x0, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffeff}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_SOCK={0x40}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffff9}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x30c}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7751}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7ff}, @TIPC_NLA_NET_NODEID_W1={0x0, 0x4, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x90, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}]}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x40, 0x0) connect$bt_sco(r7, &(0x7f0000000400)={0x1f, {0x9, 0x21, 0x1, 0x4, 0x1}}, 0x8) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000100)=0x100000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000380)=0x7) ptrace(0x10, r0) write$selinux_access(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a6b766d5f6465766963655f743a733020756e636f6e66696e65645f753a73797374656d5f723a696e736d6f645f743a73302d73303a63302e63313032332031383434363773e22dbe65efcec2f6e70186343430373337303935353135353200"], 0x65) 06:06:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='r\niserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000003fc0)=[{{&(0x7f0000000300)={0xa, 0x4e23, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000780)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c, 0x0}}], 0x2, 0x8001) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 337.529773] FAT-fs (loop5): bogus number of reserved sectors [ 337.567859] FAT-fs (loop5): Can't find a valid FAT filesystem [ 337.571812] Started in network mode [ 337.607767] Own node identity , cluster identity 4711 06:06:49 executing program 2: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000080)) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xb307113b8f391d83, 0x180) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x30, r6, 0x491, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000400}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x15c, r6, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x0, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffeff}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_SOCK={0x40}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffff9}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x30c}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7751}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7ff}, @TIPC_NLA_NET_NODEID_W1={0x0, 0x4, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x90, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}]}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x40, 0x0) connect$bt_sco(r7, &(0x7f0000000400)={0x1f, {0x9, 0x21, 0x1, 0x4, 0x1}}, 0x8) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000100)=0x100000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000380)=0x7) ptrace(0x10, r0) write$selinux_access(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a6b766d5f6465766963655f743a733020756e636f6e66696e65645f753a73797374656d5f723a696e736d6f645f743a73302d73303a63302e63313032332031383434363773e22dbe65efcec2f6e70186343430373337303935353135353200"], 0x65) [ 337.655942] FAT-fs (loop5): bogus number of reserved sectors [ 337.676030] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000040)) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000080)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x3, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @broadcast}}]}, 0x50}}, 0x8001) 06:06:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='r%iserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 337.822781] Started in network mode [ 337.835639] Own node identity , cluster identity 4711 06:06:49 executing program 2: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:49 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r4 = dup3(r0, r3, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:49 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='rliserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 338.014987] FAT-fs (loop2): bogus number of reserved sectors [ 338.053645] FAT-fs (loop2): Can't find a valid FAT filesystem [ 338.060792] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 338.087013] FAT-fs (loop5): bogus number of reserved sectors 06:06:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x2000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0xd}) [ 338.149450] FAT-fs (loop5): Can't find a valid FAT filesystem [ 338.256690] FAT-fs (loop5): bogus number of reserved sectors [ 338.271103] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x2000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0xd}) 06:06:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='re\nserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:50 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x2000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0xd}) 06:06:50 executing program 3: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, r0) r1 = getpid() r2 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) rt_tgsigqueueinfo(r2, r1, 0x2a, &(0x7f0000000080)={0x17, 0xfffffffe}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace(0x10, r1) 06:06:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='re%serfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 338.527932] FAT-fs (loop5): bogus number of reserved sectors [ 338.536269] FAT-fs (loop5): Can't find a valid FAT filesystem [ 338.600131] FAT-fs (loop5): bogus number of reserved sectors [ 338.606700] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x2000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:50 executing program 3 (fault-call:1 fault-nth:0): r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 338.835184] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 06:06:50 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @multicast1}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:50 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='relserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:50 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x2000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 339.037522] FAT-fs (loop5): bogus number of reserved sectors [ 339.068578] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 06:06:50 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 339.084545] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x2000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='rei\nerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 339.172083] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 339.199407] FAT-fs (loop5): bogus number of reserved sectors [ 339.205352] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:50 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:50 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x3, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:50 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x2000, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000140)=@v2={0x2, @aes256, 0x4, [], "9777af86df9847c3717992f4a1d276b4"}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000200)={0x5, 0x9, 0x4, 0x40000, {r4, r5/1000+30000}, {0x1, 0x1, 0x0, 0x81, 0x4, 0x5f, "e09c7e2b"}, 0x9de, 0x4, @offset=0x2, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000001c0)={r7}) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x4}}}, &(0x7f00000000c0)=0x90) 06:06:50 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x2000, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r0, 0xd}) 06:06:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='rei#erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:51 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x2000, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r0, 0xd}) 06:06:51 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x8, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 339.447981] FAT-fs (loop5): bogus number of reserved sectors [ 339.470960] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:51 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x300, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 339.569661] FAT-fs (loop5): bogus number of reserved sectors [ 339.586551] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:51 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x2000, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r0, 0xd}) 06:06:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='rei%erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:51 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:51 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1267, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:51 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r1, 0xd}) [ 339.796829] FAT-fs (loop5): bogus number of reserved sectors [ 339.842225] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:51 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1274, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 339.939176] FAT-fs (loop5): bogus number of reserved sectors [ 339.945154] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:51 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000000)=@rose={'rose', 0x0}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:51 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r1, 0xd}) 06:06:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='rei*erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:51 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:51 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1275, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:51 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r1, 0xd}) 06:06:51 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1276, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 340.296379] FAT-fs (loop5): bogus number of reserved sectors [ 340.319614] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='rei+erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 340.447059] FAT-fs (loop5): bogus number of reserved sectors [ 340.455788] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x2000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0xd}) 06:06:52 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:52 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2201, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='rei-erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 340.687739] FAT-fs (loop5): bogus number of reserved sectors [ 340.693801] FAT-fs (loop5): Can't find a valid FAT filesystem [ 340.736019] FAT-fs (loop5): bogus number of reserved sectors [ 340.745381] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:52 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) tkill(0xffffffffffffffff, 0x2c) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000001640)="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", 0x1000, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, r5) keyctl$reject(0x13, r4, 0x7ffbfffe, 0xb62, r5) r6 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r6, 0x84, 0x16, &(0x7f00000001c0)={0x5, [0x0, 0x1ff, 0x8001, 0x0, 0x400]}, 0xe) 06:06:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='rei.erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x2000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0xd}) 06:06:52 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2202, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:52 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x2000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0xd}) 06:06:53 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2203, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 341.368570] FAT-fs (loop5): bogus number of reserved sectors [ 341.396091] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='rei0erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 341.490453] FAT-fs (loop5): bogus number of reserved sectors [ 341.511312] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:53 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2205, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0xd}) 06:06:53 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiKerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 341.722832] FAT-fs (loop5): bogus number of reserved sectors [ 341.761214] FAT-fs (loop5): Can't find a valid FAT filesystem [ 341.848870] FAT-fs (loop5): bogus number of reserved sectors [ 341.867366] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:53 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x4, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:06:53 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2270, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:53 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r1, 0xd}) 06:06:53 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiXerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:53 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r1, 0xd}) [ 342.258215] FAT-fs (loop5): bogus number of reserved sectors [ 342.264091] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:53 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2271, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiaerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 342.408264] FAT-fs (loop5): bogus number of reserved sectors [ 342.414212] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000000)={0xea619164f9b55dbf}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000440)={0x78, 0x0, 0x6, {0x760, 0x7, 0x0, {0x0, 0x10000, 0x0, 0x17, 0xcbb2, 0x7, 0x0, 0x727, 0x4, 0x53b5af2, 0x5, r5, r6, 0xffff, 0x7}}}, 0x78) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000140)={0x1, r0}) 06:06:54 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r1, 0xd}) 06:06:54 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:54 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2272, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0xd}) [ 342.603576] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 06:06:54 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2275, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiberfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 342.669445] FAT-fs (loop5): bogus number of reserved sectors [ 342.708286] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0xd}) 06:06:54 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2276, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 342.811272] FAT-fs (loop5): bogus number of reserved sectors [ 342.827530] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:54 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0xd}) 06:06:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reicerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 343.015205] FAT-fs (loop5): bogus number of reserved sectors [ 343.038204] FAT-fs (loop5): Can't find a valid FAT filesystem [ 343.129403] FAT-fs (loop5): bogus number of reserved sectors [ 343.144956] FAT-fs (loop5): Can't find a valid FAT filesystem [ 343.393626] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 06:06:55 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:55 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2279, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0xd}) 06:06:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiderfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:55 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227a, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 343.615242] FAT-fs (loop5): bogus number of reserved sectors [ 343.631426] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:55 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiherfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:55 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227b, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0xd}) [ 343.906393] FAT-fs (loop5): bogus number of reserved sectors [ 343.943875] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:55 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227c, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r1, 0xd}) 06:06:55 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiierfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:55 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227d, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r1, 0xd}) [ 344.211395] FAT-fs (loop5): bogus number of reserved sectors [ 344.217702] FAT-fs (loop5): Can't find a valid FAT filesystem [ 344.283659] FAT-fs (loop5): bogus number of reserved sectors [ 344.300096] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:55 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227e, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r1, 0xd}) 06:06:56 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reikerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, 0x0) 06:06:56 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227f, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 344.702780] FAT-fs (loop5): bogus number of reserved sectors [ 344.733296] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reilerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 344.821977] FAT-fs (loop5): bogus number of reserved sectors [ 344.858251] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:56 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2282, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, 0x0) 06:06:56 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:56 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2283, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, 0x0) 06:06:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reioerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:56 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 345.115762] FAT-fs (loop5): bogus number of reserved sectors [ 345.132167] FAT-fs (loop5): Can't find a valid FAT filesystem [ 345.221478] FAT-fs (loop5): bogus number of reserved sectors [ 345.232081] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:56 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2285, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:56 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiperfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) 06:06:57 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2286, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 345.439222] FAT-fs (loop5): bogus number of reserved sectors [ 345.504510] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiterfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:57 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2287, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) [ 345.597132] FAT-fs (loop5): bogus number of reserved sectors [ 345.615770] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:57 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:57 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2288, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2}) 06:06:57 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2289, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiuerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 345.857932] FAT-fs (loop5): bogus number of reserved sectors [ 345.889974] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2}) 06:06:57 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x4b47, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 345.997239] FAT-fs (loop5): bogus number of reserved sectors [ 346.016561] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2}) 06:06:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reixerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:57 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:57 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x4b49, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:57 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2289, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 346.266995] FAT-fs (loop5): bogus number of reserved sectors 06:06:57 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5382, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 346.318390] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiyerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2289, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 346.409904] FAT-fs (loop5): bogus number of reserved sectors [ 346.416006] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:58 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5385, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:58 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2289, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reizerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:58 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5386, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 346.637061] FAT-fs (loop5): bogus number of reserved sectors [ 346.675328] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:58 executing program 2: ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2289, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:58 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x541b, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 346.748923] FAT-fs (loop5): bogus number of reserved sectors [ 346.770948] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reis\nrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:58 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:58 executing program 2: ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2289, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:58 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5421, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:58 executing program 2: ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2289, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 347.034303] FAT-fs (loop5): bogus number of reserved sectors 06:06:58 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5450, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 347.076378] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reis%rfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:58 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2289, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:58 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5451, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:58 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2289, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 347.227164] FAT-fs (loop5): bogus number of reserved sectors [ 347.248571] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:58 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reislrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @multicast1}}]}, 0x50}}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r1, 0x8010550e, &(0x7f00000001c0)={0x80000001, &(0x7f0000000140)="336643cd77101e41f54d652d6fd0d54dfe90912145bf584b828d520ad0d0f3f964b5346591f83deed33dfb5e549fdaba6c9c4736b6e5d9849168c65dc85df731fd3c9e05b8571c94b640532a7da84cf068a086aba1c80744"}) r2 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x1ff, 0x28002) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000100)={r3, 0x0, 0x815b}) 06:06:59 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5452, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 347.404263] FAT-fs (loop5): bogus number of reserved sectors [ 347.431319] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:59 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2289, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:59 executing program 0: r0 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, &(0x7f0000000100)=0x80, 0x800) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 347.550019] FAT-fs (loop5): bogus number of reserved sectors [ 347.575878] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:59 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5460, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:59 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2289, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reise\nfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:59 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:59 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x8800, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:59 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2289, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 347.805678] FAT-fs (loop5): bogus number of reserved sectors [ 347.839125] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:59 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x40049409, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:59 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:06:59 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2289, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reise%fs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:59 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x40086602, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 348.116566] FAT-fs (loop5): bogus number of reserved sectors [ 348.155362] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:59 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2289, 0x0) 06:06:59 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x40087602, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:06:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiser\ns\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 348.283131] FAT-fs (loop5): bogus number of reserved sectors [ 348.303058] FAT-fs (loop5): Can't find a valid FAT filesystem 06:06:59 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x4020940d, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:07:00 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2289, 0x0) 06:07:00 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:07:00 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000300)={r3, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340)={0x4, 0x8, 0x1ff, 0xfff, 0x0}, &(0x7f0000000380)=0x10) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000300)={r7, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r8, 0x84, 0x1f, &(0x7f0000000300)={r10, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) r11 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r11, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r12 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r11, 0x84, 0x1f, &(0x7f0000000300)={r13, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) sendmmsg$inet_sctp(r0, &(0x7f0000000e80)=[{&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x401, @mcast1, 0x3}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000100)="c29eaa709d16abcb0571d845cd9171f221713dd00fdeda84cbb89180791d7d271be7c5366fad803c8bc3877c19b5cdb024b7ab26b09c86307d9d0afcbb83a4d07fcf7eb61f9b52d893143df33c45246d4eb6a707e503051f2ca36e77e278535e4f39d9cea28b5eb4fcebbae4477b02688cf9380430b7d024b4c9cc672dd4cd5db7cbe9ba3a29d687ddb066972800797b967f25d2ff9c15e3f9b58d16caf69f6320b35b60b39f59170abef008fc44f1cd47ea1368ca1a40a5c471c21fe09b61a91bd155d4639d5226a97f65081eeb228b", 0xd0}], 0x1, &(0x7f0000000240)=[@authinfo={0x18, 0x84, 0x6, {0x2}}], 0x18, 0x4000}, {&(0x7f0000000280)=@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="a636", 0x2}], 0x1, &(0x7f00000003c0)=[@sndrcv={0x30, 0x84, 0x1, {0x281b, 0xad3, 0xc, 0x8, 0x4, 0x4, 0x4, 0x80000000}}, @sndrcv={0x30, 0x84, 0x1, {0xff, 0x0, 0x2, 0x8, 0x16, 0x8, 0x7, 0x1000, r3}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr="90eece81a9e59cd36b1fecd67b76df7e"}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x16}}, @sndrcv={0x30, 0x84, 0x1, {0x40, 0x1, 0x4, 0x6000, 0x8, 0x2, 0x6, 0x101, r4}}], 0xe8, 0x40000}, {&(0x7f00000004c0)=@in={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000500)="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", 0xff}, {&(0x7f0000000600)="d73e16769de27d071dc031fcf02dcd3d7979756402b3625d6ad78eef655f2c3ea019b58ed5d37561b200c9dec7ff0447182c01551f1bc0af884db84c69c8115f491a15c57d68c02d5f5a126d536c83b83b955672bf", 0x55}], 0x2, &(0x7f00000006c0)=[@dstaddrv6={0x20, 0x84, 0x8, @empty}, @sndinfo={0x20, 0x84, 0x2, {0x40, 0x18202, 0x7, 0x0, r7}}], 0x40, 0x880}, {&(0x7f0000000700)=@in6={0xa, 0x4e21, 0x40, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80}, 0x1c, &(0x7f0000000800)=[{&(0x7f0000000740)="5c411dc1a3b38f4899aee69ead83bbbc4c4170e7e06278e5f6b5aa50a03cb683d7c3893276e7c118baf2ac593fefb3853f326830dc8841a2b9afd7a73e4a3f806fc46ed30f89f8ec298180d4c642457ef6ae13b91df9b68d42de312f13af563a8fa8c17d12971ec6334a98b2cbf29466026ebf1ff4edf2ea8592bb821dce9cd98e495261468ef559ffa9dedfc9c1ea0abe48324d31c86d4c0758a3490ee624a77730e7d16935ecc14152447d98a2bf735bb6ef06506042ef01025c54fc4738", 0xbf}], 0x1, &(0x7f0000000840)=[@authinfo={0x18, 0x84, 0x6, {0x1}}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr="212d55fb44b441072b61547831794e37"}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x4a57}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0x6d3, 0xd1a064f6d21a0500, 0x3, 0x9, 0x4, 0xaf, 0x8000, r10}}, @authinfo={0x18, 0x84, 0x6, {0x3f}}, @sndinfo={0x20, 0x84, 0x2, {0xfff, 0x8002, 0x8001, 0x400, r13}}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0x6, 0xc, 0x7, 0x6214, 0xffffffff, 0xe06837b, 0xfffff001}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0xa}}], 0x108, 0x20000180}, {&(0x7f0000000980)=@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000d40)=[{&(0x7f00000009c0)="ad4e090a03865317afadddc7c81c7c317e84f8058dcd24521468483b923040cbe87f86d82447a2ca7c248e38f273e271511e9fa5425a581f1c2a10adffb8d4b71c18b25fb5bd3e4b69b481cfe7f68c3d9cb4d0fd9bde9e20b786e125612be2bebbd37f88f4e3cc2dcdeee858f8105d31ecdb5eeac0ab714258841fada09a3e512563b364224d242d5f4add1107d3b2d4b361996b269c386cadbc30de11a699b1066016699f78ee89b3b02adff8abe428613913e1bbbb8d148ae91b1dedc7c6908d14b379f883336ad11af814822c711a59a8a1b95ae76450bbd1d3a653b50e77e5d99916f3d442", 0xe7}, {&(0x7f0000000ac0)="6458eb33974a85099a136a9aad8a3ea6f64cf2c6e698432cd83376b906f4768b6b2f8fec0703d51b65c867032627a440058ddaa7d5dcefc1b6", 0x39}, {&(0x7f0000000b00)="54502d423fc943ecebdd82b7ec11b3868fb31e48c2e31a8150697291e7d1faa9ef3d595fa71af45b511c2d15eca6573bc3132bbc93d6897ce3a61769bbd2ec4a4a09219bfe179e576085e175d38d00e48d95d49fd3aafb28a11b7078984fcb6b8f3c63056dc5c52a8170dc4fb64bedfc53b04ab7a8582c7be6a5b1af8e852869d2efc5ecda7cdf8f0e1b45be360562ed4b8d", 0x92}, {&(0x7f0000000bc0)="7889cbc95009e625e2d0016539b11ee34bb96877a80bf895791d2ad82826fcea020268455bbcafcd69c2247fabe03eb3a3569bdf6a490206202e7c53a4fc74931555e64499de45", 0x47}, {&(0x7f0000000c40)="6316ba223794ca2701f8a06d1f7f5d30e1aa4640938f8925bec395b2ae71bad4487454928af07484d1ac7c8f8a65c8219f610db3a0fadee16b7d130ea901930f479fee39a0b5ca740ded688b998de0f677874a2768f21c617543ff6a361fef2cab5372c108835bf306ae612b0f6e489f119d5f7169d79147de224904674ef8d5a2af0aba62d8c51ede99f2390f1ddbaa238bac6773b36c7d9ae29d888fae6b092c47bc65cb86904eb8b8825981ad2964c78a8975a7113ba7c14ec9efc4462be92e1b187c26453f89e7fdb52b67d0e58d4244bdbed1cb84e6f8ba9c0bbe5db7c6425738", 0xe3}], 0x5, &(0x7f0000000dc0)=[@prinfo={0x18, 0x84, 0x5, {0x18, 0xfffffffe}}, @authinfo={0x18, 0x84, 0x6, {0x8}}, @dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x20}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x4}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @init={0x18, 0x84, 0x0, {0x7fff, 0xb502, 0x6, 0x5}}], 0x90, 0xfa784ccc420bc563}], 0x5, 0x0) r14 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r14, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:07:00 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x80086601, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:07:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiser%s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:07:00 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2289, 0x0) [ 348.540983] FAT-fs (loop5): bogus number of reserved sectors [ 348.570173] FAT-fs (loop5): Can't find a valid FAT filesystem 06:07:00 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x80087601, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 348.651238] FAT-fs (loop5): bogus number of reserved sectors [ 348.672097] FAT-fs (loop5): Can't find a valid FAT filesystem 06:07:00 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2289, &(0x7f0000000100)) 06:07:00 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:07:00 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0045878, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:07:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiser.s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:07:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="cc0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xcc}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 06:07:00 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0045878, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 348.903365] FAT-fs (loop5): bogus number of reserved sectors [ 348.930101] FAT-fs (loop5): Can't find a valid FAT filesystem 06:07:00 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0189436, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 349.044701] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. [ 349.045715] FAT-fs (loop5): bogus number of reserved sectors [ 349.094096] FAT-fs (loop5): Can't find a valid FAT filesystem 06:07:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000340)=0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)=0x0) tgkill(r2, r3, 0x39) r4 = socket$key(0xf, 0x3, 0x2) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, r5) r6 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000100)={r6, 0xd0, 0x55}, &(0x7f0000000140)={'enc=', 'pkcs1', ' hash=', {'sha256_mb\x00'}}, &(0x7f00000001c0)="c6ee534c3aedbffe8e10f52c56eca875ae4876e2e03f63346fb8a8e87d1fd902d6a2838de70e3c57f98b9dec84986b5ee1993f4d9564f5d6671a6dd428ebb3097f99643b0ad435333d537ca826cfe2b465da66e2ca3fb2fc1e80eaa0d058b4c423aa1a66ccf81124d80bb7ac8e65bab4d62e5715b5aa5972a57c296283b05c72f82afd895c1f359b9d1153aec06fbdd50e76011d5c20ed35aa30429ca62c73f80327ae937529e4f2491df091ccf9918ee40fcce0e4aff474fe99db5c510e73cca3b066cb80ffcdae6dec4cea79799299", &(0x7f00000002c0)="d721535b8ff1c55bb25da9df691eb880de2e0fe9b225b9dbd499055356be45f83c9f1caa018e7545c42cd258585448df2e8b98aed302dc40c1d8ca48d93c7425b6617eaad061f6d024c2245d42209f03fd71fde88c") sendmsg$key(r4, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:07:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiser/s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:07:01 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:07:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="cc0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xcc}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 06:07:01 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:07:01 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10100, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000080)={0x7fff, 0x0, 0x2, 0x8}) ioctl$DRM_IOCTL_AGP_BIND(r3, 0x40106436, &(0x7f0000000140)={r4}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TUNSETPERSIST(r6, 0x400454cb, 0x0) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) recvfrom$ax25(r9, &(0x7f00000001c0)=""/100, 0x64, 0x40000200, &(0x7f0000000240)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}, 0x1}, &(0x7f00000000c0)=0x90) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x480, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r10, 0x10f, 0x81, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 06:07:01 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0481273, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 349.485712] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. [ 349.513657] FAT-fs (loop5): bogus number of reserved sectors [ 349.527163] FAT-fs (loop5): Can't find a valid FAT filesystem 06:07:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="cc0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xcc}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 06:07:01 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xffffff1f, &(0x7f0000000100)={0x0, 0x0, 0x1b}) [ 349.628996] FAT-fs (loop5): bogus number of reserved sectors [ 349.640449] FAT-fs (loop5): Can't find a valid FAT filesystem 06:07:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserls\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:07:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20b82, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000040)="650f090f210fba4000b80000ef66f30f0966660f1a638466b9ed02000066b8e9bd000066ba000000000f3065660fe2cdb875068ee066b8020000000f23d80f21f86635000000e00f23f83e3ef2a7", 0x4e}], 0x1, 0x2, &(0x7f0000000100), 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)=ANY=[]}}, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x7f, 0x1}, 0x7) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000100)={0x0, @reserved}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x109d01, 0x0) ioctl$TIOCGSERIAL(r2, 0x541e, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/94}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$KIOCSOUND(r1, 0x4b2f, 0x70) 06:07:01 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) [ 349.682173] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 06:07:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="cc0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xcc}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 06:07:01 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x1b}) 06:07:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="cc0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000c0001006e6576656d0000004c00020003000000000801000000000000809f45533b6eda4445e211c2bc7f02000000c2800000000c0008007df880591538e7fe0c0003f700000000050000000c000b0001000080000000000c000300020000009e000000080001007366710063ff02000000000000000000004857819517e33f6f00000000000000000000000000000000000000000000000000000000fd00000000000000000000000000000000000000000000d022c3c103b339daf7745650c064435badda0d1b80000000fdf9180a57d09499f5406f721f3c442d793269e404dd38cc92501de2675ebeb4fab52053d9bac8dcc039466f774c192af5cd39dfc692c3726076fd9e95b1cf5048e042fda6e03a8af5f6f00aba51c49aa022932d9afe16e1827f3fc0f988127fd5cef8c95e47212ceff4c7e49aeafa3efd17bed4c54254eab212ed7e30f6df5b1dc32df0619ac9f9d20598820d70612790c46a7543cdba016d8944686b68a68b5f4d79a0cbe1ea42a35637f458b3eef2a0a714c896220ac35387dbc03df2645f91fdd8a24fbd9c49d8797b311ac2b7849633e9ced87a3808fea74bccdb4722b28b7d60f2d6c3a8053f142c227ed18a3ec8611619d5ea432c8fb028bd4444ebb6a8a44cbf591d457b9498523c956daf7b7793a6e6a5db53a9434af7e7a9fb8cf5b4c60f7f7eb763024bc50759fd435b423147e9142e97539bd0f7c608e0ed912012b8f37a9b682283ad0f"], 0xcc}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 349.820305] FAT-fs (loop5): bogus number of reserved sectors [ 349.826765] FAT-fs (loop5): Can't find a valid FAT filesystem [ 349.844798] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 06:07:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000080), 0x10) 06:07:01 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x2, 0x0, 0x1b}) [ 349.953096] FAT-fs (loop5): bogus number of reserved sectors [ 349.966285] FAT-fs (loop5): Can't find a valid FAT filesystem 06:07:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}, 0x28b, 0x2}, &(0x7f00000000c0)=0x90) 06:07:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserf\n\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:07:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="cc0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000c0001006e6576656d0000004c00020003000000000801000000000000809f45533b6eda4445e211c2bc7f02000000c2800000000c0008007df880591538e7fe0c0003f700000000050000000c000b0001000080000000000c000300020000009e000000080001007366710063ff02000000000000000000004857819517e33f6f00000000000000000000000000000000000000000000000000000000fd00000000000000000000000000000000000000000000d022c3c103b339daf7745650c064435badda0d1b80000000fdf9180a57d09499f5406f721f3c442d793269e404dd38cc92501de2675ebeb4fab52053d9bac8dcc039466f774c192af5cd39dfc692c3726076fd9e95b1cf5048e042fda6e03a8af5f6f00aba51c49aa022932d9afe16e1827f3fc0f988127fd5cef8c95e47212ceff4c7e49aeafa3efd17bed4c54254eab212ed7e30f6df5b1dc32df0619ac9f9d20598820d70612790c46a7543cdba016d8944686b68a68b5f4d79a0cbe1ea42a35637f458b3eef2a0a714c896220ac35387dbc03df2645f91fdd8a24fbd9c49d8797b311ac2b7849633e9ced87a3808fea74bccdb4722b28b7d60f2d6c3a8053f142c227ed18a3ec8611619d5ea432c8fb028bd4444ebb6a8a44cbf591d457b9498523c956daf7b7793a6e6a5db53a9434af7e7a9fb8cf5b4c60f7f7eb763024bc50759fd435b423147e9142e97539bd0f7c608e0ed912012b8f37a9b682283ad0f"], 0xcc}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 06:07:02 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:07:02 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x3, 0x0, 0x1b}) 06:07:02 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x70bd27, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:07:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="cc0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xcc}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 06:07:02 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x9, 0x0, 0x1b}) [ 350.447238] FAT-fs (loop5): bogus number of reserved sectors [ 350.469412] FAT-fs (loop5): Can't find a valid FAT filesystem 06:07:02 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d00000a000000000000000000000005000500000000000a00000000000000010000000000000000030006000000000002003000e00000010000000000000000"], 0x50}}, 0x0) 06:07:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserf#\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:07:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 350.565361] FAT-fs (loop5): bogus number of reserved sectors [ 350.589302] FAT-fs (loop5): Can't find a valid FAT filesystem 06:07:02 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0xd, 0x0, 0x1b}) 06:07:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 06:07:02 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:07:02 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = msgget$private(0x0, 0x1b0) msgsnd(r1, &(0x7f0000000100)={0x1, "07f7f8d5b1becf83eab0f425f0e82608203eb77dfa5639e544a5f8a622ae21fb58f154cd45b912594b5b34cc530decc263e4f88c384d6830a8a02bd6b70755aba786a6b9a415e4571d02a11f855ada0c5f2859998ca34f99664122cfe9a9ba6f887ac771a22ab056ab8dff719331764719498094d4aaabda7a7a84d68660431d849d8fc139dfcfd52dd2dfbbf6abc796f94f96cd84c096c6b19ea0d3a94198db9a7463d115839bf1653dc348b919800592e058e34318caee108160f73a0260bb17a755fbb8d123055bcb"}, 0xd2, 0xc00) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r3}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r5, 0x0, 0x0) lchown(&(0x7f0000000480)='./file0\x00', r3, r5) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[]}}, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000200)="1289d74a63af8fdaab12e2e1593621014ef2b5898e42324ca15e94ef6f47144bf0fb746455bfd36958bbf60aee05c2a889187d93584976f161ed74db4761f4cd7f70b1a5249a955018ab8e02b36281fde643c0bc6a2829a93ede9c3943b553a97748dc9882b041183d1ed88a23b34555177ca9613b00cb056f47c0d0c98e6be30f8ab9ac030b7c7ca992b319f1c02b871c4d6a463776eff8dbbfa7ca172dd3ce3d569d728db04b958464317550a32821afbc3ccbea29c96ba5b85ece7bc503222942344ec329d021bd1ad5648c2bfd857819ee006ee6a3de9521e703cf42c2951bc39139adfc8638c63e235595e118", 0xef, 0x4}, {&(0x7f0000000300)="f33367d24b73d037d74b41f6edaef5ab9adb12f347d61654138f649193c16eb29d746f1eed9fc340f4931986b22291a254d94b3f802fcc0e1693fa876b50733160ab3b9a73bf49d5024c087d995125efbff4f09901b7135011f9f4426d0aef08dd56482ec77b9e3c190680a8d9fd8d098528a455fa8fc9a77af2737f3fd46e336e109b28cfcdaf13", 0x88, 0x3}], 0x0, &(0x7f0000000400)={[{@localflocks='localflocks'}, {@upgrade='upgrade'}, {@lockproto_nolock='lockproto=lock_nolock'}, {@upgrade='upgrade'}], [{@context={'context', 0x3d, 'staff_u'}}]}) 06:07:02 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x10, 0x0, 0x1b}) 06:07:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserf%\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:07:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_SET_LEDBIT(r4, 0x40045569, 0x8) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$dupfd(r1, 0x406, r5) r6 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xff}}]}, &(0x7f0000000600)=0x10) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="cc237e4c751722b1872300b06d000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r8, 0x84, 0x1f, &(0x7f0000000300)={r10, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr(r0, &(0x7f0000000200)=@random={'system.', '\x00'}, &(0x7f0000000280)='/dev/dsp#\x00', 0xa, 0x0) r12 = dup(r11) r13 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x200) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r12, 0x84, 0x1f, &(0x7f0000000140)={r10, @in={{0x2, 0x0, @loopback=0xac141400}}, 0x0, 0x4}, &(0x7f00000000c0)=0xfffffffffffffe97) 06:07:02 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x88, 0x0, 0x1b}) [ 351.329750] FAT-fs (loop5): bogus number of reserved sectors [ 351.368552] gfs2: not a GFS2 filesystem 06:07:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 351.375314] FAT-fs (loop5): Can't find a valid FAT filesystem 06:07:03 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x300, 0x0, 0x1b}) 06:07:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserf*\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:07:03 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="cc0000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000c0001006e6576656d0000004c00020003000000000801000000000000809f45533b6eda4445e211c2bc7f02000000c2800000000c0008007df880591538e7fe0c0003f700000000050000000c000b0001000080000000000c000300020000009e000000080001007366710063ff02000000000000000000004857819517e33f6f00000000000000000000000000000000000000000000000000000000fd00000000000000000000000000000000000000000000d022c3c103b339daf7745650c064435badda0d1b80000000fdf9180a57d09499f5406f721f3c442d793269e404dd38cc92501de2675ebeb4fab52053d9bac8dcc039466f774c192af5cd39dfc692c3726076fd9e95b1cf5048e042fda6e03a8af5f6f00aba51c49aa022932d9afe16e1827f3fc0f988127fd5cef8c95e47212ceff4c7e49aeafa3efd17bed4c54254eab212ed7e30f6df5b1dc32df0619ac9f9d20598820d70612790c46a7543cdba016d8944686b68a68b5f4d79a0cbe1ea42a35637f458b3eef2a0a714c896220ac35387dbc03df2645f91fdd8a24fbd9c49d8797b311ac2b7849633e9ced87a3808fea74bccdb4722b28b7d60f2d6c3a8053f142c227ed18a3ec8611619d5ea432c8fb028bd4444ebb6a8a44cbf591d457b9498523c956daf7b7793a6e6a5db53a9434af7e7a9fb8cf5b4c60f7f7eb763024bc50759fd435b423147e9142e97539bd0f7c608e0ed912012b8f37a9b682283ad0f"], 0xcc}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 351.507034] FAT-fs (loop5): bogus number of reserved sectors [ 351.511099] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. [ 351.522343] FAT-fs (loop5): Can't find a valid FAT filesystem 06:07:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90) 06:07:03 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x900, 0x0, 0x1b}) 06:07:03 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:07:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8, 0x1, 'cbs\x00'}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400090500"/20, @ANYRES32=r5, @ANYBLOB="000000000000ffff0000000008000100636273005c000200180001000000000000000000000000000000059ec6000000000000"], 0x3d8}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x40, 0x1f, 0x7fff, 0x42, 0x1, 0x2, [], r5}, 0x3c) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='rose0\x00', 0x10) 06:07:03 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="cc0000002400070500"/20, @ANYRES32, @ANYBLOB="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"], 0xcc}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 06:07:03 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0xd00, 0x0, 0x1b}) 06:07:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserf+\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 351.680221] FAT-fs (loop5): bogus number of reserved sectors [ 351.698666] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. [ 351.721946] FAT-fs (loop5): Can't find a valid FAT filesystem 06:07:03 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x1ee9, 0x0, 0x1b}) [ 351.786380] FAT-fs (loop5): bogus number of reserved sectors [ 351.821789] FAT-fs (loop5): Can't find a valid FAT filesystem 06:07:03 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="cc0000002400070500"/20, @ANYRES32, @ANYBLOB="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"], 0xcc}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 351.829455] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 351.846805] kasan: CONFIG_KASAN_INLINE enabled [ 351.852939] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 351.864486] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 351.870873] CPU: 1 PID: 3894 Comm: syz-executor.0 Not tainted 4.19.80 #0 [ 351.877846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.887399] RIP: 0010:hrtimer_active+0x11e/0x230 [ 351.892345] Code: 48 39 c3 0f 84 d3 00 00 00 e8 2e 22 0f 00 48 8b 45 c8 80 38 00 0f 85 06 01 00 00 49 8b 5d 30 4c 8d 63 10 4c 89 e0 48 c1 e8 03 <42> 0f b6 14 38 4c 89 e0 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 [ 351.911492] RSP: 0018:ffff88805065f350 EFLAGS: 00010202 [ 351.916868] RAX: 0000000000000002 RBX: 0000000000000000 RCX: ffffc90005e5f000 [ 351.924257] RDX: 000000000000c0f8 RSI: ffffffff815ba512 RDI: ffff88809293b500 [ 351.931621] RBP: ffff88805065f3a8 R08: ffff8880997ac000 R09: 0000000000000000 [ 351.939685] R10: ffffed1012527654 R11: ffff88809293b2a7 R12: 0000000000000010 [ 351.947170] R13: ffff88809293b500 R14: ffff888057e4c6c0 R15: dffffc0000000000 [ 351.954730] FS: 00007fb512124700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 351.963149] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 351.969127] CR2: 00007ffead365ff0 CR3: 00000000a8454000 CR4: 00000000001406e0 [ 351.976724] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 06:07:03 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nocase']) 06:07:03 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x2000, 0x0, 0x1b}) [ 351.984239] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 351.991516] Call Trace: [ 351.994122] hrtimer_try_to_cancel+0x74/0x5b0 [ 351.998636] ? hrtimer_run_softirq+0x270/0x270 [ 352.003314] ? __lock_is_held+0xb6/0x140 [ 352.007400] hrtimer_cancel+0x20/0x40 [ 352.011397] qdisc_watchdog_cancel+0x16/0x20 [ 352.015820] cbs_destroy+0x5e/0xd0 [ 352.019567] ? cbs_dequeue_soft+0x400/0x400 [ 352.024172] qdisc_create+0xaa6/0x1230 [ 352.028291] ? tc_get_qdisc+0xbb0/0xbb0 [ 352.032837] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 352.038150] ? qdisc_match_from_root+0x18a/0x280 [ 352.042920] tc_modify_qdisc+0x51b/0x1bdc [ 352.047195] ? qdisc_create+0x1230/0x1230 [ 352.051528] ? find_held_lock+0x35/0x130 [ 352.055704] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 352.061517] ? qdisc_create+0x1230/0x1230 [ 352.065862] rtnetlink_rcv_msg+0x463/0xb00 [ 352.070113] ? rtnetlink_put_metrics+0x560/0x560 [ 352.074975] ? netdev_pick_tx+0x300/0x300 [ 352.079286] ? netlink_deliver_tap+0x22d/0xc20 [ 352.084051] ? find_held_lock+0x35/0x130 [ 352.088127] netlink_rcv_skb+0x17d/0x460 [ 352.092198] ? rtnetlink_put_metrics+0x560/0x560 [ 352.097054] ? netlink_ack+0xb30/0xb30 [ 352.101160] ? kasan_check_read+0x11/0x20 [ 352.105416] ? netlink_deliver_tap+0x254/0xc20 [ 352.110011] rtnetlink_rcv+0x1d/0x30 [ 352.113740] netlink_unicast+0x537/0x720 [ 352.117947] ? netlink_attachskb+0x770/0x770 [ 352.122470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 352.128039] netlink_sendmsg+0x8ae/0xd70 [ 352.132138] ? netlink_unicast+0x720/0x720 [ 352.136650] ? selinux_socket_sendmsg+0x36/0x40 [ 352.141334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 352.146975] ? security_socket_sendmsg+0x8d/0xc0 [ 352.151745] ? netlink_unicast+0x720/0x720 [ 352.156080] sock_sendmsg+0xd7/0x130 [ 352.159818] ___sys_sendmsg+0x803/0x920 [ 352.163930] ? copy_msghdr_from_user+0x430/0x430 [ 352.168743] ? lock_downgrade+0x880/0x880 [ 352.173168] ? kasan_check_read+0x11/0x20 [ 352.177420] ? __fget+0x367/0x540 [ 352.180910] ? iterate_fd+0x360/0x360 [ 352.184904] ? lock_downgrade+0x880/0x880 [ 352.189165] ? __fget_light+0x1a9/0x230 [ 352.193585] ? __fdget+0x1b/0x20 [ 352.196965] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 352.202609] __sys_sendmsg+0x105/0x1d0 [ 352.206676] ? __ia32_sys_shutdown+0x80/0x80 [ 352.211367] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 352.216391] ? do_syscall_64+0x26/0x620 [ 352.220380] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.225764] ? do_syscall_64+0x26/0x620 [ 352.229842] __x64_sys_sendmsg+0x78/0xb0 [ 352.234006] do_syscall_64+0xfd/0x620 [ 352.237823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.243023] RIP: 0033:0x459ef9 [ 352.246230] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.265227] RSP: 002b:00007fb512123c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 352.273314] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459ef9 [ 352.280601] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 352.287962] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 352.295350] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb5121246d4 [ 352.302736] R13: 00000000004c820d R14: 00000000004de238 R15: 00000000ffffffff [ 352.310433] Modules linked in: [ 352.315271] ---[ end trace e0cd9783fe8e1c49 ]--- [ 352.320475] RIP: 0010:hrtimer_active+0x11e/0x230 [ 352.325369] Code: 48 39 c3 0f 84 d3 00 00 00 e8 2e 22 0f 00 48 8b 45 c8 80 38 00 0f 85 06 01 00 00 49 8b 5d 30 4c 8d 63 10 4c 89 e0 48 c1 e8 03 <42> 0f b6 14 38 4c 89 e0 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 [ 352.344898] RSP: 0018:ffff88805065f350 EFLAGS: 00010202 [ 352.349029] kobject: 'loop5' (000000003ab605c8): kobject_uevent_env [ 352.350454] RAX: 0000000000000002 RBX: 0000000000000000 RCX: ffffc90005e5f000 [ 352.357098] kobject: 'loop5' (000000003ab605c8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 352.374328] RDX: 000000000000c0f8 RSI: ffffffff815ba512 RDI: ffff88809293b500 [ 352.381782] RBP: ffff88805065f3a8 R08: ffff8880997ac000 R09: 0000000000000000 [ 352.389034] kobject: 'loop1' (0000000082acf68b): kobject_uevent_env [ 352.389488] R10: ffffed1012527654 R11: ffff88809293b2a7 R12: 0000000000000010 [ 352.395768] kobject: 'loop1' (0000000082acf68b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 352.413319] R13: ffff88809293b500 R14: ffff888057e4c6c0 R15: dffffc0000000000 [ 352.421425] FS: 00007fb512124700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 352.430652] kobject: 'loop3' (00000000ea96c97c): kobject_uevent_env [ 352.433420] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 352.438972] kobject: 'loop3' (00000000ea96c97c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 352.446529] CR2: 0000001b2ee24000 CR3: 00000000a8454000 CR4: 00000000001406e0 [ 352.453159] kobject: 'loop5' (000000003ab605c8): kobject_uevent_env [ 352.460695] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 352.469926] kobject: 'loop5' (000000003ab605c8): fill_kobj_path: path = '/devices/virtual/block/loop5' 06:07:04 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x3f00, 0x0, 0x1b}) [ 352.483780] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 352.485537] kobject: 'loop5' (000000003ab605c8): kobject_uevent_env [ 352.493314] Kernel panic - not syncing: Fatal exception [ 352.505751] Kernel Offset: disabled [ 352.509671] Rebooting in 86400 seconds..